fbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f0000000a00)='./file0/file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000540)={{{@in6=@initdev, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xfa) openat(r1, &(0x7f00000002c0)='./file0\x00', 0x4000, 0x20) openat$cgroup_ro(r2, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) umount2(&(0x7f0000000a40)='./file2\x00', 0x8) mount$9p_unix(&(0x7f0000000080)='./file2\x00', &(0x7f0000000500)='./file2\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000a80)=ANY=[]) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 18:28:09 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r5 = openat$cgroup_ro(r2, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r5, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r4, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) close_range(r0, 0xffffffffffffffff, 0x2) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f00000002c0)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r6, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6c30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4000000000, 0x37fffffc}, 0x486ac, 0xfffffffffffffffc, 0xd72, 0x0, 0x66, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x11) r7 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r7, &(0x7f0000000200)='./file0\x00', 0x86) 18:28:09 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7fffbff1}]}) mq_open(&(0x7f0000000040)='\'!\\)(\xdf', 0x800, 0x44, 0x0) 18:28:09 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x0, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:28:09 executing program 2: syz_emit_ethernet(0x56, &(0x7f0000000080)={@random="07af43ba2470", @remote, @void, {@canfd={0xd, {{}, 0x0, 0x0, 0x0, 0x0, "7bc74f84dbc157914cd8c864a1bea9a4d30d9eedbf84c7959dd76445502e8debf42a1f820f5fe25e762e614b3d9ae47ca38e6862065da5e5550f0dfc6eba6e8f"}}}}, 0x0) r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r2 = dup(r1) getdents64(r2, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r2, 0x0, 0x0) fsmount(r2, 0xd997a3e47da7857a, 0x95) r3 = dup(r0) getdents64(r3, &(0x7f0000001d00)=""/4085, 0xff5) write$cgroup_subtree(r3, &(0x7f0000000240)={[{0x2d, 'cpu'}]}, 0x5) getdents(r3, 0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000)={0x41424344}, 0x1, 0x0) write$tun(r3, &(0x7f0000000300)={@val={0x0, 0x2}, @void, @ipv6=@tcp={0x3, 0x6, "5f69c5", 0xca, 0x6, 0xff, @local, @remote, {[@dstopts={0x62, 0x7, '\x00', [@generic={0xff, 0x15, "3fcb9547d20201e8bff9f89cd383a5bfc0b489e032"}, @calipso={0x7, 0x8, {0x0, 0x0, 0x0, 0x4ae}}, @hao={0xc9, 0x10, @empty}, @enc_lim={0x4, 0x1, 0x1}, @enc_lim={0x4, 0x1, 0x9}]}], {{0x4e23, 0x4e24, r4, 0x41424344, 0x1, 0x0, 0xc, 0x0, 0x20, 0x0, 0x2, {[@timestamp={0x8, 0xa, 0x800, 0x3ff}, @exp_fastopen={0xfe, 0x11, 0xf989, "c2f4160a67822510863082c027"}]}}, {"426efb5c920a26585f12308e4c466ae329a96e1c3dbeb6d6b3b8144f26a80861de6980907e162a2c513b726be29e061f94ced23e575db0061f08c4ee4eec88268fd3f57c4149686fb04b542491a3adba8fed"}}}}}, 0xf6) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8401, 0x0) ioctl$TUNSETQUEUE(r5, 0x400454ca, &(0x7f00000000c0)={'ip6gretap0\x00'}) openat(r3, &(0x7f0000000280)='./file0\x00', 0x20040, 0x150) write$tun(r5, 0x0, 0x0) [ 2777.022417] 9pnet: p9_fd_create_unix (15290): problem connecting socket: ./file0: -111 [ 2777.054563] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2777.059565] 9pnet: p9_fd_create_unix (15290): problem connecting socket: ./file0: -111 [ 2777.059802] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2777.069219] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:28:09 executing program 6: r0 = openat(0xffffffffffffffff, 0x0, 0x101000, 0x0) r1 = dup(r0) statx(r1, &(0x7f0000000000)='./file1\x00', 0x4000, 0x7ff, &(0x7f0000000180)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x0, 0x40) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000080)={0x0, 0xfdfdffff, 0x0, 0x0, '\x00', [{}, {0x800, 0x0, 0x400000000000000}]}) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) 18:28:09 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x9, 0x0, &(0x7f0000000200), 0xa040, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:28:09 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x0, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:28:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) r5 = openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) write$binfmt_elf64(r5, &(0x7f0000000a00)={{0x7f, 0x45, 0x4c, 0x46, 0x6, 0x81, 0x6, 0x2, 0x1, 0x3, 0x6, 0xffff7fff, 0xc5, 0x40, 0x9b, 0x735d, 0x7, 0x38, 0x1, 0x1f, 0x0, 0x5}, [{0x5, 0x2, 0xfffffffffffffffa, 0x5, 0x6, 0x1000, 0xffff, 0x8}], "1141", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x77a) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r6, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r7, &(0x7f0000000200)='./file0\x00', 0x86) 18:28:10 executing program 2: syz_emit_ethernet(0x56, &(0x7f0000000080)={@random="07af43ba2470", @remote, @void, {@canfd={0xd, {{}, 0x0, 0x0, 0x0, 0x0, "7bc74f84dbc157914cd8c864a1bea9a4d30d9eedbf84c7959dd76445502e8debf42a1f820f5fe25e762e614b3d9ae47ca38e6862065da5e5550f0dfc6eba6e8f"}}}}, 0x0) r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r2 = dup(r1) getdents64(r2, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r2, 0x0, 0x0) fsmount(r2, 0xd997a3e47da7857a, 0x95) r3 = dup(r0) getdents64(r3, &(0x7f0000001d00)=""/4085, 0xff5) write$cgroup_subtree(r3, &(0x7f0000000240)={[{0x2d, 'cpu'}]}, 0x5) getdents(r3, 0x0, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000000)={0x41424344}, 0x1, 0x0) write$tun(r3, &(0x7f0000000300)={@val={0x0, 0x2}, @void, @ipv6=@tcp={0x3, 0x6, "5f69c5", 0xca, 0x6, 0xff, @local, @remote, {[@dstopts={0x62, 0x7, '\x00', [@generic={0xff, 0x15, "3fcb9547d20201e8bff9f89cd383a5bfc0b489e032"}, @calipso={0x7, 0x8, {0x0, 0x0, 0x0, 0x4ae}}, @hao={0xc9, 0x10, @empty}, @enc_lim={0x4, 0x1, 0x1}, @enc_lim={0x4, 0x1, 0x9}]}], {{0x4e23, 0x4e24, r4, 0x41424344, 0x1, 0x0, 0xc, 0x0, 0x20, 0x0, 0x2, {[@timestamp={0x8, 0xa, 0x800, 0x3ff}, @exp_fastopen={0xfe, 0x11, 0xf989, "c2f4160a67822510863082c027"}]}}, {"426efb5c920a26585f12308e4c466ae329a96e1c3dbeb6d6b3b8144f26a80861de6980907e162a2c513b726be29e061f94ced23e575db0061f08c4ee4eec88268fd3f57c4149686fb04b542491a3adba8fed"}}}}}, 0xf6) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8401, 0x0) ioctl$TUNSETQUEUE(r5, 0x400454ca, &(0x7f00000000c0)={'ip6gretap0\x00'}) openat(r3, &(0x7f0000000280)='./file0\x00', 0x20040, 0x150) write$tun(r5, 0x0, 0x0) 18:28:10 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f00000003c0), &(0x7f0000000100)='./file0\x00', 0x8, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) ioctl$BTRFS_IOC_DEFRAG(0xffffffffffffffff, 0x50009402, 0x0) openat(r3, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c70726976706f72742c6c6f6f52652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 18:28:10 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x0, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 2777.381938] 9pnet: p9_fd_create_unix (15311): problem connecting socket: ./file0: -111 [ 2777.393967] 9pnet: p9_fd_create_unix (15312): problem connecting socket: ./file0: -111 18:28:10 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x0, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:28:10 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x5c, r1, 0x8, 0x70bd2a, 0x25dfdbfd, {}, [@IEEE802154_ATTR_LLSEC_DEV_OVERRIDE={0x5, 0x36, 0x1}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x20}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_TYPE={0x5, 0x33, 0x3}, @IEEE802154_ATTR_LLSEC_SECLEVELS={0x5, 0x35, 0x8}, @IEEE802154_ATTR_DEV_INDEX={0x8}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x44011) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="1000000040000000030000002b00000005000000010000000000000000000000002000000020000010000000000000009f09c75f0000ffff53ef0100010000009f09c75f000000000000000001000000000000000b0000008000000038000000c20201006b04", 0x66, 0x400}], 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="f467e389875c9446a109cb570735428a9e3a4e29cc3c78e6784a3c75d8aab097672878c346b96f55e90566e613ecd14ee75406455026e4a7e8eb9e05cea5163e25840a194e4ee466686db9650ae5c6c82a66818ce189ec0aacd84d51e7cb2b8d322f0a39cbecd572cfa7760d59"]) [ 2777.508415] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2777.511802] 9pnet: p9_fd_create_unix (15318): problem connecting socket: ./file0: -111 [ 2777.530389] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2777.547216] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2777.563926] 9pnet: p9_fd_create_unix (15311): problem connecting socket: ./file0: -111 18:28:10 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="23210000000000000000009fa7922666189232c54e1d715b53b5e9a8637597acf06407ba302c5a71dec42941109915381f3fd33794f941128727fab91d76ac6a22113ec3f25d888301dce1165e3b670d186354c062f5820a5d374647ecaa38aabb5fa310dc26c45dd3a96d811a00b6e2fc24"], 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a90a83eb5c0bb0800", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) [ 2777.711105] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:28:23 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xf, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='#! ./nile0\n'], 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000440)=ANY=[@ANYBLOB="6a719aa8c270cbba508027f60e1d2b95cb4ff8409849e3701eea88aacbe8f200ae1c51069b9ad7589bbcabe6cbb49317a381c66c23ffd284965bbfa708c08a3ac32919d013058f742c129e85d14febbc345ac8b5aa4da0ca48a5d56832b015437de60b0504a044f9cc00000000000000000000000000000000002051fc0619fb406bbe749c56d389fef5d42ec8045922bb31051e9832dc53bda08e59fb77b36c149ae5a01a12ecfcabc9b5cf9b92942716cc6a25346e989ca45eec233c203b29632faf319bf008c521a6edaa0000000000", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:28:23 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x18000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:28:23 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(r2, &(0x7f0000000000)='/proc/self/exe\x00', 0x100, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) syz_io_uring_setup(0x5467, &(0x7f0000000340)={0x0, 0x5577, 0x0, 0x3, 0x1ab}, &(0x7f0000ff9000/0x5000)=nil, &(0x7f0000ff9000/0x3000)=nil, &(0x7f0000000140), &(0x7f00000003c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:28:23 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) openat(r0, &(0x7f00000002c0)='./file1\x00', 0x220002, 0x54) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000300)=0xe8) r4 = openat$cgroup_ro(r2, &(0x7f0000000180)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) 18:28:23 executing program 2: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = dup(r0) getdents64(r1, &(0x7f0000001d00)=""/4085, 0xff5) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x9, 0x6, &(0x7f0000001340)=[{&(0x7f0000000080)="da449abb6224c9f47facab7ce93df961286d11f33d610609ad055f49a7a908f83f7eceee0fb53e846a58d7b11ae1e3a869e979d220d494310c103f34e7100263cd2553a60a04dd59a15cb28ed8071ba669df5bef23", 0x55, 0x20}, {&(0x7f0000000100)="69f0cd224e827bec0d5e736857bcaf3fb8ae7a34924ce9ea2d9f6336b4990ed5b0bfe6e54c1921de485742a3e8786dc10253081e1b06aad17e359539d3dc5648b5de6b173d4104734ff72a8cd3a1ad4841fed92d55bd478938f7d77b", 0x5c, 0x7f}, {&(0x7f0000000180)="e9823670970dbddb1246a4da3ee186dc61abd10835a668952314e7da246936693a9353d9d6f06c289dcf15f19bf5d01c86c0e06fd4ed8094320c596751322df03029892fbc56e7983e17c1309ed3df2abc61a4279881995c66170432d008c54a6551a6c856a697512c58f2e4f79a8ac246cf1676a97c6dd56e0e8ee2ffb5ead2a22ee7ef0504e36864d2450486f22b717328c3c42f1a7339189865837632d68b3e6fd6e0badb8d687129c15053bb2616f3598f06a9238ece66d18aeb9e91d1c2484e676d3d07c85796bebaf49dfbccb3f8b09553bbf20c228d0954382236a44e3a2cb2f7d46cb939621fe40a09a31ccbc500", 0xf2, 0x3ff}, {&(0x7f0000000280)="bb80789bc0151afc6787d4f51ab793e5d15e90fbcc", 0x15, 0x1f}, {&(0x7f0000000300)="9dc1409406c008565074e111dfaf09152c4b96cf826f9c5c1d1b8826ea5c62bbc02befd53c", 0x25, 0x7b8}, {&(0x7f0000000340)="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", 0x1000, 0x8}], 0x45a669681d2299e2, &(0x7f0000001400)={[{@utf8}, {@utf8}, {@numtail}], [{@fsuuid={'fsuuid', 0x3d, {[0x64, 0x62, 0x34, 0x64, 0x32, 0x65, 0x35, 0x37], 0x2d, [0x36, 0x31, 0x0, 0x33], 0x2d, [0x38, 0x66, 0x32, 0x65], 0x2d, [0x32, 0x66, 0x35, 0x63], 0x2d, [0x63, 0x66, 0x37, 0x39, 0x64, 0x36, 0x64, 0x37]}}}]}) getdents(r1, 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) 18:28:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 2790.748775] 9pnet: p9_fd_create_unix (15353): problem connecting socket: ./file0: -111 syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x0, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:28:23 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:28:23 executing program 6: syz_extract_tcp_res(&(0x7f0000000000), 0x7, 0x2) syz_emit_ethernet(0x56, &(0x7f0000000040)={@local, @multicast, @void, {@canfd={0xd, {{0x0, 0x1}, 0xb, 0x0, 0x0, 0x0, "03bd754de4f678517d54a987d020c4159c6df9688bfe8f71c3b7eca3430578938155ca696765764fd99c18cfd9896e5db73b22f68c717f9d7357a02cb1feccca"}}}}, 0x0) syz_extract_tcp_res(&(0x7f00000000c0), 0x4, 0x3) syz_emit_ethernet(0x32, &(0x7f0000000100)={@multicast, @multicast, @val={@val={0x9100, 0x2, 0x1, 0x2}, {0x8100, 0x3, 0x1, 0x4}}, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0xa, @multicast, @empty, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x25}, @multicast2}}}}, &(0x7f0000000140)={0x1, 0x4, [0xa3d, 0x460, 0xff0, 0xd96]}) [ 2790.758376] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2790.760985] 9pnet: p9_fd_create_unix (15353): problem connecting socket: ./file0: -111 [ 2790.769594] 9pnet: p9_fd_create_unix (15349): problem connecting socket: ./file0: -111 18:28:23 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) ftruncate(r1, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x8000, 0x108) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) getsockname(0xffffffffffffffff, &(0x7f0000000440)=@generic, &(0x7f00000004c0)=0x80) write(r3, &(0x7f0000000240)="01", 0x1) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000300)=ANY=[@ANYRES64=r0, @ANYRESHEX=r1, @ANYRES32=r4, @ANYRES32=r3, @ANYBLOB="9582327ae947548ae9751c8ab2d8c48078ff5a7d44a67932d5eb1050dfb3a7bcdd0291777e4dcd29904a920437bab6176b962dca4892cc61e9644f458743eca9831d374d42a84f5c5eef886f049e9b", @ANYRESDEC=r3], 0xfffffffffffffd0c) sendfile(r1, r2, 0x0, 0x20d315) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCGPTLCK(r5, 0x80045439, &(0x7f0000000400)) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000002c0)) mount(&(0x7f00000000c0)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='squashfs\x00', 0x400, &(0x7f00000003c0)='[\x00') 18:28:23 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 2790.855972] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2790.857807] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2790.875016] 9pnet: p9_fd_create_unix (15368): problem connecting socket: ./file0: -111 18:28:23 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:28:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 2790.892783] 9pnet: p9_fd_create_unix (15373): problem connecting socket: ./file0: -111 18:28:23 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) [ 2790.991689] 9pnet: p9_fd_create_unix (15380): problem connecting socket: ./file0: -111 18:28:23 executing program 7: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) openat(r0, &(0x7f0000000a00)='./file0/file0\x00', 0x2000, 0x20) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r2, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r5 = openat$cgroup_ro(r2, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r5, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r4, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r2, 0x40106614, &(0x7f00000002c0)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r6, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r7, &(0x7f0000000200)='./file0\x00', 0x86) [ 2791.025124] 9pnet: p9_fd_create_unix (15392): problem connecting socket: ./file0: -111 [ 2791.066050] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2791.084581] 9pnet: p9_fd_create_unix (15392): problem connecting socket: ./file0: -111 18:28:23 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:28:23 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) [ 2791.133904] EXT4-fs (loop6): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2791.208137] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:28:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:28:37 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) ioctl$EXT4_IOC_GET_ES_CACHE(0xffffffffffffffff, 0xc020662a, &(0x7f0000000a00)={0x7, 0x2, 0x1, 0x7, 0x3, [{0x100000001, 0x4, 0x200000000000000, '\x00', 0x100}, {0x0, 0x4, 0x40, '\x00', 0x200}, {0xda0, 0x2, 0x0, '\x00', 0x2000}]}) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:28:37 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r0, 0x0, 0xfffffffbfffffffd, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r2, 0x3, 0x0, 0x18000) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r5 = dup2(r4, r3) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000340)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16, @ANYBLOB="0a73b9aa43c7e1a70c04589b3e554e21a7f3a247d24300018bd2fddf1d991a225d3a28c9ab46cd59d450612f339bcc4384cfce9232a8bab0892a36ed735d4936fddd507965696530515f7e34aa8499fc45c6abf13be4ed1528d1f18bb2f633eb24037d532e639d9c67542f1cec54817f238ff486923d650403f0a7681873cfca11fb8cf0b025edd94ee5d3b1d3fb4e60646747f5c0975e7c62cfa6424d6827210cb91f885a045cdc2c6fd33909416b8fdb0600d5a96ff738"]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r5, 0x0, 0x7ffffff9) 18:28:37 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$EXT4_IOC_MIGRATE(r4, 0x6609) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) bind$inet(r4, &(0x7f0000000140)={0x2, 0x4e21, @remote}, 0x10) r5 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r5, 0x0, 0x7ffffff9) 18:28:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x0, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:28:37 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x0, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:28:37 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getcwd(&(0x7f0000001a40)=""/202, 0xca) syz_io_uring_setup(0x6d32, &(0x7f00000000c0)={0x0, 0x9cee, 0x10, 0x2, 0xf6}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000000), &(0x7f0000000140)=0x0) syz_io_uring_submit(0x0, r0, &(0x7f0000000200)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x2000, @fd_index=0xa, 0x8, &(0x7f0000000180)=""/119, 0x77, 0x12, 0x1}, 0x4) 18:28:37 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000000)='afs\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) syz_mount_image$vfat(&(0x7f0000000a00), &(0x7f0000000a40)='./file0\x00', 0xe2c, 0x6, &(0x7f0000000e00)=[{&(0x7f0000000a80)="9eae", 0x2}, {&(0x7f0000000ac0)="0cbbaa3e6da693379082b011", 0xc, 0x5}, {&(0x7f0000000b00)="cf58a41c8216d0c0c8ba3e8d6431cfcc30395504639b1ba83b1510cf9b0e89f0d5199796fc15040511881e758a0df7f90c69de0f37f200a52225180cd9dc222e262d313432a334aaa9165137c24889edecf7", 0x52, 0x1}, {&(0x7f0000000b80)="6ddc0a9a3a0212be8894a8f8c65125e514879f87dff9e5cdb951a6f741172e0884b57ad214726a88e8c0843d9ed9dc7bdd2fb583dc0e2e0bf0461587ad79b04eb1664825f46bd1855a9a62b6867f00429f18301bba5f700cd2f507a72e77a176547e4b48ae7b09d4564658af9a545c8e4f35774b557fcd0d143610b451392074a3954ff4700b505bb42611ad1b0aabfd342297fede349f056bc855836a6d816d2e56794b62707d3747472713ec872ead03f24802158090a6f6e1202e95bfd919b6d7cb91bbbf94ff36fae814fa3d2bcec3a1", 0xd2, 0x6c}, {&(0x7f0000000c80)="ee1083cd480dcc573c9afd50fd226e703fd7c23d5820ef151af582f531386f1a552cc81c1f2d7e7e03cf510a685f565be6d86dcd394fad7b9e3d2d3fad7e16dc49ce911b642955602079a5b3c757a404c7aed4b353668a2cc1b0684a9d6bb84b4c0a4baa7357425284b66693a892df65d72d502e9e11a59a641574726d64974437337c19", 0x84, 0x139}, {&(0x7f0000000d40)="1ff335392bf29cd8101f82f63ffcdc83e3a8c342b0bc94a70b3487717f0b8b5aeb2e20dce43948dcb92c7272b5f739fb7211fdf69f04cecd2d081c8f26aed765741a37023f7c6559ddd33238be0b41d0fe25c1f405238555114baf38cb58d510ffc0c6caca4b29d1d7339d23656eed8fa5040e64989773ed57f9ddbbb526985c7ca43265d5e909737ed863f8443cbda3b6a501c287d484710e816cc648514ed555f23125ed91d75d", 0xa8, 0xb47}], 0x20000, &(0x7f0000000ec0)={[{@shortname_mixed}, {@rodir}, {@utf8}, {@rodir}], [{@subj_user={'subj_user', 0x3d, 'ip6gretap0\x00'}}, {@fsname={'fsname', 0x3d, '--('}}, {@audit}, {@obj_role={'obj_role', 0x3d, '9p\x00'}}, {@dont_measure}, {@euid_gt={'euid>', r3}}, {@dont_hash}]}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 2804.747016] 9pnet: p9_fd_create_unix (15417): problem connecting socket: ./file0: -111 [ 2804.788217] 9pnet: p9_fd_create_unix (15437): problem connecting socket: ./file0: -111 [ 2804.804121] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2804.810429] 9pnet: p9_fd_create_unix (15417): problem connecting socket: ./file0: -111 [ 2804.832649] 9pnet: p9_fd_create_unix (15444): problem connecting socket: ./file0: -111 [ 2804.887148] EXT4-fs (loop6): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2804.892790] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:28:37 executing program 2: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = dup(r0) getdents64(r1, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r1, 0x0, 0x0) syz_io_uring_setup(0x68dd, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r4, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0, 0x40000021}, 0x0) syz_io_uring_setup(0x68dd, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000040)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r7, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0, 0x40000021}, 0x0) r8 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) syz_io_uring_submit(r2, r6, &(0x7f0000001380)=@IORING_OP_WRITEV={0x2, 0x2, 0x0, @fd=r8, 0x5, &(0x7f0000001300)=[{&(0x7f0000000300)="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", 0x1000}, {&(0x7f0000000100)="16e510c4418dc26ef44788c4044aab8ff7bf04a134dc7256d3b38fc62fb35641063926028d142147a5093aaeec272d29b779322eb22f5692c060c70a4fb3a318792f2a486d98b595171ea3d0a5567369451fe7456bfcd71a13ee8ea88f4792d5c0c80ace6f330c65f4d7e72cf29112ce9fd8636dc7c0ed7684da470cacb508a34167aa6c3255a6085344dc0da1cb9ef4cc7c6c2992e2935aeef137c1438313bfdec419d2ae8f157e17a9b67a062cffe647e8b710eb53684ea5566145cf8723cfdd833a28ecbf04ffaf4f28a266773d182c8e67d95b2059483d4289f7d51a59af542f3b3d8a787114377c89017b428d65d84ee0d3", 0xf4}, {&(0x7f0000000000)="c286565d02652f9f948766ff9cbb0dd551dddd690d3395d603f5574575490652fb840c808ad79eb7907025f951c7064e42e462ee1c8e8151fe3ec3755a3e6b9e34aaa0ee12a346584a103b74452d69ca02256e08fbe35290b4a95204d9eba1c231b7f645322eb7d3b80ac7753f5a67588682510b96fcf5feb50835056b493363f28f6995f7f16a4063fd09fdd290d8c794255030578270c3a476b309d77193fc266d5489db183e85d80e052806694056fff17dad06ff50ef7570", 0xba}, {&(0x7f0000000200)="d16e699548083651f7a72f522ffc228a8f6e80cdff0f5b5b2d8a8d05079998620110f57305dab5c9f865f4d3199215e5429e5c", 0x33}, {&(0x7f0000000240)="68d1579b4091bf309e05cd60a70b11c5ae09901fd760094e9faca614a3724c52ac3ba649f219cf200cdf2a45f7078de0f0edd8ae79e2e99d8d4ab0907785b2b986051856c1a617d1313e4e8633d15378ccf0d15022d4928cb0ec97729b44d9", 0x5f}], 0x5, 0x14, 0x0, {0x1}}, 0x9) syz_genetlink_get_family_id$smc(&(0x7f00000000c0), r1) 18:28:37 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000500)=@IORING_OP_EPOLL_CTL=@add={0x1d, 0x2, 0x0, r1, &(0x7f00000002c0)={0xb000000a}, 0xffffffffffffffff, 0x1, 0x0, 0x1, {0x0, r2}}, 0x7) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r5 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.io_queued\x00', 0x0, 0x0) openat(r5, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000a00)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r4, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c616363656f6e745f6d6561737572652c646f99745f61707072616973652c616f6c7d6578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB="65a4528a44b8e8856323239c78743d726f6f09f64b815c0000000000dd433b51d45f28987df7e2a4e7fe480000b51d2c4eafe94a389c1e2d9ac35d"]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r6, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r7, &(0x7f0000000200)='./file0\x00', 0x86) [ 2804.941018] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2805.002569] 9pnet: p9_fd_create_unix (15457): problem connecting socket: ./file0: -111 18:28:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 2805.130872] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2805.146170] 9pnet: p9_fd_create_unix (15460): problem connecting socket: ./file0: -111 18:28:37 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x0, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:28:37 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) ftruncate(r0, 0xffff) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x105142, 0x90) r2 = fsmount(0xffffffffffffffff, 0x0, 0x88) r3 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, '\x00', [{0x40, 0x0, 0x2, 0x80000000, 0x3, 0x339}, {0x1f, 0x3, 0x0, 0x72ba, 0x0, 0x2}], ['\x00', '\x00', '\x00', '\x00']}) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r4 = openat(r2, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r4, 0x0, 0x100000001) setsockopt$inet6_int(r4, 0x29, 0x4b, &(0x7f0000000040)=0x1, 0x4) 18:28:37 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') recvmsg$unix(r1, &(0x7f0000002f40)={&(0x7f0000000a00)=@abs, 0x6e, &(0x7f0000001d00)=[{&(0x7f0000000a80)=""/28, 0x1c}, {&(0x7f0000000ac0)=""/4096, 0x1000}, {&(0x7f0000001ac0)=""/120, 0x78}, {&(0x7f0000001b40)=""/225, 0xe1}, {&(0x7f0000001c40)=""/173, 0xad}, {&(0x7f0000001e00)=""/139, 0x8b}, {&(0x7f0000001ec0)=""/4096, 0x1000}], 0x7, &(0x7f0000002ec0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}, 0x12103) r3 = openat(r2, &(0x7f0000000040)='./file0\x00', 0x6e4002, 0x40) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r5 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r5, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r4, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r6, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r7, &(0x7f0000000200)='./file0\x00', 0x86) [ 2805.306099] 9pnet: p9_fd_create_unix (15468): problem connecting socket: ./file0: -111 [ 2805.350257] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2805.358062] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2805.382363] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2805.427694] 9pnet: p9_fd_create_unix (15468): problem connecting socket: ./file0: -111 18:28:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x105) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x1ff, 0x0, 0x3, 0x8, 0x0, 0xfffd, 0x0, 0x0, 0x0, 0xffffffffffffff81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r3) write(r2, &(0x7f0000000240)="01", 0x1) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x10) sendfile(r0, r1, 0x0, 0x20d315) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) getpgid(0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x1, &(0x7f00000001c0)={0x0, 0x0, 0x2}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000000c0)=0x0) r6 = socket$packet(0x11, 0x3, 0x300) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(r6, &(0x7f0000000580)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @local}, 0x14) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x4, 0x4000, 0x0}, 0x0) syz_io_uring_submit(0x0, r5, &(0x7f00000000c0)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index=0x6, 0x0, 0x0, 0x8, 0x2, 0x1}, 0x9) 18:28:52 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r3, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 18:28:52 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x58) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000340)=ANY=[@ANYBLOB="6a75a822c0ac0850db0b56149a2b95cb4ff840981ee34c61746139ac92aa32509e9af68e56dbf1fad39232f02c7363d65bababf1e433aea79e30f3d911fa0773a8365f76c5c66daed2cf64b3f5d9c966fab3dfdcfb19d8ce31bf69f7c5e61398d55d065eba58365a7a22aac4b711eca82af043ad0e3a9984109478276ad3d2545c0d46f081a9202ed691cfacc2", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:28:52 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) r0 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = getpgid(0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="240000001e00852e008678d6c5b09e8e00000000000000000000000800000000", @ANYRES32=r1, @ANYBLOB], 0x24}}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000180)=0x4) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_LINK_TIMEOUT={0xf, 0x3, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x77359400}, 0x1, 0x0, 0x0, {0x0, r0}}, 0x81) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r2, 0x0, 0x0, 0x1000002) setxattr$trusted_overlay_redirect(0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) copy_file_range(r4, 0x0, r3, 0x0, 0x200f5ef, 0x1081030000000000) openat(r4, &(0x7f0000000140)='./file1\x00', 0x210000, 0xa) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 18:28:52 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x0, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:28:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9ec) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 2819.996462] 9pnet: p9_fd_create_unix (15490): problem connecting socket: ./file0: -111 [ 2820.047194] 9pnet: p9_fd_create_unix (15503): problem connecting socket: ./file0: -111 [ 2820.064112] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' 18:28:52 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file1\x00', 0x2004, 0x0, 0x0, 0x14a073, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000003700)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r3, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='attr/sockcreate\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000002c0), 0x12}, 0x200, 0xfffffffffffffffd, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 2820.072416] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2820.095863] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2820.099439] 9pnet: p9_fd_create_unix (15490): problem connecting socket: ./file0: -111 [ 2820.109022] 9pnet: p9_fd_create_unix (15509): problem connecting socket: ./file0: -111 sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003640)=[{{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000000a00)="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", 0x1000}, {&(0x7f0000001a00)="31f34ef61e0feec1", 0x8}, {&(0x7f0000001a40)="8a9bc2419d24481354b42c37b1f2f00c426132eb8fb0ca227dafb92ba246001b0e2889f7fb54499b970784b7c20b75aeb99e40679a36c33823a1a1cdc167cc407b6e33e1eca8cdf0b23f1907374b66f39b6d177fd8b25d4194d1cd738f74360866d2c7d9a86667c37358b974ba58b2c1", 0x70}, {&(0x7f0000001ac0)="0c6cf6b19951a42d813bc7845594ff3524cfe7f47dfc19340721c38f6606b68071165d6cc923ebcca69effb6e09347cca33dd855811be0be9f8ec5f3f62da2dc311060051e08bbb99660e8d81f519682ae624a8684fab682cb1228800edb8e6bc54fc45229771c9b1c2a830a73d7946067c94ed1287290fb6492964e97e41cc93a7bf0", 0x83}], 0x4, &(0x7f0000001bc0)=ANY=[@ANYBLOB="2000000000000000290000000400000033000000000000000502084c0000000078000000000000002900000039000000ff0c020100000000fc000000000000000000000000000001fe880000000000000000000000000001fe8000000000000000000000000000aaff010000000000000000000000000001ff010000000000000000000000000001fe88004000000000000000001f0000011400000000000000290000000b0000000000642b00000000"], 0xb0}}, {{&(0x7f0000001c80)={0xa, 0x4e23, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x4}, 0x1c, &(0x7f0000001d40)=[{&(0x7f0000001e00)="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", 0x1000}, {&(0x7f0000001cc0)="b369d2a089fa2bfd6e6f3310ce69c56d6bbac9fc6d92ea97bcb30893dc15532b330d42bc43acc35b2fb878d56ef426a1883aa6d2f0914e4c7e6cdd6688909b3d79515947223a6a9983699e2886aa76ad32713fa24fed93c0856221e74768c65bd211", 0x62}, {&(0x7f0000002e00)="56fd084c1a4afb1da34ad19d2f5a219f3b95c75e07fe046fb64f8adcf1e1f0c18d5bbcebbc9743cfaace2445b1fba6be178742a0cc82fe5fc0ee56c24bcf917556665ada429731368758858c6510", 0x4e}, {&(0x7f0000002e80)="5f0be1a572a4e1369d62cc72229a7e62184843e3dcde076fe178b68eb27c69b9d6a90b4dd240e1d2743eb70d09b98655feab6a630dbf8c645ea7c0f75392f0382c9417e902829fbbd854aca55924e52c01d6869035575ad47cbc0acae94c6c266d2b255158c6e9196a081afe5bc17c5cfdc6f77a6707e0e7753889ee669b26ff09e95545521ba06dd2ac69dde0da105fbcd195abc4e81fcf2563c96a0667b8c0229eb61b71f786b2bd5b1c143a092109b0319e975739b4861e7cbcb61d8ee979d9a157ef9e6098b839043071860123f31ba6e5c47f52f6ebdcfad0cf656dc4d1ce0f9f1b4777ed1a21", 0xe9}], 0x4, &(0x7f0000002f80)=[@rthdr_2292={{0x68, 0x29, 0x39, {0x4, 0xa, 0x2, 0xff, 0x0, [@ipv4={'\x00', '\xff\xff', @local}, @remote, @ipv4, @ipv4={'\x00', '\xff\xff', @broadcast}, @remote]}}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x88, 0x0, '\x00', [@pad1]}}}, @hopopts_2292={{0x78, 0x29, 0x36, {0x21, 0xc, '\x00', [@ra={0x5, 0x2, 0x200}, @calipso={0x7, 0x48, {0x3, 0x10, 0x7, 0x4, [0x1, 0x8, 0x7, 0x80, 0x200, 0x20, 0x2e3, 0x1]}}, @hao={0xc9, 0x10, @private2={0xfc, 0x2, '\x00', 0x1}}]}}}], 0x100}}, {{&(0x7f0000003080)={0xa, 0x4e24, 0xa84, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x9ca0}, 0x1c, &(0x7f00000035c0)=[{&(0x7f00000030c0)}, {&(0x7f0000003100)="56587a3e0e9dcf3a6447b0ee729ed5017a0c2eb2524331d8cd9c0a8f62e4be910ee92b40604c1f2915e611a89b0ca16de4a72a344e07b1518aff72613aadd40959d0c40c54be5ac13ed7437793723f9a12c22a08e29229554c2a1687a82f6a52793e43cd2164c8539297ad0399f6777b021470ef8b00aa10a12de3ab6947596824624bf23495a40a34febc47a35e32ba203df561c9", 0x95}, {&(0x7f00000031c0)="bba70c14539a654e7620df3903745074820f9b6ba4250c01c09a755be34c75a1f5b75e9f7270c3563317167453b7f375b4d2a6b6563385947edbcf85ee7bafcdb2a886dfc02bc899f0167aa96dc0f554398b42cf0726d114e090df9b02020f21fa558f3b25a74bf28a5ec2ee521dc0efdced30e5a72d5db77f59da19fae7f27cdfbd6c951a74755c92b0648987ceff3ba3b7e876b6cf0fe3e266b01559ca543a2770a88e0498d298e84caf0a1cc4403b40f19b99604496294eaceb657a266bc39f1fb254d75044d545d6ab49d708f5f3bf5292cf48cbce206deb36ca80", 0xdd}, {&(0x7f00000032c0)="68cda0ce0c4a2816125a4d2576a97d67c7bebccd2442e8b058c2c2e3ab6e9ad47bbbffdf3bbf04177e9f8fec4ca574c9ac2114d0e621aa046abd97cd542494a87f35bbfe239bc5ff8b68bcafaa21dc623052caa8ef8e7adba608a96047c0bc97105c3b6f21b24cc38570eef9f3ef4575e8066ec58823e55035596e1fd59c910948e719e099681ae98bddb23dbae1acf7ee247299a5a298cbd6c82a215c3b6c81c1b25a045f5a07c6e12310b766fa2777673f1c7f156f80aff834ae43062479d8010904399dbf63cd839c953ee6c4b8a10fdd40512e8bc0239b4a3a6e244ca9dad835609c62", 0xe5}, {&(0x7f00000033c0)="82c8eaf9024961cf0b500d25f2ad51bee17489fd8d08e0c38fc9e2f5b3065cdc0a992b96169f09d4cb7a753bdbaeb80cbe3c8e9b2c27fb0767391ff67af84c42811ccf16a20530d9abbf3293517a5917daa9a8727e76fbc0f3c3a9bdff51742343ad8bb9311c7827402c3855f59a16c713fc5847b054327d8f13fd33ef48f79e3df1fadef6ebcaf195cda4decd546c6c007ad1b773ebcc011cf41bc15fed725b711493729326111319e352be05a569db83013896893083a1ae4dc3e40968f9cbe3ec3d7ed94fb020546768b138e4ef85a2b0a8fe3216c7da1fee1fdcaadd0870c572dd1c04fc78b36344d90b", 0xec}, {&(0x7f00000034c0)="445e62379840f6e6b3f79f1965f87a7e4b825e388c8ce43c85c8091b07c9bfb858465ce2e4e0f5c5408d77e527996809e36f46fe10cc8d44837a784098c4c3ea3f42baaf85616bda304473087ad4ae47a0596d47aa606d623cf802d3803b10229bee6c814a3d0ec9d0f95e1309e3964f9fed86f37f7a7469bb128692f188ce72e10f79770b99f001e0f5e0fb459f1db128216021cef12dbcf93c4ce12176d8f94f60ffd5a64c91c046ac95acdf9dd26ceb0c90661e5ce7b4792230c501e309f2dc1908e2e79628cf9149d5e27659cba5f4443f", 0xd3}], 0x6}}], 0x3, 0x40000) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 18:28:52 executing program 2: sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = syz_open_dev$vcsa(0x0, 0xe11, 0x4000) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x0, 0x4, 0x70bd26, 0x25dfdbfe, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bridge0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x8010}, 0xc004) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000001e00)={0x0, [{}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0, 0x0}], 0x9, "9959275f867337"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0}, {}, {0x0}, {0x0}, {}, {0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {0x0, 0x0}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {0x0}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {0x0}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r84}, {0x0}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {0x0}, {}, {}, {}, {0x0}, {0x0, 0x0}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000063800)={0x84, [{}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {}, {0x0}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {0x0}, {0x0}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {0x0}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {0x0, 0x0}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {0x0}, {}, {0x0, 0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {0x0}, {}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {0x0, 0x0}, {0x0, 0x0}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {0x0, 0x0}, {}, {}, {}, {0x0}, {}, {0x0}, {}, {}, {0x0, 0x0}, {0x0, 0x0}], 0x2, "7c1793b29af822"}) r219 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r220 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r219, 0xd000943e, &(0x7f000004e600)={0x0, r80, "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", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r220, 0xc0709411, &(0x7f000004f600)={{r122, 0x2, 0x4c2, 0x4, 0xbf51, 0x3, 0x7, 0xb7, 0x2, 0x5, 0x2, 0x100000000, 0x6, 0x0, 0xfffffffffffffffd}, 0x38, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) [ 2820.167596] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2820.181048] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r223}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r225}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000001e00)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r224}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r226}], 0x6, "9959275f867337"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r220, 0xd000943d, &(0x7f000004f6c0)={0x6, [{r75}, {}, {r32}, {}, {}, {0x0, r13}, {0x0, r218}, {}, {0x0, r191}, {r163}, {0x0, r206}, {0x0, r15}, {r94, r92}, {r118, r180}, {r67, r46}, {r110}, {r10}, {r132}, {}, {r127, r64}, {r184}, {r152}, {r165, r169}, {0x0, r153}, {r105, r88}, {}, {}, {r188, r24}, {r70}, {0x0, r92}, {0x0, r153}, {r37, r167}, {0x0, r44}, {}, {r200}, {0x0, r140}, {r17}, {r42}, {r128}, {r66, r48}, {}, {r159, r40}, {}, {r29}, {}, {r23}, {0x0, r171}, {r215, r107}, {r16, r113}, {0x0, r36}, {0x0, r195}, {r97}, {0x0, r34}, {r124}, {r101}, {r58, r208}, {r77}, {}, {0x0, r50}, {r186, r68}, {r22, r71}, {}, {r90}, {r199, r81}, {r125}, {r103}, {r93}, {0x0, r136}, {0x0, r72}, {0x0, r185}, {r31}, {}, {0x0, r210}, {r61}, {r211}, {0x0, r121}, {r160, r187}, {0x0, r106}, {}, {r125}, {0x0, r144}, {r20}, {0x0, r151}, {}, {0x0, r108}, {r41, r111}, {r19}, {r56, r174}, {r152}, {0x0, r65}, {}, {r45, r161}, {r189}, {r130}, {}, {r178, r11}, {0x0, r192}, {0x0, r57}, {}, {}, {r182}, {}, {0x0, r28}, {}, {}, {0x0, r3}, {}, {0x0, r39}, {r194}, {r52}, {}, {0x0, r47}, {r216, r112}, {0x0, r134}, {0x0, r129}, {0x0, r217}, {r63, r126}, {r114}, {0x0, r2}, {0x0, r1}, {r69}, {0x0, r102}, {r181}, {}, {}, {r38, r183}, {0x0, r62}, {}, {r212, r157}, {r115}, {}, {r179}, {r150, r135}, {0x0, r119}, {}, {}, {0x0, r142}, {}, {0x0, r88}, {}, {}, {}, {0x0, r176}, {0x0, r201}, {r213}, {0x0, r91}, {r9}, {}, {r172}, {}, {0x0, r131}, {r85, r98}, {r99}, {r143, r133}, {r104}, {r74}, {r190}, {}, {}, {r166}, {}, {}, {}, {r162}, {r55, r8}, {}, {}, {r96, r158}, {r60, r33}, {r148}, {0x0, r204}, {r7, r73}, {}, {r193}, {}, {}, {}, {r154, r26}, {}, {}, {}, {}, {0x0, r120}, {r96}, {}, {0x0, r196}, {0x0, r49}, {}, {}, {}, {}, {r14}, {r93}, {r12}, {}, {}, {r155, r205}, {0x0, r76}, {}, {0x0, r137}, {r146}, {r152}, {r95, r123}, {0x0, r54}, {}, {0x0, r168}, {r82, r59}, {r35}, {0x0, r141}, {}, {0x0, r164}, {}, {}, {}, {}, {r109}, {r27, r89}, {}, {r173, r18}, {}, {0x0, r214}, {0x0, r71}, {}, {r203}, {}, {0x0, r53}, {0x0, r170}, {r138}, {}, {r78}, {r207, r87}, {r175, r46}, {r4, r30}, {0x0, r100}, {r197, r202}, {}, {r177, r139}, {r25}, {r6}, {r116}, {0x0, r156}, {r198}, {}, {}, {r51, r149}, {}, {0x0, r86}, {r104, r83}, {r79, r209}, {r145, r221}, {r147}, {r222}, {r224, r21}, {}, {r43, r117}], 0x2, "a6eaa05d005b9a"}) sendmsg$nl_generic(r220, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) setxattr$security_selinux(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000200)='system_u:object_r:tmpfs_t:s0\x00', 0x1d, 0x1) inotify_add_watch(r0, &(0x7f0000000240)='./file0\x00', 0x8) 18:28:52 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000a00)={{0x768, 0x2}, 0x100, './file0\x00'}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000bc0)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',sootcoot,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) setxattr$security_selinux(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000b40), &(0x7f0000000b80)='system_u:object_r:root_t:s0\x00', 0x1c, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:28:52 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) r2 = openat$incfs(r1, &(0x7f00000003c0)='.pending_reads\x00', 0x80, 0x172) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000400)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:28:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9ec) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 2820.302873] 9pnet: p9_fd_create_unix (15525): problem connecting socket: ./file0: -111 [ 2820.314691] 9pnet: p9_fd_create_unix (15524): problem connecting socket: ./file0: -111 18:28:53 executing program 6: io_submit(0x0, 0x2, &(0x7f0000001680)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x322, 0xf, @perf_config_ext, 0x0, 0x0, 0x1002, 0x2, 0x0, 0x0, 0x5, 0x0, 0x805}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000340)={0x53, 0x0, 0x6, 0x0, @buffer={0x300, 0xa3, &(0x7f00000005c0)=""/163}, &(0x7f0000000040)="4feb7dc9066b", 0x0, 0x0, 0x0, 0x4, 0x0}) [ 2820.325684] audit: type=1400 audit(1682965733.046:25): avc: denied { associate } for pid=15522 comm="syz-executor.5" name="ssh.service" dev="cgroup2" ino=942 scontext=system_u:object_r:root_t:s0 tcontext=system_u:object_r:cgroup_t:s0 tclass=filesystem permissive=1 18:28:53 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) [ 2820.391992] 9pnet: p9_fd_create_unix (15539): problem connecting socket: ./file0: -111 [ 2820.395792] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2820.431709] 9pnet: p9_fd_create_unix (15524): problem connecting socket: ./file0: -111 18:28:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0x2d) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:28:53 executing program 6: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='macvlan0\x00'}) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)={0x50000004}) r2 = socket$nl_generic(0x10, 0x3, 0x10) ftruncate(r0, 0x1000003) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2, {0x3}}, './file0/file0\x00'}) r3 = dup2(r0, r2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x1}, {0x0, 0x4}]}, 0x14, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x212801) pread64(0xffffffffffffffff, &(0x7f0000000140)=""/4096, 0x1000, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') pread64(r3, &(0x7f0000001e00)=""/4082, 0xff2, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r2, &(0x7f0000001140)=ANY=[@ANYBLOB="2321202e2f66696c65300d391349ba9a8a544b79db9571789386654d3862620f4c0945f4c1ab316afff20c36903d92930111596441c51b90a5fae5e374cdaff5d3ee"], 0xb) [ 2820.511214] 9pnet: p9_fd_create_unix (15552): problem connecting socket: ./file0: -111 [ 2820.519823] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2820.521800] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:28:53 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r1, 0xc0189373, &(0x7f0000000180)={{0x1, 0x1, 0x18, r1, {0x21}}, './file1\x00'}) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000a00)) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) [ 2820.582214] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' 18:28:53 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x6, 0x1, 0x0, 0x40, 0x7, r1}) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x7, 0x5, 0xff, 0x0, 0x0, 0x100, 0x30004, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9d1b, 0x1, @perf_bp={&(0x7f0000000140), 0x2}, 0x0, 0x3f, 0x0, 0x3, 0x9, 0x1000, 0x70e, 0x0, 0x1, 0x0, 0x100}, r1, 0x2, r0, 0x9) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r5 = dup2(r4, r3) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) getsockopt$inet_udp_int(r4, 0x11, 0x1, &(0x7f00000003c0), &(0x7f0000000400)=0x4) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r5, 0x0, 0x7ffffff9) [ 2820.597312] 9pnet: p9_fd_create_unix (15556): problem connecting socket: ./file0: -111 [ 2820.661896] 9pnet: p9_fd_create_unix (15561): problem connecting socket: ./file0: -111 [ 2820.688262] 9pnet: p9_fd_create_unix (15563): problem connecting socket: ./file0: -111 18:29:07 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0xe2a, 0xdf}}, './file1/file0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x2400, 0x5) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000080)=ANY=[@ANYBLOB="2301202e2f66696c65300a"], 0xb) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r6 = dup2(r5, r4) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x9, 0x4, 0x5, 0x5, 0x0, 0x7, 0x908, 0xc, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x81, 0x2, @perf_config_ext={0x7, 0xf7}, 0x200, 0xdf, 0x100, 0x7, 0x6, 0xffffff73, 0xffe0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x8) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r7, r6, 0x0, 0x7ffffff9) 18:29:07 executing program 2: sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x24, 0x0, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @empty}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}]}, 0x24}, 0x1, 0x0, 0x0, 0x81}, 0x4000811) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x118) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[]) mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0x30) mkdirat(0xffffffffffffffff, &(0x7f0000000340)='./file2\x00', 0x13c) socket$inet6_udp(0xa, 0x2, 0x0) symlinkat(&(0x7f0000000000)='./file0/file1\x00', r0, &(0x7f0000000680)='./file0\x00') renameat(r0, &(0x7f00000001c0)='./file2\x00', r0, &(0x7f0000000200)='./file0/file1\x00') openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000100)=""/197) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x4000) lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=ANY=[], 0x10b, 0x1) syz_open_dev$tty1(0xc, 0x4, 0x1) openat$full(0xffffffffffffff9c, 0x0, 0x1, 0x0) 18:29:07 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9ec) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:29:07 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="4b0e7f3dcd000047ffff878100000013ece300"/33], 0xb) fallocate(r2, 0x3, 0x0, 0x18000) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r5 = dup2(r4, r3) getpeername(r1, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10008c4, &(0x7f0000000140)=ANY=[@ANYRES32, @ANYBLOB="8e9895b7af7869e9a283b8269cbe638da8864fd98ba531c9f5f53b4789280de353934afd5034019289db542bddf39313c0875294c4aebeccacc460252cee5791058ef2a3fd02b38d7f00a9721c966858c742874ab9000000", @ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r5, 0x0, 0x7ffffff9) 18:29:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000080)=0xffffffffffffffa5) openat$dir(0xffffffffffffff9c, &(0x7f0000000c00)='./file0/file0\x00', 0x450000, 0x60) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000c40)='./file0/file0/file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280), 0x1000002, &(0x7f0000000240)=ANY=[]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$nfs(&(0x7f00000002c0), &(0x7f0000000a00)='./file1\x00', 0x81, 0x2, &(0x7f0000000b00)=[{&(0x7f0000000a40)="8927eabd", 0x4, 0x80}, {&(0x7f0000000a80)="328f10448d6067f5396d430147be477959e06c4c062e1c6ec019c4771288500dcddfb171c48d4009e223ed372abf71f986d30a4164e5f0853af883ddac595cbb58292d2506dc7e6c3d5e09e7ed7a5486", 0x50, 0x101}], 0x21a2010, &(0x7f00000003c0)=ANY=[@ANYBLOB='cgroup2\x00,\'[,smackfsroot=9p\x00,euid=', @ANYRESDEC=r3, @ANYBLOB="1466e8ee5a9d723ddbab4f5109bdd890f897afab15b55a3e42b577bf905cfdc9d34ab00b90ba221e32fe63156e6265c315167bb1042ee5d77126b297de20353f9e54", @ANYRESDEC=r3, @ANYBLOB=',subj_role=,subj_user=,measure,dont_measure,appraise_type=imasig,obj_type=ip6gretap0\x00,\x00']) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:29:07 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV4_HTHRESH={0x6, 0x4}]}, 0x1c}}, 0x0) r1 = accept4(r0, &(0x7f0000000100)=@alg, &(0x7f0000000000)=0x80, 0x80000) r2 = socket$inet(0x2, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000040)=0x2284, 0x4) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev, @multicast1}}}], 0x40}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000001480)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001440)={&(0x7f00000001c0)=@delpolicy={0x1278, 0x14, 0x20, 0x70bd28, 0x25dfdbfe, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@empty, 0x4e23, 0xff80, 0x4e20, 0x5, 0xa, 0x20, 0xa0, 0x2c, r4, 0xee00}, 0x6e6bbe, 0x2}, [@algo_auth={0xe8, 0x1, {{'sha224-ce\x00'}, 0x500, "80e49bbdab213a9d5a72c5586a67cd7be15567e289444024fcf0a9f248a74e5c56b876d60c7a52f062dd83564a6b230d1fd3bcd07fbea298f16e53e93db6c690c2af3f4a6d1561b40a1ca205a1bf30d3bbad87f0d599d080919a213c9fdd1525e4eb7062416af04af94482e73537b030931a07a603d0846dfc942616ac32ff1767b9efe80e554b180ebfb21636a2c47135c35df1840f138f67620f962bcb5b97"}}, @sec_ctx={0x47, 0x8, {0x43, 0x8, 0x1, 0x7f, 0x3b, "edb199a75feed55fde24ac5ecc625504dac65b795421af8abab8a97b13af7b765b1d4ab34c438b78f477063b4945d9ce507a699ff848848ff9d9a3"}}, @sec_ctx={0x100c, 0x8, {0x1008, 0x8, 0x1, 0x5, 0x1000, "e36daf95bebbcddb24f9761b421bc81d9c7ff551d2be71e3ab7b691b307ae5e5c50495a9fa01c51320c8c15a250545f32b5f7ab6d810abcb6b90a6eb52b8d06ef04ea42b0952c581a6f656828f55b60ec7e3f451e401c35388ddb9a4c1733fbb6d3fe3e7aed78bdac6c16b35243e5010d7fac0c40eb513ef82f79c985367c38ae4cf63be3428321b4aa1c39740ee0b030956aafb1d675066cf6e6f5c7ccfde67609200a7307d7e8b666996198793db3c9904918bcec1eb57ee7c70b728603ac08399b0802f04407a2a34d4e073f80e2d717a31ac188ad53964393149f527fc352b83d378d87f17350447f9be1f72153f682bbe17a4f9457a55d5e3e5690596d238c8bb8b2bcc65fbcf396a693afc66291f2799148057e8cad3cd1d30940acfba12f3296cb738a8576005337bf8437225486a87c9a6497d3eaeb4be57e0c484be07d5377df331c34d2b3a267f8a9c238c7be63a1ae3b5598c94a7eec2dfc3bdebc405627c2e8582a8ef4589dade5eceb281c6a94ab52ab8e041a94aaf75483a40bac94267136a0ccc65580417eb44caa10d3a19cee2424805d81a218239d9e07a56f29361c2ae2900a619db84bd31dafb096633bfd703382b13563f30ea0824755dd5a46ea0f3a6d6c751bddba7735a7e426bcee8315f985a81d037a564e1f5a354882664ab2ff18f284d4786950d35bbe742ba763c4ab5da92f5cc08d1afd9774fff5689723cafa9aab7595c4cb761158a5a735ec6197efea22e2740c918211388eb8aee195b1d444428eeccba4ec2783625a2a4e31255f20bac49bff3ecba796192b06197f7c3e6dda6fc43e7d99e2739dcdf7b7a168cff61f01a86307f5307fa2a7bf9d6b0907e850bc231dda8e05a6bb956353b9f682d235861b955c44494b6176fa44c7a3dd9a902036fb5bb3c66a0357f1b78bf36785d0c4456cfbbb2baefb2662220a7c3eefc2e9db0d8efe7a85d4a4478638501b2de5fbd9df8fded473aed4de29663deffed7e8b636f3b19fc6f1e9ab224b4e329ce64e911426bfd3e4ea52a0311647be2fc4567779470e4fef9fe8344ccfc95c1fd97aac3557374964de7e9ebf4bbd51b44290f539badeb737be08a254b5e939e251b6e82bd8677e5af3bdba2620693a832770e9b38d846938eba97a279ef94827d7571e3f4b683edfc0a9e7a23fa47593a046a6831082b23a41fa9555add7118bcc18c65487dabd6f0f5670b48df125b38cc59558397a9732e933ffb51be7b644ba23b563bad63f34d94260d6de4f7c93257d359fdc7e98dff3ee016edc9b9eb8d685ae3343a79443bd7b3734c3b0d62b2838bcef3f3482ea02acc49d87a345895ebf17d7495dbabadc0c772fde52df1f8673a9cfcc7af6e0ee438030c4f431fa8372e01aca97cd3c5b286ae1d30804981d37bd4560c0c0b7967740c46596953fd1dc7a15174ea3af18d6045f2f5fc3bdad91c67f52f6e7efc80a6c0ef2de7e8728359f95cc0224949204f2b18f2355aefe3f616f61705ba507e230c01fb6114796a1d737c2e7b9a1bb41e43d16b7ebdd0c4fc07f029716b2fb681dbc5d9d4da4f060d3c170b807b22faa91c910a861cd0161dd81da993363163532d24c6deb489600c236da5ab315fb88258576f03c08c396ff5a5fd259918f0390a20c3d602757b16c745b8404b1faf9f780eb1b097928aab41bdd262b3201b532d89d83a6e52cd09bc4e47fa42581b24a2fa68f8b963581cce2554ef476504f503126612514959218f61405b66857e88847d4929ed22aba7e3bde9101c0845cdfe6d54a8de55c6294b8f09c7fcbddf8a94b4094766819ace9f91381c48853505c3cbf4a8da9b98761465e277a86b4a633d24cd2cd467fee7c93475bc9268e3d273dffb1b04bfd9f43982f35653607b8234717ddd5d59e1e2b1e4612c75999ef9ea3f672c7b557a88517a65c0be5219a275969bf418035e5aa8e9037efb5cad1ff57a25a9ab373f99da5f948f43710d05b634b76f102c98fc45fcb43839ebf65bfb47ecf28036fd1d63ab29eb22a4b76a5d04671d1107e0e448cf71dbe56bc805fa557fc96c581ef0f3bf69a952a988269c0d9b34733bac228d54f7ba29d69817756175cc445c9eae587b88483ddc8c1263e7092f45a91db21e574bcd5aa56695764d3635b7557d8fdc1e362d4cf3bbb819397bb75b61e1951d3ed73767278a28630fe862dd51721742356de4ca084ca802a9f9e5a041d63572db1450868da34d6f8d68edd40b95ff9373b0498244ee92f0a460449dd73bad4a458fffcfbbd487c88edad0da7b21823326cf9b1d02f9e4ebe03ca3065471e27d81e9e3bd3ff9da91a27d84679c5d58b7690c4dc71cabd838e7b080998f2e568ff2654fdfc1951907b195cbe87a490c7973784f53ed0a3a2d66c6a9c24532050e8d1d941bd925923036d9426c18141dfb534fedfee014e49605db9c9a8376f70d9d539fdab6fdb64a62eb50bed347d09032ff2819e258f06ee56436587dcb945356a122612d16963227be0ca4c1bfe4f8d69896ec0a45dea327fecdc74100be4cae80ea4e6747e942f273e90a286b9ee364391a90824b2c22cb07a1c5356e413d9725b44acefe4fba68bc4b2ffa636597b2367bd6041527cbb9b7551080b379bc7d83cd51c712ed00454c3e9a6301863d540d8cbdae46693cd2d541527549c1136b4317205307bdb0e088163f9fcb85475ff9924f08a337fe5ece51eb6583268c2d269eb5abee1fb83403b43f728467d88348b8af5a44ca8a848ff325c95cfbf0daa0ede8f2e6f57a959241fe3dce8480734ddce6347b9b28cb2bf245cb73bd07ffd24b49abff0a5fbcae87d4da1c5057a22d9610e7bcb3ea01d2fc7d56d08ccc446a3814103d54385ad7e56c569b2f3f7c42c4c71898739b9a44cf1385a508b36ab27d01b50f403323f16a25e632f47eb557d293d78de3f6de27e725b64af8f2da1e62f0289ac18e98974cfe64e3c7bdc5df6291d6e06237c49701f44cad81bde27f91203c9a8b7501ee6eab8d108f97f3aacfc00d802c267bfca7a07cf81ec5148b74b347d7a9782434b292c58c8cf7804f0d206dfc0966a9c6295815d53d615cb0801ff35513c4664ca35d806517993d76a8e3a43edfc31879a08b7a1fcfad6882187484e20c586555696e474c9021bf76beefe2d6d2d5b6389996701f4c0669570a1be00f0c3da64f928ea3232a26134c9a67f58438f20f3c47170230ab43bcf10c58a601c36580cdba77c76249004494be261f4b6abbfe049a2a9f5ba9bc5c115d9dedaac8aa74dcb1e827a2a15b0357b05d1699a6450fbf8bed9bdd3f92d1553288908dd746e12fe5bb6c87da2bf2023844491808a6f2cef0c9caf8371d5fe84090a76d1389f5d03cc2b430a55856786c9c661b3db273cfb6b0ac4c5d3e17def93708f6c21f9a6506cf0c1adb82fe2e1bf7ff74fa7580c6f9e80107c9231c359adc1ebcb77223f4f523bb7b6cf097d78785341a21cc7bbc5c2411fa22941c0ac86ff6913e24105713048c015d23baf440c7bbed1edf2ea7a7dfb80860fb65d79611f7a086b35ecd783962f566ab00fca712bf170d6b0cf73af712c9b0574cb2014656153c6cf5c37cba9b6a092e8c75a1679c708c48f474f284d4c25324a0327db00d14c5ff4d4002d7f923dc1d0a39f8921988d393d566227c5be4a9a02e4fa05c5d20f862f39693650aec35e1bf68651a454478d818deac3b8bf9541f962a1748829d51637dd73b4764f937b45f23af59281b08adcec5e4c168bce40f0ad47a21aba64e60a3def59ce2a1ca1296ea71d0c4ebeca146818abd1a040db5a0611f4391c003930cccc45ecbc8c48f037fc670bd81f47b0924e841d03d384e7029f8c41fc08f23bbea67ea35a091153feccbd5f023b7b921b7f890fcaac671ae2fa7889e64664313e1396c6b44ffe14b72f7040d0107307988258d0e9f56c35c801b9a68d2dc73b8b055bb5d2962eecef496a58436d855e5964ef7da6a1771b1a4e9254aa9c9f29d5ee339d164e4139a5e225f87e0ea7b38e7d772f6452945741555d8a126c67ae268f5c5a0860bbdecc8b796e09613089f3bad9596b530f1d3ccc00c1c08aaf9a5d355749ed4f999b354503693ec584f671702daa20eb694c5bdc19c04f0c57d8a80ad0b640917e867bb3190bb52eb5d1f2fcc917a21339b67c973025e9c32ced02b3cf645f430ffb8d8a5685c9a66f562fd968e5603e52478430f6eded00be94c46e69c7176968fc7dcc55edf5c7203f2719a133692dfa9f33923d4ccb342521e278704aad82dc5a0ca26a6fd99d9e7090dc93b7335681c16e54f16c1c5732a246eabe1097b90ee9ae40550b48a9f583014d566b67fbd7ff896648d36c25ae9acf99adbf8378ed265f16ba4136988f799453d9b42315f4aea317019000e934949b02139685df129421c2814efaf91d3711d60078e50de5770ee0e0eab1c0308cb1bf648009fe3bc6674345d7ca9519f6d98582937f1f99acb30055e4b59eca68f6aeffbfe7e2bc0cdbd4fda25d7849be3acfd08ef0eaa463708188fb1b4b5dff4b395d67eaf03f303cde3b847d6744aac7d67c8ef9914c629d0212706adfde4cd9d44fb888eb74548279d3789e77dd9af30074f585586a16341fe71052ebc16e1e70e7db500a575946509e8bfb85489d4a8e5a109b78ecd26c00db867002ce6b3ce6b940338c56b9bdd560c97b5407d4e0db07c1f42c9001893a9241044ad5a4297fe0a074795fd6cc46c55b0ee7c7ba1a58a9786bea93c010c7a0a0979ad9bd8d3b2a9e04113abbce2357e1a073e0cd16e3e30d9bf204daa5db691e6cb234a83c7d9bd30f13eac4c069393448471e99f1a12d0b31710956150997f07469beffd50d2298d1b0493f8ed908c3e35d5248e66dde54128c4a0d62295f101eb516703d8719d8efbcc960eef9ef926c4bc541ba1492b8caea1d6c0c4da00c1f1cf1a1e01f1059de932c81a7a07b5145ffd65fcd078e7093e237d0209c4a1284f6408595c3c6c58703ded5c95d2b9c3f08bdc45ae79899ee99b0d3e07686784f28725b4109f2a9639b746a6cc286a52cef58fe44a5dc198e95c3dafab4c35dca39f8dc335aa21f3b5d191ddddf2898183489fccddab349de6f1883690983808f3409aa328a93470b384490628b377a4e360b7a9a10e26df495d2a910bf9f6438e32637b7d5047ab69aebb32afae6b1b8523535e592d8f3cee713742b194ca559f6d1ee23af50b0841ea7586cdf5ace88f3d35343bec145bed66efc46807909bd17e1ed5afa04643325206bcfe3785a092bec38463df00ee6c523c841dfd491529cd877011ea49ca6f6b084af52257a913903db3762b28f79683fef820d8520e00068dd0ebcc766635fff13a52e4ea78adea47b456652c7b03b775f57524836e78d07f8fdb84f739a1dc9fdb22c0af3ef93c34a21bd98fc4ab00e017c8f32f1850b2c32c2846e64f4f2ea5644ce3d51c5a7c4ebeca850277795634d2db4ff7b73d9a2a87db5a6035425c85ee407858f15d7c144389cab2ecfe81aa0914e01a77d1c914851436115ea4b4f907e71791ab840b81702bf96f89756ac64edcd4bfafc8e066ea5d6434d7d1ecdefcae0644b8d21b0ec36dd17bcab17eec8101d7fe26962b1609e6e5cd566f9922d2f9e72298dade508d14df79056480fc64728f1d51c3dc428a5d2110f12d199f4318b142ce87126ca183e29e61da04cc58e474299d45028e8e85a0b944fc297ceb89ad1688e32595f3add10d9f2ad5d514d043e5d5ca14ee2026f4f4274799c665946e4b"}}, @offload={0xc}, @algo_auth_trunc={0x57, 0x14, {{'vmac(sm4-ce)\x00'}, 0x58, 0x60, "258062d6abfa37de73b567"}}, @offload={0xc, 0x1c, {0x0, 0x3}}, @sec_ctx={0x79, 0x8, {0x75, 0x8, 0x1, 0x6, 0x6d, "60ad5fe3d6cefbbbe164a4541cf4344a11ceb61a4dec245b0647a341655543f868ac439692011bc85a226e94e60f37f96cbf376da1422f4efa851434787ce1864dd4b8170cc416b4992a2ecbef2ab0cb3d59cddd5b8be2b31fb3ac12ddaba375173b9cb8ed5dff63645c51d7e2"}}]}, 0x1278}, 0x1, 0x0, 0x0, 0x4004004}, 0x8000) 18:29:07 executing program 7: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:29:07 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) [ 2835.108161] 9pnet: p9_fd_create_unix (15587): problem connecting socket: ./file0: -111 [ 2835.114545] 9pnet_virtio: no channels available for device ./file0/file0/file0 18:29:07 executing program 6: socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x9, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') r3 = eventfd2(0x8001, 0x1) ioctl$BTRFS_IOC_DEFRAG(r3, 0x50009402, 0x0) dup3(r2, r1, 0x0) preadv(r1, &(0x7f00000013c0)=[{&(0x7f00000011c0)=""/119, 0x77}], 0x1, 0x1, 0x0) r4 = fcntl$dupfd(r0, 0x0, r1) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/kexec_crash_size', 0x22902, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000300)={{{@in=@multicast1}}, {{@in=@initdev}, 0x0, @in6=@ipv4={""/10, ""/2, @private}}}, &(0x7f0000000400)=0xe8) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/packet\x00') dup3(r6, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) timerfd_settime(r6, 0x0, &(0x7f0000000180)={{r7, r8+60000000}, {0x77359400}}, &(0x7f00000001c0)) copy_file_range(r5, 0x0, r5, 0x0, 0x6, 0x0) [ 2835.135239] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2835.156645] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2835.181102] 9pnet: p9_fd_create_unix (15587): problem connecting socket: ./file0: -111 [ 2835.212952] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2835.259075] tmpfs: Unknown parameter './file0' 18:29:07 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x0, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 2835.264061] 9pnet_virtio: no channels available for device ./file0/file0/file0 18:29:08 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x3a, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000001e00)='./file1\x00', 0x0, 0xee01, 0x1000) openat(r3, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mknodat$loop(0xffffffffffffffff, &(0x7f0000000f40)='./file2\x00', 0x2, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) [ 2835.363172] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:29:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r3 = dup(r2) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000d40)=ANY=[@ANYBLOB="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", @ANYRES16=r0, @ANYRESOCT=r3, @ANYRESHEX=r3, @ANYRES16=r1]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r6 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r6, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r5, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r7, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r8, &(0x7f0000000200)='./file0\x00', 0x86) [ 2835.390200] 9pnet: p9_fd_create_unix (15613): problem connecting socket: ./file0: -111 18:29:08 executing program 2: sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x24, 0x0, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_MGMT_A_IPV4MASK={0x8, 0x8, @empty}, @NLBL_MGMT_A_IPV4ADDR={0x8, 0x7, @remote}]}, 0x24}, 0x1, 0x0, 0x0, 0x81}, 0x4000811) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000002c0)='./file0\x00', 0x118) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[]) mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0x30) mkdirat(0xffffffffffffffff, &(0x7f0000000340)='./file2\x00', 0x13c) socket$inet6_udp(0xa, 0x2, 0x0) symlinkat(&(0x7f0000000000)='./file0/file1\x00', r0, &(0x7f0000000680)='./file0\x00') renameat(r0, &(0x7f00000001c0)='./file2\x00', r0, &(0x7f0000000200)='./file0/file1\x00') openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) fstatfs(0xffffffffffffffff, &(0x7f0000000100)=""/197) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r1, &(0x7f0000ffe000/0x2000)=nil, 0x4000) lsetxattr$trusted_overlay_upper(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=ANY=[], 0x10b, 0x1) syz_open_dev$tty1(0xc, 0x4, 0x1) openat$full(0xffffffffffffff9c, 0x0, 0x1, 0x0) [ 2835.506143] 9pnet: p9_fd_create_unix (15618): problem connecting socket: ./file0: -111 [ 2835.527319] 9pnet: p9_fd_create_unix (15619): problem connecting socket: ./file0: -111 18:29:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) [ 2835.669260] 9pnet: p9_fd_create_unix (15625): problem connecting socket: ./file0: -111 [ 2835.686737] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2835.862167] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:29:23 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file0\x00', &(0x7f0000000500)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000a00)=ANY=[@ANYBLOB='trx,access=user,debug=0x0000000000\f\n0006,dfltuid=', @ANYRESHEX=r3, @ANYRES64, @ANYRESDEC=0x0, @ANYBLOB=',rootconteht=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) getdents(0xffffffffffffffff, 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f00000002c0)='./file2\x00', 0x11) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 2850.469459] 9pnet_virtio: no channels available for device ./file0 18:29:23 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) sendfile(0xffffffffffffffff, r2, &(0x7f0000000140)=0xe6a1, 0x2) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:29:23 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="00bb0850db0b56049a2b95cb4fe840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:29:23 executing program 2: rt_sigaction(0x1e, &(0x7f0000000080)={&(0x7f0000000000)="035e9ed8f5c4a19915589c46d9e50fae1ac4820138b30c08000047def5f22664db958d6f0000c1efeec4c20198fb", 0x3, &(0x7f0000000040)="3666460f73ff00c481e1f5d84a98c461f5f86d042666460f5f1ec4010d73da032261002e66450f0fd7b4c2a24f41f6a7069c51d1", {[0x4]}}, &(0x7f0000000180)={&(0x7f00000000c0)="c42379177100093e66430f57910f000000c481fa5f505f8f4970944b0bc482c0f39a010000000f01fbf044835e000ac4419de494ee08000000c4a2f5a7730a47df29", 0x0, &(0x7f0000000140)="c4e1fe5b730a4e0fae88833c0000c461d17dd4c4a2790fbef462d9dbc4a1f951c2382d09000000c4e159e3fdf3470f5c794cc4c1d816ca4520fa"}, 0x8, &(0x7f00000001c0)) acct(0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$BTRFS_IOC_SCRUB_CANCEL(r0, 0x941c, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f00000003c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000380)={&(0x7f00000002c0)={0x84, 0x1, 0x2, 0x301, 0x0, 0x0, {0x0, 0x0, 0x5}, [@CTA_EXPECT_MASK={0x3c, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @ipv4={'\x00', '\xff\xff', @multicast2}}, {0x14, 0x4, @empty}}}]}, @CTA_EXPECT_HELP_NAME={0x9, 0x6, 'snmp\x00'}, @CTA_EXPECT_MASTER={0x1c, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}]}, @CTA_EXPECT_FN={0xa, 0xb, 'Q.931\x00'}]}, 0x84}}, 0x8080) close(r1) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000400), 0x612403, 0x0) sendmsg$IPSET_CMD_RENAME(r3, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x34, 0x5, 0x6, 0x801, 0x0, 0x0, {0x2, 0x0, 0x8}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x80) r4 = signalfd(r3, &(0x7f0000000540)={[0x4]}, 0x8) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000580)=@IORING_OP_FALLOCATE={0x11, 0x5, 0x0, @fd=r4, 0xc2, 0x0, 0x387, 0x0, 0x1}, 0x6) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000002040)={'gretap0\x00', &(0x7f0000001f00)={'erspan0\x00', 0x0, 0x1, 0x10, 0xf9, 0xfffffff2, {{0x3e, 0x4, 0x3, 0x3c, 0xf8, 0x67, 0x0, 0x4, 0x29, 0x0, @multicast1, @broadcast, {[@ra={0x94, 0x4}, @end, @timestamp_addr={0x44, 0x1c, 0xb1, 0x1, 0x3, [{@multicast2, 0x100}, {@dev={0xac, 0x14, 0x14, 0x44}, 0x2}, {@dev={0xac, 0x14, 0x14, 0x24}}]}, @timestamp_addr={0x44, 0x24, 0x71, 0x1, 0x8, [{@multicast1, 0xffffffff}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x42}, {@remote, 0x1}, {@dev={0xac, 0x14, 0x14, 0x16}, 0x21}]}, @end, @cipso={0x86, 0x43, 0xffffffffffffffff, [{0x5, 0xa, "f423f6690cec8ae8"}, {0x5, 0x8, "57a5d2de6190"}, {0x2, 0x6, "91f9a671"}, {0x2, 0x7, "87fa6c0278"}, {0x0, 0x8, "7f22cceb6e63"}, {0x6, 0xb, "899a5bbd47abcdba7c"}, {0x5, 0xb, "772c19edb7e34fcbed"}]}, @cipso={0x86, 0x58, 0x3, [{0x0, 0x3, 'e'}, {0x1, 0x8, "b8ff9ed0e165"}, {0x1, 0xa, "614d8c5ebafe47a4"}, {0x6, 0xd, "56bfe5fdd89d295813357c"}, {0x1, 0x10, "e819047f360df0819c3b32293174"}, {0x5, 0xd, "be47316fc6038239fe9c7f"}, {0x6, 0xa, "996310566b9e4323"}, {0x0, 0x9, "74d71557408319"}]}]}}}}}) sendmmsg$inet6(r0, &(0x7f0000002240)=[{{&(0x7f00000005c0)={0xa, 0x4e22, 0x1, @local, 0x2880}, 0x1c, &(0x7f0000000780)=[{&(0x7f0000000600)="08b9546ba339facad3a9d9e1e2b539ea67d63438db06acc38f3cd93cf52c1e8650dfa67eeed9d46a0f565cb6084fa3b34f77d5b1fa721877221471da450a29900695f35b89cd088c3bfbec66da06e77b70597f86e0db9f52d527d5a3268aed12e60998641cb6704f60fc15176656c94c72f1c0a359d7fb9075ab09548ad9c2589dc63b5e86af28e34dfdfbf4481757d157f9fe20851db714e9525b5d3d86e21c5cff01f714da329f96aed176dab78bbf028c3fc68111a79efa94408f95142478f7155c5a0472e5efdc9216ded6f371b22378908c9c946f359c906f8a04a7915609550800c60f", 0xe6}, {&(0x7f0000000700)="37bbb5bc84faa461782ea7da74894e4c464c01d5d2868a6d1d88bfb4485d60fb3bf7edf8dd207f6c1a0cef41e51b008f54f18642ee0ce0f88afe936a5dac5b9339", 0x41}], 0x2, &(0x7f00000007c0)=[@rthdrdstopts={{0xa8, 0x29, 0x37, {0x67, 0x11, '\x00', [@jumbo={0xc2, 0x4, 0x1}, @generic={0x4, 0x82, "99147d0080e186d6f6010fb8344c6e57f69556a3451eac3e691f377304680a33cb4fcb7357aaab9abb71ea7c13ed1ba450ce24335933839e41c1a116fe39beecb8ef8f11806232de635bba8fb64e6432cc3ce82994a1811c790125bd5e7795bfe7f11f7a6c605a77563730fd3317c37da3512d027254060a3585fc307bacd38ef281"}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x2816ee8e}}, @dontfrag={{0x14, 0x29, 0x3e, 0x3f}}, @dstopts={{0x128, 0x29, 0x37, {0x2, 0x21, '\x00', [@ra={0x5, 0x2, 0x2}, @jumbo={0xc2, 0x4, 0x9}, @generic={0xff, 0x6d, "2f25d81cafb95e2b0a1fbc63e5d15d7c77dcd894247a7cceae1c1bd4e764914cba93dafa0f6495bd5051d50e1bb9f656ba8307f6732604c0a95137445bea4ced7a6211bd012b1757aeb8ed26c7a0842409dd664f0f3665c6a1e0cd49b3043318a574838cc4b9e86912c325aaf6"}, @generic={0x1, 0x90, "2077eff78e201e5821dada9c420fd1fc8e029483e890e78f71ccf294999229a28e43af8f39a691645466760f6fe62a07063394d30c246d854b954b41bfbb9a457564908ee7f67fe9a02db7f71b9fc29071509336fe9ee02443e33db0289959c27c636e6a1e718c4e48a26c6d77e7ca7dd8990cee762135f555b66ad01e629f2c2f572a086c2c19246e5104db349b6b44"}, @ra]}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x1}}, @rthdr_2292={{0x68, 0x29, 0x39, {0x3b, 0xa, 0x2, 0x40, 0x0, [@mcast2, @rand_addr=' \x01\x00', @mcast1, @private0={0xfc, 0x0, '\x00', 0x1}, @mcast2]}}}, @hopopts_2292={{0x38, 0x29, 0x36, {0x3b, 0x3, '\x00', [@ra={0x5, 0x2, 0x80}, @pad1, @hao={0xc9, 0x10, @rand_addr=' \x01\x00'}, @enc_lim={0x4, 0x1, 0x8}]}}}], 0x2b8}}, {{&(0x7f0000000a80)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c, &(0x7f0000001e80)=[{&(0x7f0000000ac0)="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", 0x1000}, {&(0x7f0000001ac0)="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", 0xfe}, {&(0x7f0000001bc0)="26f5fac925860cf154442ce36b71668a5951969c41b1dfca611195b05db7640d5b14ed6cc6ae427ffe2b8570aa60f37a0d8433cd5d37bc8bec1b2016bc8a1d43993133415a14", 0x46}, {&(0x7f0000001c40)="55413b021e976dcfa3d1bccccbd4", 0xe}, {&(0x7f0000001c80)="dc3b695521a85f", 0x7}, {&(0x7f0000001cc0)="63065d61b14a3e22409e", 0xa}, {&(0x7f0000001d00)="fe9d3f71c18361a5ba60c82d878a8d798456b71636323e24bc4069a50401817c5720da80e05b208e8371eaa3afe2b9f4e950ec5ae4e6e97c6349e22707cae82ffb79fcccaa317c3de8ceb9b9bdabfbff48ede8634bef6ee1276c73d714a7ebfba2ebc9ce39dfaaa6268810f3bc7cfbe27c30711047f0760b103d4d47169647ca9b43", 0x82}, {&(0x7f0000001dc0)="636470c808631322392cf87bdddf6aac0a7fc6cd0dd753c2c93e3ed58b9a2ff93cc9e49c86b95dd64cee5185b4d9d613c7fa60b60aa3910fd708c69e42842214950dba52b66af39a390e9194fe560577c93f9fa8e4d2846cba81460ede5448a32d21f7851f1a84012600132ca9a52299bd1c2bc92ee768dfe1fa2606e3f282ecd8fbedf2f9f1d2085953624b588dfadb6915a2c6207601c2b85431058cc61570", 0xa0}], 0x8, &(0x7f0000002080)=[@hopopts_2292={{0x160, 0x29, 0x36, {0x3c, 0x29, '\x00', [@calipso={0x7, 0x28, {0x2, 0x8, 0x1, 0x1, [0x9a61, 0x4, 0x3f, 0x4]}}, @pad1, @generic={0x40, 0xce, "c66e06ff63aeb878745137d5f8b448f0540d1b56c873b2865779ab0900532062bb3b3ec0e1c0d7044a2c107d5d9c0f9935219ab6ae8e404db02c3f9e37fddbb5fff23440895d3b3e7f66186d99e5d7566792e7278eabd99c5f6ede25696e449efbcb67c920ea17e68fdd4f8d269c6122fdec3ba28f4baa8d1a316e22ac15b81d9989832c8843556b4fd20bedd448157fb3e07740d804da5594816623688b8ceb8b7f51aac9eb5702631f2dc07a8b9fcced3d0f1473aaa0c56bd6267362a452c58366d79618b6c4b7675530c2dcdd"}, @generic={0x5, 0x46, "e6da7efa98ce28dea311f40fc9bf66c9f02afecae0a50210e875aaabd77d9d3ab5a3ca13c36f9f269d18ebf63c9ce442341ee4c93c58fc88875c405c3ff25cb77ae4eab7990d"}, @enc_lim={0x4, 0x1, 0x7}]}}}, @tclass={{0x14, 0x29, 0x43, 0x7}}, @pktinfo={{0x24, 0x29, 0x32, {@loopback, r5}}}], 0x1a0}}], 0x2, 0x400040c0) connect(r2, &(0x7f00000022c0)=@l2tp={0x2, 0x0, @broadcast}, 0x80) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000002440)={&(0x7f0000002340)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000002400)={&(0x7f0000002380)={0x5c, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@SMC_PNETID_IBPORT={0x5, 0x4, 0x1}, @SMC_PNETID_NAME={0x9, 0x1, 'syz2\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}, @SMC_PNETID_ETHNAME={0x14, 0x2, 'vcan0\x00'}, @SMC_PNETID_IBNAME={0x9, 0x3, 'syz1\x00'}, @SMC_PNETID_IBPORT={0x5, 0x4, 0x1}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4880}, 0x20048004) r6 = syz_open_dev$vcsu(&(0x7f0000002480), 0x0, 0x2) io_uring_register$IORING_UNREGISTER_PERSONALITY(r6, 0xa, 0x0, 0x0) sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(r0, &(0x7f0000002580)={&(0x7f00000024c0)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000002540)={&(0x7f0000002500)={0x20, 0x2, 0x7, 0x301, 0x0, 0x0, {0x5, 0x0, 0x1}, [@NFACCT_FILTER={0xc, 0x7, 0x0, 0x1, [@NFACCT_FILTER_VALUE={0x8, 0x2, 0x1, 0x0, 0x7}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x40800}, 0x0) r7 = openat(r2, &(0x7f0000002640)='./file1\x00', 0x8002, 0x14) mount$9p_fd(0x0, &(0x7f00000025c0)='./file0\x00', &(0x7f0000002600), 0x200000, &(0x7f0000003ac0)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {}, 0x2c, {[{@cache_none}, {@dfltuid={'dfltuid', 0x3d, 0xee01}}, {@version_L}, {@msize={'msize', 0x3d, 0x80000001}}, {@afid={'afid', 0x3d, 0x416b}}, {@version_u}, {@version_u}, {@uname={'uname', 0x3d, '*-}'}}], [{@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}, {@pcr={'pcr', 0x3d, 0x3}}, {@subj_type={'subj_type', 0x3d, '/dev/vcsu#\x00'}}, {@subj_type={'subj_type', 0x3d, '/dev/vcsu#\x00'}}, {@subj_type={'subj_type', 0x3d, 'syz1\x00'}}, {@fowner_gt}]}}) 18:29:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x0, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:29:23 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9ec) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:29:23 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000580)) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x1, 0x81, 0x68, 0x1, 0x0, 0xbb0, 0x20100, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, @perf_bp={0x0, 0xa}, 0xc0, 0x9, 0x9, 0x9, 0x0, 0x8000, 0x800, 0x0, 0x8000, 0x0, 0x81}, 0x0, 0xe, 0xffffffffffffffff, 0xa) getdents64(0xffffffffffffffff, &(0x7f0000000240)=""/211, 0xd3) setresuid(0xee00, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r1, 0x0) setresuid(0x0, r1, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', r1, 0x0, 0x400) mkdirat(0xffffffffffffffff, &(0x7f00000005c0)='./file0\x00', 0x0) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFNL_MSG_CTHELPER_GET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000400)=ANY=[@ANYBLOB], 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001b00)) ioctl$sock_inet_SIOCGIFNETMASK(0xffffffffffffffff, 0x8916, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendfile(0xffffffffffffffff, r0, &(0x7f00000004c0)=0x42b7c453, 0x40) socketpair(0x10, 0x3, 0x6, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(r3, &(0x7f0000000880)={0x0, 0x0, &(0x7f0000000840)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000c111a56974812e98ca3438bafa00a03e921e327aa7a68c6c3faf62dcc85b6c10aebbfefd19f2cb068499530857df5a35abbb4fc37a1e2c3a1437cb9d56e0b9f28ca8850137e247d4426d789c7cb67194e9b499b35201193d0104e45796792b9c6f6947ab633cee1b1f76e1b3461329", @ANYRES16, @ANYRES32], 0x14}}, 0x0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r2, &(0x7f0000000540)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000480)={0x24, 0x0, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@ETHTOOL_A_PAUSE_RX={0x5}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x240488d0) 18:29:23 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') read$hiddev(0xffffffffffffffff, &(0x7f0000000a00)=""/207, 0xcf) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'bridge_slave_1\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0xffffffffffffff26, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 2850.521765] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2850.537240] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2850.558491] 9pnet_virtio: no channels available for device ./file0 [ 2850.595743] 9pnet: p9_fd_create_unix (15665): problem connecting socket: ./file0: -111 18:29:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x0, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 2850.668803] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=4545 sclass=netlink_route_socket pid=15672 comm=syz-executor.6 18:29:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000040), 0xd4640, 0x0) r2 = dup(r1) getdents64(r2, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r2, 0x0, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000001c0)={0x24, 0x40, 0xc21, 0x0, 0x25dfdbfd, {0x4, 0x0, 0x2}, [@nested={0x10, 0x9, 0x0, 0x1, [@typed={0xb, 0x0, 0x0, 0x0, @str='}\\:\\$[\x00'}]}]}, 0x24}}, 0x0) process_madvise(0xffffffffffffffff, &(0x7f00000014c0)=[{&(0x7f0000000040)}, {&(0x7f0000000080)="286a1af7b2ac4ba85106536bae9db1ae4a70e33a53540333273445fd9f5b424652d07b853fefbadc89cba8f1ba3b917f9d87869cbda630465b00a3c7d63f7edae6f0feeaaba87125cd63cf70e30babf773915658b8d87fb18227102d55cbdaeba4390546cb8ffe78c001f9ff51d7992210b1be6de4d84a3ef9d3d7ae6cdc23a1b67824348ac5f16c5b63480481143e4b708cd889d7451037e300430c3fc3c59e03032e4048061de8903f96caba243c271a7e760932c5b0f08a75e38a7acf8a525b01befc355d4fe22217e7b315664c471cc7810183fb03ae7ffad246fdb8ea536d6c3a7228dec00feffa", 0xea}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f0000000200)="6436a7b00baf22e0e191c319bb76057c85b5dc1dcb4da01420ef713fee1d2449b9efe237ef2638825f364f58f14070284a74f1de8527cceaf2e64276069fb88d899b68306e908e7500f660b42fe367e07d37b9b5378cd6715aca08d4740d541631a2cad728cd9b920fcbb01534232c925529ff35ad96d8d20193928705a232", 0x7f}, {&(0x7f0000000300)="a7d5ca1c2c3670adfc78df13a9db28f0034f434c0946426aa5006e1b1693bcc5257195d137076a68e9e6248ca7e5d459f43d8b1bf9fad440027e81678a5670e17613ff", 0x43}, {&(0x7f0000000380)="2d2bf3fa7c5d43365db561af16e13e8ff64b7495ac483837951dedf3c00232fc4a101fb2b09a58526e3ab2ec2f1317f3b161684d6597a6492606a2855cf39628afcc815aa125e889314641e5f979bbebe3b3eb0ed3b66a7d9d25a01821342d6be0d1f04e329a8e9d2d753c16ff387e47e72ba93dfc0341e85fe2153cb57cfbee9b38482d4a3aed7d2eb2df46164a80fe4856a40bf28bef2355e7eb6b240ad743418de4ad969f0f7ae0edac8f19a9c51bad9942ca01c584bf28ba17a4b877c86a3dedbb2720531d30f9754367271631ddd735a90eef8186a48940f01d692692e11bf86f42a7fd71cbb39e4cba450a2292e4b9df21", 0xf4}, {&(0x7f0000000180)="e8e5f50795b6c32cc1ce92c0ecbad523df7da55251868c", 0x17}], 0x7, 0x10, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0x1) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x40000, 0x8}}, './file0\x00'}) sendfile(r0, r3, &(0x7f00000002c0)=0x100000001, 0x9) [ 2850.730152] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2850.779029] 9pnet: p9_fd_create_unix (15665): problem connecting socket: ./file0: -111 18:29:23 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) recvmsg$unix(r4, &(0x7f0000000f00)={&(0x7f00000003c0)=@abs, 0x6e, &(0x7f0000000dc0)=[{&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f0000000f80)=""/146, 0x92}, {&(0x7f0000000bc0)}, {&(0x7f0000000c00)=""/239, 0xef}, {&(0x7f0000000d00)=""/185, 0xb9}], 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001000000000000000010000000100000020000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c0000000089000001000000020000000eac75841f0e8f0f408d408bbd0dc919a0b689172cd96c2dc4dbd22bdf40c8ae7abeec2cb7e6687b11e14ccd36eb02ec68ba3bc21ca93fa1", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x2042) openat(r6, &(0x7f0000000f40)='./file0\x00', 0x40000, 0x114) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r7, &(0x7f0000000200)='./file0\x00', 0x86) [ 2850.856911] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:29:23 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES64]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000a80)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c9a972f34652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e74f56e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d148735e27f77e50b362cd0baf940d1fd04c479fed329d0e5c0189da61d34264eff01b03721aa670649a59e312fa3f91e492943f9d133c4e7fa8914eb334b391ecb467ced7d7eec4e7392e0f0b7f0520d95976a1f2dff500a88bdab8b65e000", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) fsetxattr$trusted_overlay_redirect(r4, &(0x7f0000000a00), &(0x7f0000000a40)='./file0\x00', 0x8, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 2851.029240] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2851.031496] 9pnet: p9_fd_create_unix (15686): problem connecting socket: ./file0: -111 [ 2851.091435] 9pnet: p9_fd_create_unix (15689): problem connecting socket: ./file0: -111 18:29:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x0, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 2851.174742] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' 18:29:23 executing program 2: r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x69, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0), 0x8}, 0x1c44}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r2 = dup(r1) getdents64(r2, &(0x7f0000001d00)=""/4085, 0xff5) r3 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x6, 0x1, 0x0, 0x40, 0x7, r3}) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x40, 0x54, 0x3, 0xea, 0x0, 0x5, 0x2e00, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000200), 0xb}, 0x100, 0x7, 0x0, 0x3, 0x2c7, 0x2, 0x100, 0x0, 0x6, 0x0, 0x2}, r3, 0xffffffffffffffff, r0, 0xb) getdents(r2, 0x0, 0x0) openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) openat(r2, &(0x7f0000000000)='./file1\x00', 0x105142, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$INCFS_IOC_FILL_BLOCKS(r0, 0x80106720, &(0x7f0000000580)={0x1, &(0x7f0000000540)=[{0x11, 0xfb, &(0x7f0000000440)="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", 0x0, 0x1}]}) r6 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r6, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) vmsplice(r6, &(0x7f00000007c0)=[{&(0x7f0000000100)="a1a77fe11acd7ab3140dd5250af8916fa157df9e943e8ed51232197efa686610d89b85b391250da181e0e2fc3793", 0x2e}, {&(0x7f0000000600)="3323ccd89ba34c958dd1cdb0c32010ad434ace6e2d64e4224a10e436d500602a3d8d1d4f226daf989dddbad9bbf96004af89ad682e8a06d3cf894ecff92b5900762a3f0ee9fc4c3a4fe2c6dbf5fda54450a9333a00c5206de89365512c56920e0670635ad92a3f5514e5e12010c14d50348ecb6aa4", 0x75}, {&(0x7f0000000680)="678161e94d791d7ffb1ae4f74b5c9507fbb30b4692379271f66de02fd3edde916c8b4912b3180c0bb4cba243da4571456e4f157d01306807054684b54a6de471ead965", 0x43}, {&(0x7f0000000700)="fade93b179dc971b421d9d79177ec8b547a7661e083aee0eed6885b0c5f07e67679925f0c1f2f7f057c69722e028b17c99c837d63861a51de8f559ed55d2c4b840c42b9ca9ddadada692cfd6eef46c0a8bcbd2ae001f481e3904608008895a032a313b0de2c3833d1d025d86e708f7138a2601db7265a2ffdf21abcda8f32f5ae849b41d07bd8efc8f0d369d15", 0x8d}], 0x4, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="7472618b32d437aa4097ecab24e9d8f2566266646e6f3d00", @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB="010012e52ab52b8e962d55611ac58fec5a4b23257a1d6eb3c2812ca3020651c417dec2311bc86d0de2f6d7c44dfd5900e76ae97b4f90b79910ddb8b90da02c4fce85a999ba1b30d1780868afd2f623cbf6bc0b8a30611fb3ad3eea6247bfb1c0d304ada8c08541ded2808d6656260e081806f462d4e332f0dc896366393eb21c801d4f8a2ed2bb83edc8c8d7e506a5a8dd275991f2251f792ed0ad7f1b5dd5ce395e84e47ab2798d3b73f415960176cc7a8c1eafb0c9e80e81a7f2ef759d8a"]) [ 2851.200183] 9pnet: p9_fd_create_unix (15692): problem connecting socket: ./file0: -111 [ 2851.207166] 9pnet: p9_fd_create_unix (15691): problem connecting socket: ./file0: -111 18:29:23 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9ec) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:29:23 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) dup(r1) sendmsg$IPCTNL_MSG_EXP_GET(r0, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000200)={0x88, 0x1, 0x2, 0x5, 0x0, 0x0, {0x1, 0x0, 0x5}, [@CTA_EXPECT_MASTER={0x38, 0x1, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x14, 0x4, @dev={0xfe, 0x80, '\x00', 0x3b}}}}]}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0xec21}, @CTA_EXPECT_FN={0x13, 0xb, 'callforwarding\x00'}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x1}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}, @CTA_EXPECT_HELP_NAME={0xf, 0x6, 'sane-20000\x00'}]}, 0x88}, 0x1, 0x0, 0x0, 0x4000004}, 0x80) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000180)=ANY=[@ANYBLOB="0101026d15a21cc13e318f46fd0000000100000018000000", @ANYRES32=r1, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file0\x00']) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xdc2, 0x12f) r2 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000140)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r3, &(0x7f00000000c0)="a3", 0x1, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r0, 0x0) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) r5 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000003c0)={0x6, &(0x7f0000000380)=[{0x0, 0x5, 0x93, 0x4}, {0x0, 0x1, 0x5, 0x7}, {0x1000, 0x80, 0x53, 0x8000}, {0x8, 0xff, 0x1, 0x6}, {0x81, 0x3, 0x45, 0x3}, {0x1000, 0x8, 0x3, 0x6}]}) write(r5, &(0x7f0000000400)="07a61649389fa858b6c4b7791bf036a7aaaa8c0f52614ebd96e6719094bfe922720f48cdf94680e358b8ffb90c6d311d963f94f09ce8674ca9", 0x39) fallocate(r4, 0x10, 0x8f, 0x100000001) write(r0, &(0x7f00000013c0)='w', 0x1) dup2(r3, r2) 18:29:24 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) openat(r0, &(0x7f0000000140)='./file0\x00', 0x20001, 0x24) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:29:24 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) perf_event_open(0x0, 0x0, 0x8, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}, 0x2000, 0x8, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_FSYNC={0x3, 0x2, 0x0, @fd_index=0x8, 0x0, 0x0, 0x0, 0x0, 0x1}, 0xfffff000) r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') dup2(0xffffffffffffffff, r0) preadv(r0, &(0x7f0000000080)=[{&(0x7f00000011c0)=""/121, 0x79}], 0x1, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) dup2(0xffffffffffffffff, r1) [ 2851.392884] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:29:24 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) recvmsg$unix(r4, &(0x7f0000000f00)={&(0x7f00000003c0)=@abs, 0x6e, &(0x7f0000000dc0)=[{&(0x7f00000002c0)=""/23, 0x17}, {&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f0000000f80)=""/146, 0x92}, {&(0x7f0000000bc0)}, {&(0x7f0000000c00)=""/239, 0xef}, {&(0x7f0000000d00)=""/185, 0xb9}], 0x6, &(0x7f0000000b00)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001000000000000000010000000100000020000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c0000000089000001000000020000000eac75841f0e8f0f408d408bbd0dc919a0b689172cd96c2dc4dbd22bdf40c8ae7abeec2cb7e6687b11e14ccd36eb02ec68ba3bc21ca93fa1", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xb0}, 0x2042) openat(r6, &(0x7f0000000f40)='./file0\x00', 0x40000, 0x114) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r7, &(0x7f0000000200)='./file0\x00', 0x86) 18:29:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) syncfs(r1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:29:24 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r0, 0x3, 0x0, 0x18000) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r5 = dup2(r4, r3) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r5, 0x0, 0x7ffffff9) 18:29:24 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r4, 0x80286722, &(0x7f0000000a40)={&(0x7f0000000a00)=""/18, 0x12, 0x20, 0x2}) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 2851.489802] 9pnet: p9_fd_create_unix (15716): problem connecting socket: ./file0: -111 [ 2851.493177] 9pnet: p9_fd_create_unix (15717): problem connecting socket: ./file0: -111 [ 2851.572261] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2851.581964] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2851.585593] 9pnet: p9_fd_create_unix (15722): problem connecting socket: ./file0: -111 [ 2851.592573] 9pnet: p9_fd_create_unix (15720): problem connecting socket: ./file0: -111 [ 2851.604485] 9pnet: p9_fd_create_unix (15723): problem connecting socket: ./file0: -111 18:29:38 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2321202eff0f000000000000e178300a"], 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000540)=[{&(0x7f0000000340)="dbc24d396d4f35bcb405bc398f50e0d83d82648a583b8e75669a3918b1fa677aaadc995f11da706fb0b38515dfa43b5d9050b8fdeea8079ec026", 0x0, 0x3}, {&(0x7f0000000200)="000000010000000119c861", 0x0, 0x9}, {&(0x7f0000000380)="4a59251aa848a0ccf0da13aac9ca1b535827146347bfbfe52f767b4db494a208636d", 0x0, 0x3}, {&(0x7f00000003c0)="e8b2815cfa4f6e7e52b789df345315329b5e76bf001a1795a0eb1541e75b19c4aa48c6edac550d95e5a69252116ec38b3b564aef1783c005755ac595ecb3f797e4c2e142e742fba3363b028dd407dd5066347eaaacc59a992f16b750a8879226ddbc75f89b70df629f5f8972c51fbd7967c881f35f075dcb2235e31c3849be5f", 0x0, 0x3}, {&(0x7f0000000440)="78759364e97ce3f84827439c3a7160f7ac3ea2af4a32219191b42f9e23d3505cde8fc2d21128f848819a6f9111fab85628b46fb62ce7c00b1defb92fa17853e072b2b4bf5082be1bd4db24356a7f5a6125218d927daa9d12630a20d9a45afbfedc4027feb7ec74f2aa5e67934476b8a3b8beb1128458c36d33822214038e7fc9b767e106e8367f88b6c513b79eb21283089578bf1763982d66441db5f3d025201b1827e4b06cea256d2bbc8bb84b3317189571981b05bb3981b2f29e45879cf465856d6b88f8f38ff543e95dd28e0c", 0x0, 0x5}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) getdents64(0xffffffffffffffff, &(0x7f0000001d00)=""/4085, 0xff5) getdents(0xffffffffffffffff, 0x0, 0x0) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x4800, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x19bf7ee93562b1f0, r6) 18:29:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x0, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:29:38 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:29:38 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:29:38 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9ec) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:29:38 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) ftruncate(0xffffffffffffffff, 0xffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000180)=ANY=[@ANYBLOB="0100001e0100000018", @ANYRES32=r0, @ANYBLOB="01000000000000002e2f66696c653100"]) r2 = fsmount(r1, 0x0, 0x88) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(r2, 0x80049367, &(0x7f0000000040)) write$binfmt_elf64(r3, &(0x7f0000000140)=ANY=[@ANYRESDEC], 0x5c000) dup2(r0, r3) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) dup2(r5, 0xffffffffffffffff) r7 = fcntl$dupfd(r4, 0x0, r4) sendmsg$nl_generic(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x30, 0x1a, 0xc21, 0x0, 0x25dfdbfd, {0x9}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @typed={0x14, 0x4, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}]}, 0x30}}, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x31, 0x1f, 0x4, 0x80, 0x0, 0x1, 0x0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x800001, 0x2, @perf_config_ext={0x6, 0x2}, 0x10, 0x2, 0x6, 0x8, 0x4, 0xfffffffe, 0x7428, 0x0, 0x0, 0x0, 0x7fff}, 0x0, 0x8000000002, r6, 0x2) io_setup(0xf7, &(0x7f0000000000)) 18:29:38 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) mount$bind(&(0x7f0000000a00)='./file1\x00', &(0x7f0000000a40)='./file1\x00', &(0x7f0000000a80), 0xc8010, 0x0) 18:29:38 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ipv6_route\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)=0x0) r2 = syz_io_uring_setup(0x5, &(0x7f0000000080), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000100), &(0x7f0000000540)) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r4 = dup(r3) getdents64(r4, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r4, 0x0, 0x0) io_uring_enter(r4, 0x7f1c, 0x19fe, 0x2, &(0x7f0000000040)={[0x3]}, 0x8) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r5, r1, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r6 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r7 = openat2(r0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x25}, 0x18) getdents(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0xe2, 0x1, 0x7f, 0x3f, 0x0, 0x1c, 0x2004, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_config_ext={0x3, 0x400}, 0x410, 0x9, 0x4, 0x8, 0xefaa, 0x8, 0x7, 0x0, 0x9, 0x0, 0x8}, 0x0, 0x6, 0xffffffffffffffff, 0x9) mkdirat(r7, &(0x7f0000000340)='./file0\x00', 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r2, 0x82307202, &(0x7f00000014c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r8 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) dup2(r8, r6) [ 2865.877208] 9pnet: p9_fd_create_unix (15750): problem connecting socket: ./file0: -111 [ 2865.881071] 9pnet: p9_fd_create_unix (15748): problem connecting socket: ./file0: -111 [ 2865.886704] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2865.901202] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2865.931971] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2865.938457] 9pnet: p9_fd_create_unix (15761): problem connecting socket: ./file0: -111 [ 2865.961681] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2865.974758] 9pnet: p9_fd_create_unix (15765): problem connecting socket: ./file0: -111 18:29:38 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = signalfd4(r0, &(0x7f00000000c0)={[0x40]}, 0x8, 0x80000) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x595b03, 0x0) renameat(r1, &(0x7f0000000140)='./file0\x00', r2, &(0x7f0000000200)='./file0\x00') mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000280)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x4) 18:29:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x0, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:29:38 executing program 2: ioctl$CDROMREADALL(0xffffffffffffffff, 0x5318, &(0x7f00000002c0)) r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000240)="eb58906d6b66732e6661740002082000040000804df07d", 0x17}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f00000005c0)=ANY=[]) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x226581, 0xc) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r2 = dup(r1) getdents64(r2, &(0x7f0000001d00)=""/4085, 0xff5) ioctl$CDROM_GET_CAPABILITY(r2, 0x5331) getdents(r2, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0xd, 0x11, r2, 0x0) mkdirat(r2, &(0x7f00000000c0)='./file1\x00', 0x72) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r3, &(0x7f0000000280)=[{&(0x7f0000000d40)=""/4098, 0x1002}], 0x1) copy_file_range(r0, &(0x7f0000000140)=0x3, r0, &(0x7f0000000180)=0x6, 0x5, 0x0) 18:29:38 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000a40)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) dup(r3) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000a00)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x35, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:29:38 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f00000006c0)='tracefs\x00', 0x800081, &(0x7f0000000700)=',-\x00') openat(r0, &(0x7f0000000000)='./file0\x00', 0x101000, 0xdc) 18:29:38 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2321202e2f06496c65300a1ea929eb424f6a9c634e18f59790442b1b7792de0a7225d9eed5cfe0f3108ad1b8b1e9771094"], 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) [ 2866.163199] 9pnet: p9_fd_create_unix (15778): problem connecting socket: ./file0: -111 [ 2866.207392] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2866.220138] 9pnet: p9_fd_create_unix (15784): problem connecting socket: ./file0: -111 18:29:51 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x0, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:29:51 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:29:51 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000001c0)={'\x00', 0x6, 0x1, 0x0, 0x40, 0x7, r1}) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0x3, 0x9, 0xfc, 0x85, 0x0, 0x7ec7, 0x42423, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x6434, 0x0, @perf_config_ext={0x80, 0x3a}, 0x1001, 0x0, 0xe22, 0x9, 0x7ff, 0x1, 0x0, 0x0, 0xfffffffd, 0x0, 0x349}, r1, 0xb, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r3 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x165142, 0x129) r4 = openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x52200, 0x45) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000440)={0x0, 0x1ff}) r5 = dup2(r4, r3) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r6 = openat(r3, &(0x7f0000000240)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r5, 0x0, 0x7ffffff9) 18:29:51 executing program 6: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f00000000c0)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000180)='./mnt\x00', 0x0, 0x1, &(0x7f00000014c0)=[{0x0}], 0x0, &(0x7f0000001580)={[], [{@fowner_lt}, {@seclabel}]}) writev(r0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="6a836e6bf1dc19fb3c852a3c923043dda3ed9b64436150ba9334c11e8dcac31a6a019620fa7cfc7514fe721e2be19b48f4a9647782178260a3aa8d344683252c6dfc05ef6f0661fbe2be8da9dabd867b1427a745386a8546565ea69c2489bf401229eb3a4e379a59d7463abeea40751730729c47aafc955470537ce9b2a5b032b6e363a7af120108ffdabb4cb5db9ee89527fd5dac479d4ae2d917351fcc63783e46deb4fff689f80589ac89ae0dddec03f273ff1084", 0xb6}, {&(0x7f0000000280)="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", 0xfb}, {&(0x7f0000000100)="e3a4718a03c6125be3243f9a189e990261311d552b6bb64267b378442eb978e9dc23374b20edfc56cee6cf1414002af87d31f02ab1a04cd80fda7ba16c500f7aa5e0dc1dccf93a08376a5cc87a1dd9b7fc49e8680b748b7eeaa4c6e17e6500d2a0cdb501587c1836e44f6c780774db9daf47ee5af296883205", 0x79}, {&(0x7f0000000380)="7cda863368730ab516b2409b3ad3fe8f80300807e571ddb6dbe53e20a1b231c89019d9943c464fd9c67307aa3dfde26abb61a88daa3f3544cd044d24b676f6a3fd2f773e3ffacec39e07247272b871df06230692e4e78e655fa0fafe99318c9fb675426a7a5af6f26b1b5ebaccb61da5fe82961b566b72589c59528855f0394e6d3344f736d4b5cd7253", 0x8a}, {&(0x7f0000000440)="80bc8e904cb55e502ade3075433b2a8c55c186451533ed72b5ad0608d11be9f84a171ff441bb80e8b6de8300fc8ce4ecf5e32dc05b9e74da564825497e03c41756b92fa063da077f2e8d66cbdad7270b2ade5bd9ff6924b37313cb45e12da22b089b2a3ad0fd2e44", 0x68}], 0x5) 18:29:51 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9ec) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:29:51 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000a80)='./file0/file0/file0\x00', 0x0, 0x73, 0x0, 0x108882, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xfffffffffffffe50) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat2(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f0000000a00)={0x80800, 0x80, 0x2}, 0x18) openat(r5, &(0x7f0000000a40)='./file0\x00', 0x20800, 0x20) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r6, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r7, &(0x7f0000000200)='./file0\x00', 0x86) 18:29:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x0, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:29:52 executing program 7: execveat(0xffffffffffffffff, &(0x7f0000000a00)='./file0\x00', &(0x7f0000000ac0)=[&(0x7f0000000a40)='ip6gretap0\x00', &(0x7f0000000a80)='\x00\x00'], &(0x7f0000000b40)=[&(0x7f0000000b00)='\'@)+\xc6)+])\x00'], 0x1000) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file0\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 2879.307939] 9pnet: p9_fd_create_unix (15805): problem connecting socket: ./file0: -111 [ 2879.334313] 9pnet: p9_fd_create_unix (15810): problem connecting socket: ./file0: -111 [ 2879.363592] 9pnet: p9_fd_create_unix (15818): problem connecting socket: ./file0: -111 [ 2879.376128] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' 18:29:52 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000340)={0x6, 0x80, 0xef, 0x2, 0x0, 0x0, 0x0, 0x5e, 0x40240, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x1ff}, 0x2006, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xb, r0, 0x0) fstat(r1, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r5 = dup2(r4, r3) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r1) sendmsg$NL80211_CMD_TDLS_OPER(r1, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x60, r7, 0x200, 0x70bd2c, 0x25dfdbfe, {{}, {@void, @void}}, [@NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_TDLS_OPERATION={0x5, 0x8a, 0x1}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_TDLS_OPERATION={0x5}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x60}}, 0x10) sendfile(r6, r5, 0x0, 0x7ffffff9) [ 2879.424372] 9pnet: p9_fd_create_unix (15820): problem connecting socket: ./file0: -111 18:29:52 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 2879.452180] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2879.494675] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:29:52 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) mkdirat(0xffffffffffffffff, &(0x7f0000000a40)='./file1\x00', 0x100) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:29:52 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9ec) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) [ 2879.535198] 9pnet: p9_fd_create_unix (15831): problem connecting socket: ./file0: -111 18:29:52 executing program 6: setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000000)={0xa, &(0x7f00000000c0)=[{0x9, 0x0, 0x0, 0x10001}, {0x3e0, 0xe1, 0x10, 0x3}, {0x400, 0x2, 0x4}, {0xff, 0x0, 0xff}, {0x1f, 0x4e, 0x7f, 0x8}, {0x5cd, 0x6, 0x1f, 0x1}, {0x2c, 0x0, 0x40, 0x5}, {0x8ba9, 0x2, 0x4, 0x78}, {0x200, 0xfa, 0x1, 0x26}, {0x3, 0x6, 0xc1, 0x7}]}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000200)={'syz_tun\x00', &(0x7f0000000400)=@ethtool_sset_info={0xf}}) 18:29:52 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x0, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:29:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x0, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 2879.591536] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2879.624207] 9pnet: p9_fd_create_unix (15839): problem connecting socket: ./file0: -111 18:29:52 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ee7892784f088e6369a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) [ 2879.663645] 9pnet: p9_fd_create_unix (15840): problem connecting socket: ./file0: -111 18:29:52 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x0, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 2879.751959] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2879.769675] 9pnet: p9_fd_create_unix (15840): problem connecting socket: ./file0: -111 [ 2879.788011] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:29:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x0, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:29:52 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9ec) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:29:52 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000001400)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9}}, './file0/file0\x00'}) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) sendmsg(r4, &(0x7f00000011c0)={&(0x7f0000000a00)=@alg={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x80, &(0x7f0000000e40)=[{&(0x7f0000000a80)="2e1360f9c68a601ea5dba8cef7a1ce75a1c08d0c85e99ceb091a8491e12e6aad51caaf34fdfeb939585dcf2848c908fa4d07c9c99dc72fff02c176a63d8fc4dcee17828050dd0fab0ba0414693e596317e74f91b56fd09b1c05ca6c56b0d06155f235c82f0e90d846a63b9b36520fd94c8f20df130848625672698cf2527fe431759772438067484ebd67572af38dfdfcdc07778afa4fc07652fb8455844bdfac7ff5fadcfabf7505c41372bd4fee63fd9b25100d3254c94634374c1651b532f06e53514a75c163191d4e24a3e6b5c40dba5d98227c914dcbd44879ee03d93", 0xdf}, {&(0x7f0000000b80)="5adf170d5bb483e79fb392774b92effc00ddac70ec87aa76289265004115536990cacec3be175355f28f3baf0755bc1a3b45eb389d4085483450290f90b0adfa559b2461d71b63d6b2eeaa6f09c1f51b60bcd1a853a6ea7abe6ce3c9341728811bc881b9a1fae2dd09b86515ecb970766758ac40166d42da95ec682ead75e1857b67c7d05f6f0180a5003dbe72c671d13f8b6226d53c72444b9a56520c977f25c7393f71a04a44b5dd75bd47db3ec58cdad86419faf4f2ec8af727a5a53e086e52f65dd826280adad83f3dc5cc83cfba067d11984f56f2cd116bc01840ad0d7173b878", 0xe3}, {&(0x7f00000002c0)="2cbfeac4c7000a33a0dfc2628fc1d90b2e1ca958e4b463ee49e9348bbf", 0x1d}, {&(0x7f0000000c80)="1305d2e4772b5162243af46e8c2c2040a8086fd195fbd5e1bd3d9d7f63bf2e0c2b942d3f62e39edff9a943ecc50c73b3f38ec04595f57b4d15e5219c6ea266273a226dbd5c86bd3f120e146726ced37ccfd3c4a2b114779df88c2e761154522beecccb416ec33bf4f2bd5bf1245a9d58682f6b9fca6ff41bcdd0702de30c5ebc", 0x80}, {&(0x7f0000000d00)="8d8e36a44f356e92005164bb69898612872ea76bc39120053c8a1b602d9a416d93645f4c5a9e48ef64006e71a20cba5c1b048123c956480c2ab674c4069433321dddbdd724b30289a8f4678ae684b0a0434d43db2ba62b3df6671f1dbabaac80778cbdac089f1b62a43cfe219f43c48e10ebc543228d1704fb680345c5e2a38f5991c39331aec061e430bcab00afcb4b2b283426186283e8c319847d7c82e03344d07c3aae940e3e71", 0xa9}, {&(0x7f0000000dc0)="924f9f55935ab513a5c52ebeeb49dc3e0488d5d9feb0f23557f2ee684866837e246cc1c04dfbf0ea49236ded2b74818356636f865719fda6669af969dae6fedbfca2175f3142b0d88e5e82872ab4e372f0ae5a", 0x53}, {&(0x7f0000001e00)="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", 0x1000}], 0x7, &(0x7f0000000ec0)=[{0xf8, 0x1, 0x8, "808ac1b470b93f781195e43dd436ea449bf8c1bc881f57601394074b09d96bfb3c1523517a0ab8bd6ad640b8c9b5f2058d883d943ce2bb8392b0c3d1ffd8f66a58ec6d08d27810ff49743c9c1433869a8daeacc67b6cb9df81735a5bebc92d54d563b390607d085ff7c0f187192c1529daa08451354ada1f12416e021d6d7f43af38012d6adb91b8d4fc6cd29a1b100788a0fece88e87a156b13bcf9a45812a1fdb5d603951fb3fcd148e8a3b36a2534ac5374835e7d56f62afa57ad8a96c7cb433fb1435608697d4b68b29cf1a5eb1d3ee055f846c9ae692178297efcebff3b7bd3cdef"}, {0xa0, 0x114, 0xc11, "f5900a3b6ecb8318371f27034e1abc86febe3e5983c0a113568b2af26891a97b7dc8524c390c83c35d81f52e6bcfe57070e3f01cb6cac67ab8e58d18eefd5d4ddafa55443a59cea00dbab86adc7b59e79d5796d58baeec0d7271c7284ddaaf2902599768dc28d1b1d3b14acd2dde9bc3a6cbf64c13b5012387192f3c365968d5f7f189189408376487ecb74e"}, {0xa0, 0x119, 0x6000, "9bbadd135578feeb6e2ab7090c570d1296510fecc1325d059bb652ff12352dd1099b6073b3e13920422009d78a0f175dd19b3a26970969cce80eb4fdb867e081770601e1ec498dcb1fd50a619887c821bf4d6465162ef55eef54ac8afcb7a34ae72c5f91f519ac97a0d05a99b45a95d24f831f84414fe33dae12a2fdb7b1c765bc62d63a2ac63a63a41c"}, {0x18, 0x6, 0x4, "99da110e"}, {0x90, 0x1, 0x8, "c7e62c7c69e143b8ac300fca9d5ad1c1ab1249c9dd76b665a62d267be417842864ae93f699e03e4859d7a6473f93a5743a940dce6570de7312d6e0edbeb5efa8e73411c8d75c7f2eea4ead2749096f91f29b37736e8c2772fc41d6ffde771d51a1a953d9033e68f7e6b2d6d59c995c9b93d37eae656cf441a2c709"}], 0x2e0}, 0x4) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:29:52 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x2, 0xfffffffffffffcdf, 0x0, 0x1092000, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000a40)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e45080579a0e14e62116d57c25a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) readahead(0xffffffffffffffff, 0x2, 0x2f) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f00000006c0)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c708a6976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f057465785f752c666f776e65723d996d2d47674e860f1dd68e", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 2879.911795] 9pnet: p9_fd_create_unix (15862): problem connecting socket: ./file0: -111 [ 2879.968130] EXT4-fs (loop6): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2880.005043] 9pnet: p9_fd_create_unix (15868): problem connecting socket: ./file0: -111 [ 2880.024586] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2880.044566] 9pnet: p9_fd_create_unix (15870): problem connecting socket: ./file0: -111 [ 2880.054518] 9pnet: p9_fd_create_unix (15868): problem connecting socket: ./file0: -111 18:30:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) unlinkat(r0, &(0x7f00000002c0)='./file0\x00', 0x200) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000a00)='./file0\x00', 0x10) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:30:07 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) getdents(0xffffffffffffffff, 0x0, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) dup(r1) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r1, &(0x7f0000000140)={0x8}) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r5 = dup2(r4, r3) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r5, 0x0, 0x7ffffff9) 18:30:07 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) rmdir(&(0x7f0000000a00)='./file0\x00') r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 2894.368133] 9pnet: p9_fd_create_unix (15884): problem connecting socket: ./file0: -111 [ 2894.380774] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2894.389125] netlink: 'syz-executor.6': attribute type 10 has an invalid length. [ 2894.398648] netlink: 'syz-executor.6': attribute type 10 has an invalid length. [ 2894.410315] 9pnet: p9_fd_create_unix (15884): problem connecting socket: ./file0: -111 18:30:07 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x0, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:30:07 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x0, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:30:07 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xfffffffffffffffe}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file1\x00', 0x2) fallocate(r2, 0x0, 0x0, 0x8000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) r4 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0xb4080, 0x0) r5 = dup(r4) getdents64(r5, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r5, 0x0, 0x0) r6 = socket$inet(0x2, 0x3, 0x5) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r6, &(0x7f0000000180), 0x0, 0x0, 0x800, 0x0, {0x0, r7}}, 0x5) r8 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) dup(r8) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r8, &(0x7f00000000c0)={0x1}) pwrite64(r2, &(0x7f0000000140)="0e", 0x1, 0x0) 18:30:07 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c00000016000144b9d24300400000000a0000001800008014000a00fc0100"/44], 0x2c}}, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) 18:30:07 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0x14}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(0xffffffffffffffff, 0x2) fstat(0xffffffffffffffff, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r0, 0x3, 0x0, 0x18000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r3 = dup2(r2, r1) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000340)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e9b652e40ada4fd76d3ae433bc047a23ad617b8f506ace89a93ba8ccbead9408c702b5e2486b815234850a04428a12327551fb9e291430db0944ba422", @ANYRES16]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) 18:30:07 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 2894.454926] 9pnet: p9_fd_create_unix (15901): problem connecting socket: ./file0: -111 [ 2894.461073] 9pnet: p9_fd_create_unix (15882): problem connecting socket: ./file0: -111 [ 2894.466022] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2894.473006] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2894.486050] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2894.489093] 9pnet: p9_fd_create_unix (15904): problem connecting socket: ./file0: -111 18:30:07 executing program 6: syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, 0x0, 0x48d4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r1) sendmsg$NL80211_CMD_PROBE_CLIENT(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, r2, 0x42d98e844dd39d5b, 0x70bd26, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x856e, 0x56}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x20000040) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 18:30:07 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x0, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 2894.507217] 9pnet: p9_fd_create_unix (15905): problem connecting socket: ./file0: -111 [ 2894.554115] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:30:07 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900021, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = syz_mount_image$nfs(&(0x7f0000000a00), &(0x7f0000000a40)='./file1\x00', 0x7, 0x2, &(0x7f0000000b40)=[{&(0x7f0000000a80)="a0051f6865f5b72b45d5de88d9952d3eaac7deaac38f83bd13ff21506a388697d6df2b039ae8d597b04f24565d21ff65562b7263334e317447eb700f7c5dee77e48b33471dae81fb55d6773df38bf1d0df8a91f66ceca81e47bf1a2737", 0x5d, 0x1}, {&(0x7f0000000b00)="65fb475939cb7add3142db9ff81250b0ceccbdfe700cd5bd", 0x18, 0xffff}], 0x8000, &(0x7f0000000b80)={[{'@%'}], [{@appraise}, {@subj_type={'subj_type', 0x3d, '-'}}, {@dont_hash}]}) r3 = openat(r2, &(0x7f0000000040)='./file0\x00', 0x1, 0x7) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r5 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r5, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r4, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r6, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r7, &(0x7f0000000200)='./file0\x00', 0x86) 18:30:07 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0/file0\x00', 0x400, 0x10) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) openat(r1, &(0x7f0000000a00)='./file0/file0\x00', 0xc000, 0x54) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 2894.622868] 9pnet: p9_fd_create_unix (15921): problem connecting socket: ./file0: -111 [ 2894.636072] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2894.658079] 9pnet: p9_fd_create_unix (15921): problem connecting socket: ./file0: -111 [ 2894.673383] nfs: Unknown parameter '@%' [ 2894.693795] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2894.704257] 9pnet: p9_fd_create_unix (15919): problem connecting socket: ./file0: -111 [ 2894.715848] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2894.752588] nfs: Unknown parameter '@%' [ 2894.780632] 9pnet: p9_fd_create_unix (15919): problem connecting socket: ./file0: -111 18:30:19 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) umount2(&(0x7f00000002c0)='./file0/file0\x00', 0x6) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:30:19 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e74657874f701000000000000752c666f776e65723d00"/95, @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:30:19 executing program 6: syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, 0x0, 0x48d4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r1) sendmsg$NL80211_CMD_PROBE_CLIENT(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x68, r2, 0x42d98e844dd39d5b, 0x70bd26, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x856e, 0x56}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x20000040) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 18:30:19 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x0, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:30:19 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x0, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:30:19 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:30:19 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000340)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:30:19 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xfffffffffffffffe}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) ftruncate(r0, 0x5) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = creat(&(0x7f0000000040)='./file1\x00', 0x2) fallocate(r2, 0x0, 0x0, 0x8000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1}) r4 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0xb4080, 0x0) r5 = dup(r4) getdents64(r5, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r5, 0x0, 0x0) r6 = socket$inet(0x2, 0x3, 0x5) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_ACCEPT={0xd, 0x2, 0x0, r6, &(0x7f0000000180), 0x0, 0x0, 0x800, 0x0, {0x0, r7}}, 0x5) r8 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) dup(r8) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r8, &(0x7f00000000c0)={0x1}) pwrite64(r2, &(0x7f0000000140)="0e", 0x1, 0x0) [ 2907.152743] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2907.182602] 9pnet: p9_fd_create_unix (15954): problem connecting socket: ./file0: -111 [ 2907.189966] 9pnet: p9_fd_create_unix (15953): problem connecting socket: ./file0: -111 18:30:19 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x0, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 2907.252019] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2907.265264] 9pnet: p9_fd_create_unix (15962): problem connecting socket: ./file0: -111 [ 2907.271659] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2907.300646] 9pnet: p9_fd_create_unix (15964): problem connecting socket: ./file0: -111 [ 2907.377850] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:30:20 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x0, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:30:20 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) mkdirat(r0, &(0x7f00000002c0)='./file1\x00', 0x1) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:30:20 executing program 6: ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x18c20}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)={0x0, 0x2}) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r1, 0x800448d4, &(0x7f0000000080)) syz_io_uring_complete(0x0) clock_gettime(0x0, &(0x7f0000000280)) timerfd_settime(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={{}, {0x0, 0x989680}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESHEX], 0xfdef) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/cgroups\x00', 0x0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0x0, 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x401070cd, 0x0) openat$vcsa(0xffffffffffffff9c, 0x0, 0x20000, 0x0) io_submit(0x0, 0x0, 0x0) 18:30:20 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xffffffffffffffab) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r3, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) [ 2907.618704] 9pnet: p9_fd_create_unix (15973): problem connecting socket: ./file0: -111 [ 2907.674646] 9pnet: p9_fd_create_unix (15976): problem connecting socket: ./file0: -111 [ 2907.677048] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2907.695534] 9pnet: p9_fd_create_unix (15982): problem connecting socket: ./file0: -111 [ 2907.707266] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2907.728408] 9pnet: p9_fd_create_unix (15976): problem connecting socket: ./file0: -111 [ 2907.735226] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:30:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x0, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:30:33 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0xa4) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = syz_open_dev$vcsn(&(0x7f00000002c0), 0x0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f0000000040)=0xf800000000000000, r5, 0x0, 0x8f48, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/183}) r6 = openat(r4, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000300)={@desc={0x1, 0x0, @auto="f5dd543f9489b966"}}) sendfile(r2, r6, 0x0, 0x100000001) [ 2921.223692] 9pnet: p9_fd_create_unix (16002): problem connecting socket: ./file0: -111 [ 2921.232855] 9pnet: p9_fd_create_unix (16008): problem connecting socket: ./file0: -111 18:30:33 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140)}, 0x10e0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:30:33 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file1\x00'}) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x40, 0xfc, 0x0, 0x0, 0x6, 0x208c, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x2f0, 0xffffffffffffffe2}, 0x12001, 0x3b, 0x0, 0x4, 0x94b, 0x7f, 0x200, 0x0, 0x81, 0x0, 0x4}, 0x0, 0xc, r1, 0x2) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r5 = dup2(r4, r3) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r5, 0x0, 0x7ffffff9) 18:30:33 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x0, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:30:33 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x0, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:30:33 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000140)=ANY=[@ANYBLOB="7075a83ec0bb0850db0b56149af3050000998edcd12b1330a1a0ac75f70fd294cc8eb62b8c", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:30:33 executing program 5: setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000a00)=0x1, 0x4) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x30004, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file1\x00'}) mkdirat(r2, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r6 = openat$cgroup_ro(r3, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r6, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r5, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r7, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r8, &(0x7f0000000200)='./file0\x00', 0x86) [ 2921.284082] 9pnet: p9_fd_create_unix (16011): problem connecting socket: ./file0: -111 [ 2921.287439] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2921.294189] 9pnet: p9_fd_create_unix (16012): problem connecting socket: ./file0: -111 18:30:34 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x0, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 2921.372001] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:30:34 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB="2c72ffffffff742c00"]) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000a00)={0x3, 0x80, 0xd0, 0x3, 0x7, 0x2, 0x0, 0x5, 0x1500, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6803, 0x1, @perf_config_ext={0x3ff}, 0x8, 0x7d6, 0x5, 0x8, 0x8, 0x4, 0xc3c, 0x0, 0xad, 0x0, 0x8000}, 0x0, 0x5, 0xffffffffffffffff, 0x1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:30:34 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) sendmsg$inet6(r4, &(0x7f0000002080)={0x0, 0x0, &(0x7f0000001fc0)=[{&(0x7f0000000b00)="f8f80fd8aabe0328130923e8b799954d7f682133ad744d762afab622d0c127a2db540b6322f7db3c1dbac96a40ee45ea4faf52db25f7395e2349f25508616c2bcde7930b1374a2b33a72e0229875aaecc57eef591ada127270e4fd47073ee1f6d9379fcc2889f953546d32cc00fdc6ecab1ea3a9abea397f6621", 0x7a}, {&(0x7f0000000b80)="618f68ff004813385041a287479af4cf3f494c9ef0562d7b8acd6fbb14367457e9e7de87f8f6d8e6992445ef1dc9c7da1d363180b594bf0201602a84ff0ed8246b758ffed0a0420267121738d0e418d864156a3aac6f25ad2b4a260c532596d5a37ee25550c65506dbda67751b5e6d283cbd0ef08b10ab34e4044e389b37f7c2fbfd19f61fd537fd7073d1b1e243ab6397f5cdcb3d5f01ec1c5a7e1b694d2d4a60628f710658d9e33f32409da9143c2616ebce6e7fbeb5e39a47380a568ec50f3f26985761c1f67f3171570c06bd0b0633e7bb4d8872f9801ebc03889e950637c15a917fffa2b20a769888f49f5b56fa3c7a660d10e25a80c43ee8bd7b219b9fb85aa7bbea0eaad57488e0f444261800d440d3a34a062dbcf7a9076396981801b696c24f51110b5134eefa61b54c4dfe2cea65164c0ec89a7412c43b48f85fc6a520069e593295aba35ccce05273d272335d20050a474f6fab45c496f5f3f7ae5db38928c8ab5816839f04c762dba8db8d742df6f406a12d686646150512a55056c6395a6f1dc76a45f5615921c2f98cb9640c6fb2a585127903a4c996e6ec42a924e29b5aecbddab265cb96a71c2dca7f87daee01818a355bdb46ff0fd7d947bfe3645744f03e836ff22a3f5fbc57264006e831b025763736756e43c2cd1ced09addfb35d601db78447cf0cac874d9fcc0fd9f9a032502658ecc283aac22c1821df56bb197404525c015ba287e5618ae4a3a9570ec533a10fd3ab29e6992f7a6d000ebb375619a15faae37944b8318daca35b403fab2be563a75ede5efc548cdf23c39cb618365294c767326e14f85d8d92cb244203de7fe522c3ed862ad533019b5d204d1d7fa0b14ecc0b31e9c337f8a9527a7ff527e2e3f35b19fdd63392c26cfb25edcced3b52ad5564decdedc3878747eeee2f1fc9ca6f796168f9e764014862dc0ff5a7ec24903b74adafbf5058145e8f0a8099e924d9711fbb3df2d04861dc2bb55687660fc251625d7c001605ced3f067ef242287bd2ac676577e52235afd0707e822e6aa072651876e31b4e3d6781d135f4c391202623959d9d1ad025c80e0527a169059988a6b98e6e84204ef4dd579cf579f9a940bb2314cf4a1b07dfa0b190445651366dfb1e7f2a06261284e962e30d6375e6332820f4aeff3e83e225ae2f2b6a27dec9bfe3ab5f690064631d47f1199fb917c85e35309b3b1b8354eb633ecd95207c51707139f2aaa74d53fa8277ad97649b8b263a449eb79cdbaf9a38b8a465cd1dd5410654bd4607c27834734b567614e17e99d5c3e9392e38d26a12083dac2269750ccd53a6c1bc2214d6c245f655332e9263168a55e1c04e13d263a63961d8929a0d4fa64187f447658d1315684efcd55d7577403cd56dc3e28430d2e596a17e9174c896fe338b730c9b0ac8cfb9bea4ed1bd3774b1dbd8c572d309d039fe9edd99095686a45035dd4a8261dcaf716b9f989943712ea825694692c5b852c792c5d46b6f897335a798aeab308f3b7cda82aaa27f03dfa91041dcacf74be75a7e2d6fdf095ce9bc02c237c38c32180e8f3f6f45c066ce176f5c014a488364f5fded1f0dc8b4939755618c5c7c668ee826b3effda1431998ab839077ff401c39212d32f61bd5d7981c29fa394eb770aa032fbcb20dbad7b48340c439606b08fb29b54957b2559c2024afb268a4fe03bfe5e984d7f6aa6e6db720429b89a3ff16a1fef5581b2bdd56c6565bbc1c62467a10e5429daa2ef6dbeb3f9c459e1e91d69d22bab62461c655de242d17722df824da914a804570d4e5801a0dd9a55479202b26c27f6cf7c509ef37547d54a2ba5ed710fd55474857edb2120800d8e843bf33bc02f61543873376f959ae81eadbda85bc8b4ac3eedc968fa5a0b5935376e68400d33210b1b7c280895eef0b4384fa5de167c9b8da09ec1883a28a3ea3c271a719ab072ca8a8d207bd327b1aa023fe8a089f5159bd554414506da661c2cba24f0665d6ef42a67bc0f919bea7d5787a9c54af41410bc8bfd63f83dd2b0459ed969f2ef668034adefbb414434af9669a78ae999c61650654567266e5557d510a85fcf198762155e342f6c86a16631a49cf536199a106a5ab10bffae74662be175864f5a8e97f8e73036e87d0fb057fdfed86c016f4b8f4aae305c54d9a4df01ebb2a5d20bab18c9607ce8731380aa7ab0952572b25ca13c9eb2c5d8fe0eac0438777e4f8b95fc89b630ae339565cd810140b1476f9e39a64729e3c66dddb54f3c39d0815baa72693c759554d428eee603556bd0ba6c28c8f87f25c68c0444223d7f6eabe505c2b3fc963050367ee142e113fb2ef795b50ce3b4e4ff8336d67b5c35e740fdacdf3fdddc3fb9e359d3fa625f9a8e5dacfecb6bc9ca510098f30f6a80c33b99e2bc7cb810e0310104412e92d06e5ee5d361bba3bfdff5dc7afee648797bb6151f5fd5cb6e3cfe34ce46577be74fa93db90b90066d36dc7aa339d3c76014a7d6f799fc2d40bf9499eb60cc24714170262c03411b3c8a8e73b0300a99536de736b91d91859956d694c9e0dd608400154ca281f43b64a6a10d5382048aaffaa72560220d92047e87af12665d028ca158f26af3bb3dbff4f8158e8337533cfc138d8c03878889fb6af93d5002f840e1d4e858e8ca7add432faa1bcaf1a87f8d52a026bcc7bc6dc6fb10b7aa31a34d54b3106a74add51d163ddecaaad47eb1336c832008ec7c794fcd1e20e47ed714fa937fdb66383a27e798ef1ab83c3a7f82bb99691916c3f1b8cb0548e898ed810d5ec93a717e04e249842b3d3b5ba02d90d1296050923776d7819fdebad786c27e8151fa63a11ac248930a61887b57d234bead5810c7af98092159d22ad3a9125438c883838750258e8244df8a4a362750b7f06ad9e2fc6c80cf3e1a29d78572ed33fd872e52f8bc07bc3e79ea892d3f9d878751f0b62397fb48074f081ef9c0c994c79fcae31991a2e2fddb03dbd341e72fe0fb4233f2262d04b86d8c820fcf4e5b6f0cc6a1b7e4dec50fc83f4bb59e22ed8001225947534066b054968b96cde23fbf41635b7a7246b4f9ccbbe2a9119cd0591ce43ade7340bba3ac4bac252ff8a30accd65006604fbd9ac37020a8a7a6463de23492bddf8cbbb1de00cb8196504d27b2321195f9c844df596b26184c2ce2649bfe6e0435427ff30c701c7f9b5c8866de7d44471c766ab8665a071d7e036c3e213a417d5a7c2becee5beacae260825b9c138c9179f919ba5cd195646c4dfe1b75004ba830568f96960e1d2a9476368b62267da2cc626d3a2d006251013902435d5ce9c125ba4c7a84c156707cd8cb4092f1f7235a7465fb3122cf8f1e78a08c518be823c9263cde6e97284d14b21d4bf43c6d607cb4a0b4f87815d57da675147c9e5c4b1ebb739ef0959fcfc5b36f9011f55dbdfe045dba4269113b817517afe15ef56fe909f5c76019be7f4a7a8f3b5cd821ead37b663a26d39ee91143862f0e446ed9f1cb38faeac668618a8c8eaf26bcbf7000ff36d78ccfa93b0ef8f073d479fe8f5ce4d8fc798b0e636d0f4d5cd939c38b2a73213a9de0feddb307efb87fcaf9bd96d9849bace5212c080173479469647954e36b46a51a965a5dadf9fb74b2e77e4a450e52a2e5bf1671cb17289cf3052de1c471ccc1f1ae3abb659fa6ebf45df48a4e023be4f49734cf929b0cb6fe77ac09b8b4adf2f02938a53b7623615aa19f2c7bde481614cbd1d35741341fe8ec0da25b7b1c58a8dd4faddcb28815e728c9f13be2caeedffd98c2a1a40c32df871852caf9ed7989c2cf5d4d4ac180c818f5b9460bacc25162e1f5164ca76ac4689702dbf7c0cb4bed00566a6b7a8d80ca5807d823d3b6a8e35e277cb282f5b00c43b8c6daf13a268c0684780c9fc1800412b067bf8b6e0856772d3ea841d73ff470d601ee95b86c342ff03d586a31040836cbd616cd864a062ec65602ac8ecfc159fd4464481bcd8dd8c25e4f658c372733f610a5494760ac2cba9ad5bc3d8648d1468f1457cdc90e0b43542fa3170b074a7061b78e3cee61499743dc6e24204b6a6ae5066895fc1205483bc0cc36f87bc22835a59309edbb0ba937871246edec1b8836362b19bb89282fc162c6345b912c6431e2112a75d361c5d45814ae9389f52c5e760fcb51210ed1d4f4f1592ca0bcc29f357ebedffa4fa8289dedc387fb737a1f314ccf81d0816aa5a2ae3352f831cd4faa5667f38901c273b65fa6eaf1470cb88d1c4bcc8e60f49c813f2141fb1b0f3c55cb96c9f641c9f4081e851f4df2171e21f1f48f33e7fc34ee8990dc9fed7acbd94ebf76db7eaa7f78b53262eedbb232003da1152327625c8510f0eda9c325363f5f1e843f186550fd76123ba728333ce82208e0abbb25ab1eaa362c05a5c61f8b8de2dc2c7b1a80b0f8dcea8621bd91ac556f3bbc144176fc5c291dddd233ef70b35dc7181a16cb735525ab71c0b5837c4abd904808b99332fbc52e6c36508688d910d8d1faf336fa0fb9498982e0e5fea402c8a09ed7558b34190c8804432e9a6b045285f0916cd1abffd0d8ba65874d387ed808af7b2e4bff38652717ff486757618b63b3d8abd9c2871f509a8d486c030f353336de84fbdc46dfb4e272ff737bec49655102a898c41eb86a4dd5f929df456999439f04c598e6ae04f73812bae4535771390e38dc495e0963a2b9728c949a9c7731e915f9f6360ccaf6a3d605c6e694634a9414ef8ac0fd316299f03769859a8ac38061e0bef6164e679ff2c8563a6f67c8f9cdece5ea2a9cebb7a4b533fa170c2ca872faf20cd5215207c46f229f755a827a54237b1bfa77db26a8378c80db9fea6856210f8c4cef67e15accc3bb69ccf2a38f5f60821dffa2c564ee56a21ed4155f12da110ab083f9e4a8643b82641247d2b3c3af645466e2e9499730571657ce2c522918946ba2f0e00b2a472639e3b1d7023092dd2480af4e25737102eab393854b621e2e284bc4dc6f598678e2a6f91b2699aa6fc0d4e140e90f3ecd1d48372607a9f1e0bf652ced1b77d8af4fa9417c2ce28920d2217f16796f8a7633d8dbdea0d70f9c463b30f263d8f48813ae49b5af75a0d12743c7af30f2519374f567e7155400dccc0830aeffcbce337bec54c7988075de34085575b1e4bcd56e5753fdd8578dc27a0807a780f364aad595a6ac21282d54fbb0d38408021037b29cccdeff651468c5cd9d0166074600cff3f54b65cc333b337522a4d98cd5b45714e29db239859c97b3b5c240f2d122de89fea6001bb70b90e2319b90fdd3674e8863becf0ffcbd4226aad26a0ce4f77f306e89afa75eb4063c58846c55d7d76e32ad551a0df5b1395ad135d70e8459d4e5b6ca8f4b2b57a7ab2caacb035c5f29717e5e966aa2a6f7d5181feb440391430dd99407a399d2c969daa42a53f6b0b7ef146fc82c2aee47ea10c77dc0c115e9f7a187b8736e2efce0b8795e76e829cb5a7ccea18bbc808619b6c722acde9af8d608107fd962c93719ee39c8cf1137dccf7b698d316723d33b407830a6380446a7559cda11a587361cc18a34258e0122178ebc96176e3a1fe264b999dee8a4ab0d20e1be7a26119a28579d38df8cd09b8384673c14c249899b05156d2fb7451c100ea08aa813b029737b6a8784ece83efb326190f2189c2cf2e9f5fab38d48b1c0f2b7e24a2bf7351d5d5309e69dc09759a8c4aaaf33ab937e1db3512001319450e62ca48a8013b0dc2046242db0a33dfa34c9a4a055ebdba19fc51ef695c0716144221235cef71ddac", 0x1000}, {&(0x7f0000001b80)="bab29e9113a3bcd10380575ca59e5ce617a209469c616a05af95f6ef738463afed3abd97d7cfcf9c691866ab1bd17d2e4efcac0c465a3685bfb8d55776aafc66169ebe32ffc0fba71ca123e53f6f9b1916e50d12e3ba85c065239455241c9d7cb2c6bed22760663d9bdebb2671f355328b", 0x71}, {&(0x7f0000001c00)="bcd3e2246f8857de79195abeb626d9a12e44635cf46f219dad74769071308cce04b1ce7a1e30651df10c6fa19f5159c700dd708087a9dc8312b0c5dec3fc28dd5975389ce57044cf086f1f80afb4fd57eaff21cf6b2e1b4c22eb35a4ff75db49ca50e90edea7710c612e73036d4585676fea8663a1727d776ae7138f5508f2d2c9044d55babf6ce0d4d20c2e25dd448d52003321ef3012db8bd286e9c131a5a57aae9e32bd44e31de4eb63ba638d86341bed014a60c32aa402d0f54bf48b88180480c38151e4921976c782b2f44193c4f12fc1e1af2e3526d8755f3c9f2bcf9ccc403a35444838c08f8115da852163ff59e03c476f49", 0xf6}, {&(0x7f0000001d00)="9bf9a98d106639eba3e79c208aacc7ad07dbc3b5288fc2c3a7eb9eec78eaf34aeb4428a865b33a233641f98988e0c080490067a3effd83849c84e5ed5c631a257516d322e4bbcf20cd7f8ad9fa0ba99bb5f31ebfd51da1c922d7ae7f866f6a1aa1", 0x61}, {&(0x7f0000001e00)="fa64cf6606e7c43085d1a1", 0xb}, {&(0x7f0000001e40)="2e72082d138f3d1136337640215db7016f77bf0685527895089fa309b42d125f625ed8f7a6f8e3146fdf7c8e9b7f337d4402b1fa54b8d025d5e06282e7b1bb71efc6caa73f32c559926c777cc5f91afe63cd7dd39496e636aa4b9cd0eda96513d055276b2c659ecac9e00e9fab16c7b7ec0ffb57a80713531e", 0x79}, {&(0x7f0000001ec0)="e20cf3e61aee3ebde23f8812", 0xc}, {&(0x7f0000001f00)="a5de5fec682c7d8f67ff61c3e5ecdc663815bbc44ae7e44ba73d08bb3f50b58736c8992b3529bf6135d61cf92caa56c1cf619e46525bc76798b3fb1fdd5e9bac6d1f301c63174cb101e13e095dea0981b18837c3f1c99ae0b7e32f870b1a6995207c9cf0e87ff9daccd974ac464637d665e8847560c334e59b9313c963dc3352227e163c86ea5ffed632c55eb830669894322dcd59a1c1d1860763c2", 0x9c}], 0x9}, 0x8000) syz_mount_image$nfs4(&(0x7f00000002c0), &(0x7f0000000a00)='./file2\x00', 0x9, 0x1, &(0x7f0000000a80)=[{&(0x7f0000000a40)="a89745", 0x3, 0x8}], 0x42001, &(0x7f0000000ac0)=ANY=[@ANYBLOB="2c6f626a5f726f6c653d2d240b960a9fb4278c2c617564"]) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 2921.384596] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2921.424129] 9pnet: p9_fd_create_unix (16025): problem connecting socket: ./file0: -111 18:30:34 executing program 2: setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000a00)=0x1, 0x4) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x30004, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0x6}}, './file1\x00'}) mkdirat(r2, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917ea751770d5b612b761ed880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448dc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r4 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r6 = openat$cgroup_ro(r3, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r6, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r5, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r7, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r8, &(0x7f0000000200)='./file0\x00', 0x86) 18:30:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x16d542, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000001, 0x10, 0xffffffffffffffff, 0x966b3000) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) pkey_alloc(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000001d00)=""/4085, 0xff5) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0xf72, 0x87, 0x3, 0x0, 0x3}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, &(0x7f0000000100)=0x3a, 0x6, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 18:30:34 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x0, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) [ 2921.501417] 9pnet: p9_fd_create_unix (16030): problem connecting socket: ./file0: -111 [ 2921.511182] 9pnet: p9_fd_create_unix (16032): problem connecting socket: ./file0: -111 18:30:34 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x0, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 2921.549879] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2921.571705] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' 18:30:34 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8e622, 0x0) ftruncate(0xffffffffffffffff, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000440)=ANY=[@ANYBLOB="350800000000000000300afd02d2a8c8188c1117110ebb1849c11e48ad8b8a6d3f20170cb1a228aaf515ddbc1a3faa1e21a9fd12b29d8e6a4c0f52ed86430dd7cb2320e4d9bcfa1d04b2c3c28b6752e64d0d48c81a92d82821c9dba5b80f63e612123188172db8da0d171766e4743a8d4c5ac3477e7bb3f41ae296f28e027dbc692a64df722c0c420d911f3e7d924f51ad43ec1befc317849f5d297c9eb9cdb73760e0b55371c7a4033aee52cca6c22362168e3b8b316118c15cf43f9f9f950eb9dacae76fa89e0781b98f2553c026ed6049ad39f653e1eed30bc60e9b3c88db5f5537f60066597904d53479c1203f6a"], 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000140)=ANY=[@ANYBLOB="284629827d94a06ecc0b76142fee1c1aacc89300"/29, @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) [ 2921.582835] 9pnet: p9_fd_create_unix (16039): problem connecting socket: ./file0: -111 [ 2921.605835] 9pnet: p9_fd_create_unix (16036): problem connecting socket: ./file0: -111 [ 2921.714080] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2921.882906] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:30:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x16d542, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f00000004c0)) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000001, 0x10, 0xffffffffffffffff, 0x966b3000) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) pkey_alloc(0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000001d00)=""/4085, 0xff5) getdents(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0xf72, 0x87, 0x3, 0x0, 0x3}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r2, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, &(0x7f0000000100)=0x3a, 0x6, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r2, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) 18:30:49 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163416573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) open(&(0x7f0000000a00)='./file1\x00', 0x440200, 0xa3) 18:30:49 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2321ff032fff68e7ef74c3507f6e43809666696c65300a"], 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:30:49 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f00000003c0)=ANY=[@ANYRES32, @ANYRES64=r0, @ANYRES16=r0]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r4 = dup(r3) getsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r6 = openat$cgroup_ro(r2, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r6, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r5, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r7, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r8, &(0x7f0000000200)='./file0\x00', 0x86) 18:30:49 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001e00)={0x0, 0x0, {0x0, @struct}, {0x0, @struct, 0x0}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000001b80)={{}, {@val={r3}, @actul_num={@void, 0xffff, 0x74}}}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r5 = dup2(r4, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) r7 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000340)='./file1\x00', 0x6, 0x9, &(0x7f00000019c0)=[{&(0x7f0000000380)="2ca4bc8ef8125c67049ca5058b270767819dafc7b9de0280ae466e440d63085b2e289029463778486e92198c1ff61726de078ef429f4ee00cb7d41cb3dddd7738d81f0e0a36ead56ef8355970c1734e89461e7f66ae5972338dfc95ccd8e69ceb08e4ea03ea3c904efcdd94ad94da431460e04597818c67bf59a6bf13ada61eb13ab74ca16213ff4e9cff9faa75d9cde739d0aa400550582ed01d24b8d91cbc02af8f8cf617c3baf685c0a02611bf49f5ab1f4f50d57845122188c15827562375d717f78aa8740ad5bdf48fcc9669a8e1b46df899dc74e7bb704a97945e86d90ea7542c55596", 0xe6, 0x7ff}, {&(0x7f0000000480)="f73dd409e95c18802132ab5b261e87ab568bbacc16b5934882ec1c32541fcdac77d64f04fd3ea1ee260f6e8064c6492e8ea23cc5d80b7215dd9e5ad86ee222d1ecd06516", 0x44, 0x401}, {&(0x7f0000000500)="ac524d0bbc3e263ed18a18c507570bc95811ac523ab93990cae8b8108aeedbe02f3a402330d4fbcadfe3b1c612daac5c9bc30bc5b54577a37cd770b50cc6755b9a311dea5234dbd1b659fbeeb7ef14ca4b2b6e9cddce76b30f7c99d6843b862b72f2e46547ceae891ff2255b698997a54494953a09a195ae9620859c9aed9a8f754c87fb44a19e9b3cec02042349f04dc2ff2ea8b48636efdc0e07904d776c729de3a62078d6e260e52a69330a5548f166250e3f813b348d952579f39f81b249faeb04dab794737140fd659505430393c1bbc39e4a87a3", 0xd7, 0x4}, {&(0x7f0000000600)="2baef1dc1adbc2b12fee01e1b3597cc9620e30fac2a3bab9bca5cf9f989f5a000a4fe61687413bcc2b6bdda680526c1c3ff151554aab2c0181287854b684d821e8025c5ef8d9f6f64832a2274fbdac30f4660737a2c1c1df9cb4a8e264600c801fb9bfa41e39ee456fbedaf41fdf4825539451b257fcf2e12905c5a55ac66bf9ba52a7239ffb1ecdaf1921bdd2885adad39242a6da78c62fc4186eb7155e3a32e56533ae6345c85841d3525f257469743773dc197ece0a", 0xb7, 0x100}, {&(0x7f00000006c0)="3b2b2823eb425328514c111b02f160467113cf39c21abd827be3b5eaac5635dca1d58332e63937790b9509d0d5e14fa9831464ef8b5f8cab8981c8c54f87ae9259850824f3210fcaff4e410ff91a151db4f4148c6a3622a23accb64f5d6b5d2642a7f69e8bad19fc7e123be159bc873649551f2a0dc41645b588845ec7b2fec7435e78fdabd566f91737bbc0d7a3", 0x8e, 0x4}, {&(0x7f0000000780)="cf29faf387d3914e5f2c2c94bbaf35c544fe86b8a827bec003bae4ef02dc9190ee9f0498fa1e1777198a15fcffe79fbe143b181ffa8fdd6a611e76c212635475d9b5585d7a02d9cd5d7736ba03cc82c90b4dc2faa4fc207e2739e68e81283e74188b3ffbbeaac215313bdfd0d1a4fa04d103e61ab270aff01fe7b358875697c0c811c9db61c8aaf2872ce671e305b49f0ae86c0b9bd5db4515dfcc81e56a186cefdbcc28a2b68e6d6fceea38f861ebead0002a47c56dcbc972d19ee01b8537cda7a845badb5c49a04791818f52d8bbace20d05021f", 0xd5, 0x101}, {&(0x7f0000000880)="05dd0de84d891337b5d4f83e3a7f44412405c5588ab6f686eaf4cdf6025a051a3c9bf65d09b3e5847af6ab5bccb867e4ebe4988058e9f46987eacb288e3ac5b572d97ffeba2b8848bf5d1a04c534d51863d3cbbbcb7075a19f69e435c9064d55324aeb15bc41974f4662428306781f715c2d6ccffd8a00a151967a8d6b9dc13a6e448beae977a38760808aa858a04e254778625dfafed6b3caa25d578e742284fcf7f6b22cebdf57ca765b18a20500aaf693de95c0e3fc1e9b334c62ff79b48ae02d6639ad847a52eb3a8048c4", 0xcd, 0x5}, {&(0x7f0000000980)="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", 0x1000, 0x7094}, {&(0x7f0000001980)="9c926f01f91fcc57efeacdaad57415c9fca4", 0x12, 0xffffffffffffff86}], 0x2200000, &(0x7f0000001ac0)={[{@dots}], [{@subj_role={'subj_role', 0x3d, '*/'}}, {@pcr={'pcr', 0x3d, 0x4}}, {@dont_hash}, {@subj_type={'subj_type', 0x3d, '-'}}, {@hash}]}) openat(r7, &(0x7f0000001b40)='./file1\x00', 0x4000, 0x14) sendfile(r6, r5, 0x0, 0x7ffffff9) 18:30:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x0, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:30:49 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r1 = creat(&(0x7f0000000080)='./file1\x00', 0xa4) pidfd_getfd(r0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r4 = fsmount(r3, 0x0, 0x88) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = syz_open_dev$vcsn(&(0x7f00000002c0), 0x0, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f0000000040)=0xf800000000000000, r5, 0x0, 0x8f48, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/183}) r6 = openat(r4, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r1, 0xc0406618, &(0x7f0000000300)={@desc={0x1, 0x0, @auto="f5dd543f9489b966"}}) sendfile(r2, r6, 0x0, 0x100000001) 18:30:49 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x0, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 2936.543443] cgroup2: Unknown parameter 'ÿÿÿÿÿÿÿÿÿÿÿÿÿÿ' [ 2936.578720] 9pnet: p9_fd_create_unix (16071): problem connecting socket: ./file0: -111 [ 2936.586333] 9pnet: p9_fd_create_unix (16076): problem connecting socket: ./file0: -111 [ 2936.664116] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2936.710898] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2936.714132] 9pnet: p9_fd_create_unix (16094): problem connecting socket: ./file0: -111 [ 2936.735080] cgroup2: Unknown parameter 'ÿÿÿÿÿÿÿÿÿÿÿÿÿÿ' [ 2936.759469] 9pnet: p9_fd_create_unix (16098): problem connecting socket: ./file0: -111 [ 2936.783856] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:30:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r6, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) bind$inet6(r6, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 18:30:49 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000a00)=0xe8) openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r1, &(0x7f0000000a40)='./file0/file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r4, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:30:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x0, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:30:49 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x0, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 2936.918076] 9pnet: p9_fd_create_unix (16102): problem connecting socket: ./file0: -111 [ 2936.929674] 9pnet: p9_fd_create_unix (16106): problem connecting socket: ./file0: -111 [ 2936.940559] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2936.962830] 9pnet: p9_fd_create_unix (16108): problem connecting socket: ./file0: -111 [ 2937.019693] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2937.023052] 9pnet: p9_fd_create_unix (16102): problem connecting socket: ./file0: -111 18:30:49 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000400)={'#! ', './file0', [{}, {0x20, '#!\x86+\x9aY\x88i\xa4\x82\xa7\xa8:\x1e\xd2\xd9\xb7'}, {0x20, 'iso9660\x00'}, {0x20, '}\x93#5\x86\xf6j\xf84\xc7_\x90\xa6\x80\x15\xb2\x1b\xfe\xa2p\xabu\xc5\x8e0\xa3Y-\x81\xe3\xca\xa3\x8b(\xfa\x1f\xb8\x16\xfbMM\xf4N\xe1D\t\x9f\x9b\xd02\xa1\x04*\xe7\xa4\'gB\x11\x8c\xfa\x12\x1c2\xfd\xd0\xe8X\xf9\x19\v\"z\x13'}, {0x20, '~c\xc4y\xf5\x9b\x14I\x8e8\xbfq\xd0\xc5#!'}, {0x20, '#! '}, {0x20, '/'}, {0x20, '#! '}, {}]}, 0x8e) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f00000001c0)='./file1\x00', 0x100000001, 0x21, &(0x7f0000001640), 0x30058cc, &(0x7f0000000140)=ANY=[]) r5 = openat(r4, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) [ 2937.061875] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2937.145534] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:31:02 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000140)="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", 0x1000, 0x5}], 0x0, &(0x7f0000000040)={[{@shortname_mixed}], [{@mask={'mask', 0x3d, '^MAY_READ'}}, {@appraise_type}, {@obj_role={'obj_role', 0x3d, '-'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '-'}}]}) 18:31:02 executing program 6: r0 = socket$inet(0x2, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000040)=0x2284, 0x4) io_submit(0x0, 0x7, &(0x7f0000000ac0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x7, 0xffc6, 0xffffffffffffffff, &(0x7f0000000280)="6ac1407c687247ae00147d6eae146bfcc143dff61625e47d8d63e7e5e7cb7219f4f0c3", 0x23, 0x1, 0x0, 0x1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x2, 0xa6d, 0xffffffffffffffff, &(0x7f0000000340)="588afc60980cfa1b4fd19b18ff7b20f108090c727c8ed4583bff070c74c52b2153b54e2ce2ad6bb726cd5e3f5f9ca73de44aa287546cf8a6c13fa0578299cfa8ac70af1b66bbe54117a6cb0ad8914c331475f8724c3d51bd8ffcb2abb4d9b2958814fee8bce23407ec7084ef105d8ceba1516cf0d0f08b12987c35f47572735dfcfeba502d8f795db091da0937d907568f2d12220a8b3623adeab5f804c8eeaef3750cec137f088cc8f8300809497885", 0xb0, 0x9, 0x0, 0x3}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x2, 0x8, 0xffffffffffffffff, &(0x7f0000000480)="2256e01f1a0013649dc2a188954c32fb4166c8db60fda81388946f70236dbe9aa10a6572778c203902ea3139d485df6e7ff7f01c52aec4437c481a06a5ecb13385cced8de3705653f060fb33e133a3541214e816bc3842f300223d065e29d606ddbc9e7c892e54379ddb4ad1e1d9c0c7c4e0e0ce00fe4354ca82015d67b2d32259c1a3e81469344769ad14a0378940da43ebc67db3b83aa6ea37966df0d1fea73f", 0xa1, 0x9ad, 0x0, 0x3}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x7, 0x7, r0, &(0x7f0000000580)="734ac77d500fc538446e896b32fa4f2044f95b6215467eae795da11a7e102579e689cf6b93e5d5eb5db1aa9d1e46278544be83d77bf4b3ef99487f26400aae15f7975e2f78e46d8760247950374c878679c02d63c911b4a543ef67dc58cfacbd7e8556b2501984e47f1e98c95a5c73ebac1cde22fd18afb958417c2f5f38aaedc9c92f284657d9da9117d6d59ebffbc18e1a566a50db557b67bb87a67f044275649ac5d851101175864587e541b94caf3cdacefb2a6cd52160d1dafc1ed1995c5446a3f26671bf469fe795fb23147040bc2fd836f4edd76dbdf0577da480177a0686ded4523a7485fbabfde0ee25f8677976f1c58335", 0xf6, 0x9, 0x0, 0x3}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x1, 0x2, r0, &(0x7f00000006c0)="48256681d74c89f0db855a865b5da6090bea", 0x12, 0x8000, 0x0, 0x1}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x7, 0x11, r0, &(0x7f0000000740)="5808966ba5518eb1b4aaf62924bdba47928ff9ab14bba1d301199b0e41ca53c62e0401989bb0e88a7fef1aba2383dabeb1b191d205214492a743b13ed6acd5a55e913aed332a43741b839c270bf89322f3751c876e5f258d5f9c6d70d9d7da14dd3a1c7efea4fa17857b2d52af9e0d04e0d7c19fbb88af51d8e3a31c07d16cb9fde25df3a4b86ed7bb71fc3d580e5881faee5daff633dbc2196d32fa8fd6731a66fd5469294bb5314df6705b174ab6e90e202ab1d567ca8b9111fc732bbac19a373fdd42511eb4e9d7949a56cef88af501", 0xd1, 0xe86a, 0x0, 0x1}, &(0x7f0000000a80)={0x0, 0x0, 0x0, 0x2, 0x9, r0, &(0x7f0000000a00)="d215f4cfd9f1944f6009acecad8fd85f6f550e5cdba6320b6af5fe3ba918a8df949aaac67b522e8e53ae2c5b04d6a77bb27a03145f2197fb5f8b34e685c885f310363e2f29b36e7578b19232d5c7f72b40384c3a4860ee2991c3d638c7ffad63a155c06144ec99e5b0ff1c2095bbe4e15aa16c6b7ddf831707ddf3a7", 0x7c, 0x8, 0x0, 0x2}]) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev, @multicast1}}}], 0x40}, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000009c0)={'ip_vti0\x00', &(0x7f0000000b00)=ANY=[@ANYBLOB="73797a74546c3100000000000000010000000000000037e6d4c8070000", @ANYRES32=0x0, @ANYBLOB="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"]}) r4 = socket$inet(0x2, 0x3, 0xff) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f0000000040)=0x2284, 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'veth1_to_batadv\x00', 0x0}) sendmsg$inet(r4, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev, @multicast1}}}], 0x40}, 0x0) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ec0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000f00)=0x14) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000fc0)={'ip6tnl0\x00', &(0x7f0000000f40)={'ip6tnl0\x00', 0x0, 0x29, 0x3, 0x9, 0x4f9e, 0x28, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x40, 0x7800, 0x7fffffff, 0x8000}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001080)={'syztnl1\x00', &(0x7f0000001000)={'ip6_vti0\x00', 0x0, 0x2f, 0x1f, 0xf6, 0x4, 0x8, @ipv4={'\x00', '\xff\xff', @local}, @dev={0xfe, 0x80, '\x00', 0x1d}, 0x40, 0x20, 0x0, 0x1a64f0fa}}) sendmsg$ETHTOOL_MSG_DEBUG_SET(0xffffffffffffffff, &(0x7f0000001100)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000010c0)={&(0x7f0000004180)={0x1268, 0x0, 0x420, 0x70bd25, 0x25dfdbfb, {}, [@ETHTOOL_A_DEBUG_MSGMASK={0x36c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2a033f42}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ']\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0xfc, 0x3, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9266}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2a}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xd29a}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x3c, 0x3, 0x0, 0x1, [{0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}]}]}, @ETHTOOL_A_BITSET_VALUE={0x53, 0x4, "91fd46c66688a1cdb20eed6b040163cf525f98eea5b8de3f3fed50255a218fb4e66afc3d3317352688c406673b833e2238cad7c0a113604f05ca9fa9b8b73bb2071e92170386cbda732c1f7ff13556"}, @ETHTOOL_A_BITSET_BITS={0x148, 0x3, 0x0, 0x1, [{0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffff7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '*[/%\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x101}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}]}, {0x4}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '(,*(.#:\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ']$\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}]}]}, @ETHTOOL_A_DEBUG_MSGMASK={0xec, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x82e3}, @ETHTOOL_A_BITSET_BITS={0x28, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000000}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_VALUE={0x3b, 0x4, "974b512cf40b44b4dc5f2251f16b4f297ed63d178e8e9bac68cadd31f19445d36ed94d3f50a6cf3f132ef8da6ca5379b6cf66f99062eaf"}, @ETHTOOL_A_BITSET_BITS={0x7c, 0x3, 0x0, 0x1, [{0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ',/#%\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1ff}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc566}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '..$]\\&\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '\x1b\\.!-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_DEBUG_HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x4}, @ETHTOOL_A_DEBUG_MSGMASK={0x55c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x50, 0x3, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffb}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf9b7}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '-&:!){+%%\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x7fff}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0x98, 0x4, "7eaf43fb14828829e70e2c059f1a7e72ae1cbdd38a6b4a2bc9884f2205a303f8755fc602d95d6d6f85b5b4e60bf3a247e3ab9a6834b489997dc57b98212f439a5841ef7e6fd82633d4fcb42d93e747893979a60c7e632786e378c2f3e251f8d551f534a8ef78beb0e1e896a0619c638e5886732add69809b29930c0cb1a88937bd3ede3151fb3705baf85e5393b26aad95ec2e9d"}, @ETHTOOL_A_BITSET_BITS={0x120, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xd2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '/\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xe16}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '/\xea/#%\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '@].-($\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}]}, {0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '\\%\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '+\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff0000}]}, {0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '-[\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\\{^\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6b6}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '[/%\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}]}]}, @ETHTOOL_A_BITSET_MASK={0x99, 0x5, "70a0034bf83d9a6cfa09a24257992e890c7869d9a080b8872f8b5d0c0fa09bc8b7648428bc395ab0871bdb8819c905a7eab9032c01df54a87b4c46cef2e59f12dd4dcff33a342dc02842ff799c702b1fcb97fb822005ccdde89339026b253828b05dcee3f1c209bd57b88c1adde0c65aadeb79e61c045769bbcba42ef9be2bbca43afa5300a322ea9eee8ad90abecdd84b519475bf"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0xb4, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x401}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '].#]\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3e03}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}]}]}, @ETHTOOL_A_BITSET_BITS={0x1f0, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '/,}&+@+\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ',\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80000001}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x54, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\'@-\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fff}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '%$]%\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ')$\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x64, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '\x84hvtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3ff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, '&(%:/@.\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x77}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}]}]}]}, @ETHTOOL_A_DEBUG_HEADER={0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r6}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_DEBUG_HEADER={0x84, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge_slave_0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x36c, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x40, 0x5, "98431f8f3d51b6d8a89fdbfc648f4a1a6eb9e3cc657fd9d262f5a62d75f44c55d399d85266951704758907a6821b39e515eb66791173fe9b57e41755"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}]}, @ETHTOOL_A_BITSET_BITS={0x198, 0x3, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '[\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\x04@-\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, ':/\xb4 +{\x00'}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}]}, {0x58, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x100}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '([[]\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '%#@:-!.&\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1200000}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xe, 0x2, '!,.\\#\'&\\:\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x401}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xbce}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3d8f}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xa3}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xeb8}, @ETHTOOL_A_BITSET_VALUE={0xdc, 0x4, "fdd5b1aa234ff9bf50787f7974135d9aab0f4e1f34cd67fac5a142cd55988d1e8270de9b7547cb17cf0801cb2f4e53b1b1ff4fe0c15f888f774ad7eab3ab74461d00a8dad37acfd016ca9d0dbcc98bcac2afdb520f2e0859f9974d54c88f79c35ad3762535d1c6cbc1693c16e856907392cd02d142f1b2c043772a170851f05e57cf1b78f70769acefd0f3be5bb91d3b2e73140a5000b8ba854a329b7aabfe02310d289ac5ee8d21d6998278b64433495a6f3d055af097769cb2fee893dfcd75782ff815df22644e1418e0dbbecbbfe1d7029e5680f34ec4"}, @ETHTOOL_A_BITSET_MASK={0x96, 0x5, "25c3b7106f1fa5213fb4b80c1832cc9ba6e0e46986e77fddd8f0a03920c2d996f835c24ca8a0add66d8b4b1919dbce1445535e5b1a56b436b20e580f0a1e2e299a7ec95d2a1f4f9764b7b306f9eb71abe5b58ab63fd7a8f970b44887582c322bb78cd321863c5a27a7582c1693e9854df10ea2819fdd3064e9353a64d20165e846cd7072526a6146f6038541ae220d63e9ba"}]}, @ETHTOOL_A_DEBUG_MSGMASK={0x430, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffb}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '3,-{\'.\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '+],%\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '!\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_VALUE={0xf8, 0x4, "fae83623649767071dc46dc8826834530bba96d14e389b8df99e5082256125ae655d9195db4ff55c5dbab0413ae1ad313a6a7e258b1a2352a97c4e26eee3532cc32d2a243aadbade4714c383f2dcbf918637c940bca5c70e04ba9a816b2a2a4e1fc9242050479207110115acdf91aec305a773a7fc7c099904ae9da0e5c43a172abb44ff5cab817332825e6736d46fb6588c04188d6d44bbdcb6361c494fbb4650b6b247db3e5996c1c07fa68a8ebbaa5f9a00912f3d2235c1e1509eebde949b984d0bcc7e94e2978a32221716bfeec337d44680fcf07651707a44f1a99cbc99d86291a14ef575b72b7233bc7c498181793554bb"}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x190, 0x3, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, ')\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '}\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '+.\xa1\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}]}, {0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xc3}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, ')!}&\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, ')}[\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x82}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffff}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '}-.{&\x00'}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3f}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5a}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '\xbb\x00'}]}]}, @ETHTOOL_A_BITSET_BITS={0x10c, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x3}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x400}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '.-],+\\)]\x00'}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '&\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '(N\xb3\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\xfe{*\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1b}]}, {0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '#\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfc00000}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, 'devtmpfs\x00'}]}]}]}]}, 0x1268}, 0x1, 0x0, 0x0, 0x24000800}, 0x1) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='devtmpfs\x00', 0x1000800, 0x0) r9 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) getdents(r9, &(0x7f0000001180)=""/4091, 0x18) 18:31:02 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000600)='./file0/file0\x00', 0x4ec982, 0x96) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) io_cancel(0x0, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x8, 0x3b, r2, &(0x7f0000000a40)="1a3450581fb4ef9d47edbe6185b62d2761a37f0d119d61e80ca9f098650a7fcef3eeb92c90028ae47e62026bbeb266c393b379035e932fbea576234a238ffad74c75ec68aff847e91e995b2e6fc478f1ce06bcc3d0fa4e66e174aeab7b3842486d8b4992c1eb27128db32b614233e2e685719a2ca229e17fd7a36a69", 0x7c, 0x2, 0x0, 0x2, r4}, &(0x7f0000000b00)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 18:31:02 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x0, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:31:02 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000340)={0x4, 0x80, 0x0, 0x83, 0x80, 0x3, 0x0, 0x781e, 0x1564, 0x6, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x30128, 0x2, 0x1, 0x4, 0x81, 0x210a, 0x1f, 0x0, 0xfff, 0x0, 0x400}) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) syz_mount_image$msdos(&(0x7f0000000400), &(0x7f0000000440)='./file0/file0\x00', 0x7197, 0x2, &(0x7f0000000580)=[{&(0x7f0000000480)="42f52b18f5f4ac23affb9869dbdc0144de32a118e0762cb1b09e5f9845b70f75147e11c787b7bebc944b4df0983a12d5c66a56de3767d24996843a795d167fc8689fc3c5b02c7b45b94133c4d6308f74d0b467d13bd1e09915b8bf05cf77bce984dc78eee15d96afb51c1b899267ad89775d1ff11d45d67b0e2b64119292f8bea915cd63080a47def6a48b337f3bf0020fa306136f5d0be7d4f87eb7f15abef8cf8fe01e12a8c3e9b89aa29358b3685614e1e0cd1275bc7b2deb1659", 0xbc, 0x61}, {&(0x7f0000000540)="44e99510d5062c454f45dc1b9b4882af968a06740e3df973e852ac5eb3c952aa54ae74429eb3f1c08a2fbbde24bb5a1961debcd3", 0x34, 0x8001}], 0x40800, &(0x7f00000005c0)={[{@fat=@dos1xfloppy}], [{@smackfsroot={'smackfsroot', 0x3d, 'iso9660\x00'}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) open$dir(&(0x7f00000003c0)='./file0/file0\x00', 0xa1840, 0x40) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:31:02 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsu(&(0x7f00000002c0), 0x80, 0x88080) getdents(r2, &(0x7f0000000a00)=""/92, 0x5c) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r5 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r5, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r4, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r6, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r7, &(0x7f0000000200)='./file0\x00', 0x86) 18:31:02 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x0, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:31:02 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r2, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r5 = dup2(r4, r3) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r5, 0x0, 0x7ffffff9) [ 2949.767111] 9pnet: p9_fd_create_unix (16138): problem connecting socket: ./file0: -111 [ 2949.803086] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2949.810763] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2949.814028] 9pnet: p9_fd_create_unix (16145): problem connecting socket: ./file0: -111 [ 2949.818367] 9pnet: p9_fd_create_unix (16152): problem connecting socket: ./file0: -111 18:31:02 executing program 2: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000001c0)={{0x2, 0x4e20, @empty}, {0x0, @local}, 0x28, {0x2, 0x4e22, @multicast1}, 'veth0_to_team\x00'}) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) writev(r1, &(0x7f0000000180)=[{&(0x7f0000001380)='>', 0x1}], 0x1) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) dup(r2) sendfile(r0, r2, &(0x7f0000000280)=0x3, 0x7fff) r3 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x60) mount$cgroup(0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, r3, 0x0, 0xffffffff, 0x8f1, 0x4}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x81, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) 18:31:02 executing program 6: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r0, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000180)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="01000093cd0000000000007144220d00030097e9cea7d71c7e307108df73cd40025c6ec1b6fbd6fa8e7d00286bfe477a68310aebf47b605f95228cf1abb0ac9a4742911c61a97515e10366594aac", @ANYRES32=r1, @ANYBLOB="0c009900000000005500000008005200", @ANYRES32=0x0, @ANYBLOB], 0x30}}, 0x0) [ 2949.903245] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2949.912167] 9pnet: p9_fd_create_unix (16160): problem connecting socket: ./file0: -111 [ 2949.930173] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:31:02 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) r3 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000a00)='./file0/file0\x00', &(0x7f0000000a40)={0xac042, 0xa5, 0x4}, 0x18) renameat2(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', r3, &(0x7f0000000a80)='./file0/file0\x00', 0x1) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000ac0)=0xe8) r5 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r5, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000b00)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r4, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB="2c726f6f74636f6e746578743d726f64742c0067d816884acc2cac5b2b156dd040cd5500d425e14d6702a07f0d03fdd938dce55d95ca9e148c56508e7c6bf4c2588a06cf3086f83ba6821093bb9624c8726307dbd92715783eb276ebef645ecbf72e920e944c5dfce60d583cb52a9f9f61f78dc3d0134546cced8689d661ea2953d3374c5c59abea93db799db7a83ade65608bce64fec9cd911b31"]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r6, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r7, &(0x7f0000000200)='./file0\x00', 0x86) 18:31:02 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x0, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 2950.022961] 9pnet: p9_fd_create_unix (16166): problem connecting socket: ./file0: -111 18:31:02 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x0, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:31:02 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(r1, &(0x7f00000017c0)={0x11, 0x0, r3, 0x1, 0x0, 0x6, @remote}, 0x14) ftruncate(0xffffffffffffffff, 0x1000003) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000200)) r5 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r5, 0xc08c5332, &(0x7f00000000c0)={0x0, 0x0, 0x0, 'queue0\x00'}) sendfile(r1, r0, 0x0, 0x500000001) 18:31:02 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000f00)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edb7e526f7904f66a78eaef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc3a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2ddf0f60fd762c414a9f51f905e383381a1a99ac46abc80c97f33a36163bbd76ccc8ca4e6d71051c1f4048bdb6acba528ffac61c322bd2c1c56abce7f0ae7ea9c2d53aa5ee6b70ba4fe9efe8b02afd8691516f4349b9cf00a9c2d9f441e106f07ec8fe67e40531d0735b550af65c0c6eae412926bf6da26e8b58f0000489e5e1ec7258b9f6c2fc9937848231e4189cc951e4dd2e1264c2b6bc738e4fd8d975d9f588ef88d65b3325121028d4f7f6c95e8ba309f6577d65497b6044adc31da588f5473991d1ead993b702667806dd8fae7795967c561e89e7e0493f12f6b9da03f050f4b119adc374d6e4b06636d3bac62e5a21dd84235da366298ac81c225b21405ade5595c7d2535b10ee12f73d3eb6aba5d3f0831ea6b86877fd3e9e5e8"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000a00)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x1}}, './file2\x00'}) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000a40)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 2950.154027] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2950.181210] 9pnet: p9_fd_create_unix (16175): problem connecting socket: ./file0: -111 [ 2950.183787] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2950.245346] 9pnet: p9_fd_create_unix (16182): problem connecting socket: ./file0: -111 18:31:03 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000140)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r0, 0x3, 0x0, 0x18000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r3 = dup2(r2, r1) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000480)=ANY=[@ANYBLOB="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", @ANYRES16]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff5) 18:31:03 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x0, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 2950.335049] 9pnet: p9_fd_create_unix (16182): problem connecting socket: ./file0: -111 [ 2950.378827] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:31:03 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) mount$cgroup2(0x0, &(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40), 0x8000, &(0x7f0000000a80)={[{@memory_localevents}], [{@subj_user={'subj_user', 0x3d, '\'[!!'}}, {@dont_appraise}]}) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000ac0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r3, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 18:31:03 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') openat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', &(0x7f00000001c0)={0x40040, 0x82}, 0x18) getsockname(0xffffffffffffffff, 0x0, 0x0) link(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file1\x00', 0x84502, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = dup2(0xffffffffffffffff, r2) r4 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r5 = dup(r4) getdents64(r5, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r5, 0x0, 0x0) openat(r5, &(0x7f00000003c0)='./file1\x00', 0x4000, 0x100) sendfile(0xffffffffffffffff, r3, 0x0, 0x7ffffff9) perf_event_open(&(0x7f0000000240)={0x4, 0x80, 0xd2, 0x2, 0x7f, 0x20, 0x0, 0xf04, 0x100, 0xb, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000200), 0x1}, 0x40000, 0x600, 0x1000, 0x7, 0x5, 0x80, 0x2400, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xd, 0xffffffffffffffff, 0x1) sendfile(r0, r1, 0x0, 0x100000001) [ 2950.443600] cgroup2: Unknown parameter 'subj_user' [ 2950.459458] 9pnet: p9_fd_create_unix (16197): problem connecting socket: ./file0: -111 18:31:03 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xfffffffffeffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='#! \r/file0\n'], 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0xaaaaaaaaaaaaabf, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x8, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) [ 2950.525499] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2950.547690] cgroup2: Unknown parameter 'subj_user' [ 2950.559265] 9pnet: p9_fd_create_unix (16197): problem connecting socket: ./file0: -111 [ 2950.565986] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:31:20 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup(0xffffffffffffffff) getdents64(r4, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r4, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x5, 0x80, 0x80, 0x7, 0x1, 0x1, 0x0, 0x2, 0x4, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000140), 0x4}, 0x2089, 0x7, 0x0, 0x3, 0x5, 0x3, 0x9, 0x0, 0xff, 0x0, 0x1}, 0xffffffffffffffff, 0xf, r4, 0x10) r5 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r5, 0x0, 0x7ffffff9) 18:31:20 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x0, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:31:20 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee00, r2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r3, 0x0) setresuid(r2, r3, r2) sendmsg$unix(r1, &(0x7f0000000380)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e23}, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000100)="f67834a9dc46d0e8e50a055bdf110c8f091b892304f30e3b58eb93829ad3bc1022a90d55fa75203c03c1fc9a7aa0f0926b6c8926257ebe1afa29bd35861cc521cd19d4e546401075356b9b9eafd2c942ce0b3473b7672c7f9a9641ac93fd662d1fd333443671ffc74eb88c314e4d7c3bf6fd1aeda72bdbb5c5a2575bfffed874b18545444d74c5ff", 0x88}, {&(0x7f00000001c0)="52bec037cf82b8bc2b79323c4bd7027d22bb8a3920ddbf32924ef2ff292539c97a2e7bd212369b6efd8ca690d3266fbaa2479543ed350ff3e02bbf0b3a72ef92363fd37ddf47920b9f827f0a95", 0x4d}, {&(0x7f0000000240)="f6cc1932a039ad675c4a808481876874bfcf81f3e008205f1574a9057a68d387f4c3c651d80d04fd0383274a436b02c7501edeaad2f65f168a5b13c146aa17b8200fef6b55fdfabd74bab5849f0562cff68f7bfe448180823a9eeb8866e3831226d668a9f52ee6e58bab026a4ecac3773bd83b3253085e6cc487a1c315b815", 0x7f}, {&(0x7f00000002c0)="8351ea92fec851c64ca251dc148617ca9b7bfd922ac953c793a58a0064bbcc353b7ea0df88388ad48db453faf9986ee7559356d624259e725fbd2a6e162b7fcc2ca1af0f6e7e0565a82393ba22031e76bbb72059c05a0d0f015f334a", 0x5c}], 0x4, &(0x7f0000000340)=[@cred={{0x1c, 0x1, 0x2, {0x0, r3, 0xee01}}}], 0x20, 0x10}, 0x804) sendmsg$unix(r0, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) r4 = dup(r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmmsg(r4, &(0x7f0000007940)=[{{0x0, 0x200000, 0x0}}], 0x500, 0x20000022, 0x0) 18:31:20 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) socket$inet(0x2, 0xa, 0x0) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1226}, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:31:20 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file1\x00', 0xfffffffffffffffe, 0x0, 0x0, 0x800022, &(0x7f0000000d80)=ANY=[@ANYRESHEX, @ANYBLOB="acbf8f699fa2b5a500fdfe1cc026b5a11f8f7e7ca98671592b5f0b5f236d0b8f17bffe1141a9b323ab8c6b6dafca351199e4cb1128b1fdb5480f5e8597b3b98acf17d1cb329efc55439ec8930016410ea11bf2cfe8e75a04ce5f09a479aafe0ec429292afcf37722764143eab503fb6950e43174c247325aada7a50210298562abea8991db429a8ea8adf64548acddcb1b9a730e60798113c451786d8dff21b72688b40828f8f3b27f19d8bbafbf0ce4d4765e80769bead8ccf48677bdf88ffbae24bf5c10bd5218fc87ce0f9b4276a12ca2af9a28280cacc9a8ffb73fbea7906d5d4b0dd2766cd05d", @ANYRES64=r0, @ANYBLOB="1d24ac92e5a86de8a69f5e13885e220d223f807c3de73f88b4083ddfda9580a3e033c481565bbd9366e2e18299d1ea653f3641f1da4a8bacddce57f55e1fb6233e4b9fb86cd1b6b6c6c24697076ddb56905ac44326cff79041ec2a6da348ffecfc13f0eeec94c3a877f6ad5b32ada273c3293aaafddc3df202eecd09b1916d86dd6ac637c133efbd91501d7a2a3a661b69f8626b24954a61ba728de0dd936d1cac356506146612e658e27b927d723c4c65bd72ce2955781652d1162813c3ec2bfb6e72b11b32c7aa8b", @ANYRESDEC=r0]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) dup(r3) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xe8) r5 = openat$cgroup_ro(r2, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r5, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000a00)=ANY=[@ANYBLOB="7472616e733d756e69782c6163636573733d757365722564656275673d3078303030303830303030303030303030362c64666c747569643d28bf07a60446df254e299a88fd2d8bf2d56394b9346310a05daa6e48baea76acfeb8aa4337267882ee5f0ee2215f782c5f13c4555e4c707470a911a648490ea570f7bb42a08fd7e673d48b3197983688cf6eb1544280934b3b4ae192a16060fe531c6577b0520b09f391e0f06706645b63ebeed482d7d06820eeb977d278b11f1abb4b20276b3f80219cce6d6a9c5262715b67ffa82ef0ac7eeca0daf54b70f18e355f6f4df17fecfd53f6a3c407e3911084b68a3bb6a70b", @ANYRESHEX=r4, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYRES32]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r6, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r7, &(0x7f0000000200)='./file0\x00', 0x86) 18:31:20 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x0, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:31:20 executing program 6: r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0xe1) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0xf50f, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x4000, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) fallocate(r1, 0x2, 0x2, 0x6985) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCSPGRP(r4, 0x541d, 0x0) close_range(r3, r4, 0x0) getdents64(r2, &(0x7f00000003c0)=""/151, 0x97) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) sendmsg$nl_generic(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="300000001e00210c00000000000000000a000000050200000011007f14000100fc020000000000000000009b64021f48882a1bbcbb77000000000030209d1d7adc340ae94b31179c64fe9703529667a456fb214d3e6c7e2be27289a8efe4c1d8d24562cb02349257010b2105611bbb3402efdb3d0596a43b83973d9a0a20cc3c22aa"], 0x30}}, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f0000000080)=0x5) preadv(r6, &(0x7f0000000340)=[{&(0x7f0000000080)=""/190, 0xbe}, {&(0x7f0000000140)=""/227, 0xe3}, {&(0x7f0000000280)=""/45, 0x2d}], 0x3, 0x1, 0xb6f1) close_range(0xffffffffffffffff, r3, 0x2) unshare(0x48020200) 18:31:20 executing program 4: perf_event_open(0x0, 0x0, 0x5, 0xffffffffffffffff, 0xb) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x10000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r3, &(0x7f00000003c0)=ANY=[@ANYBLOB="7b1c00772f7ddcf804710321ecc8e1436f94aa1eb8967cc68b094cefe625a4fdb72dbe52c1e3b56bbc3882b3c1af0fa8414a8e8a", @ANYRESDEC, @ANYRES64=r2, @ANYRESDEC=r0, @ANYRESOCT, @ANYRES32=r1, @ANYBLOB="233552adf53a12d349161ceef668", @ANYRESOCT], 0xb) fallocate(r3, 0x3, 0x0, 0x18000) bind$inet(r3, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) dup2(r5, r4) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a87a8cb4ffa40981e", @ANYRES16]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r4, 0xffffffffffffffff, 0x0, 0x20000007ffffff9) [ 2967.570211] 9pnet: p9_fd_create_unix (16231): problem connecting socket: ./file0: -111 [ 2967.576452] 9pnet: p9_fd_create_unix (16223): problem connecting socket: ./file0: -111 [ 2967.691671] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2967.701774] 9pnet: p9_fd_create_unix (16223): problem connecting socket: ./file0: -111 [ 2967.718067] 9pnet: p9_fd_create_unix (16250): problem connecting socket: ./file0: -111 18:31:20 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="23212f2e0700696c65a867123e18f2abf9292a4f518fb448300a"], 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec1bb0850db0b56149a2b95f68f92a4981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) [ 2967.768816] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2967.776182] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:31:20 executing program 2: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) inotify_add_watch(0xffffffffffffffff, 0x0, 0x2000000) syz_open_procfs(0x0, &(0x7f0000000200)='net/route\x00') r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = dup(r0) getdents64(r1, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r1, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000300)=""/4100, 0x1004, 0xe9f) inotify_add_watch(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x81000b5c) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) r2 = memfd_create(&(0x7f0000001340)='#\xd5\x81\x9b\xd0\x7f\x04\x001tM\xb6]\xc5\x8a\xbc\xbcI,\xb8\xca\xafa\xef\xfa\x9d\xeex/\v\xf4\xd2\xd1\x80\xa8\x80\x8b>\x18\xa3\xc5G\xdfZ\xafF.\th\xb8\xb8\x03Q\x88j\x8b\x89%N\xcb>;5>\xff\xef\xc8\xd5\x00\xc2 \xb1#4\x93\x1d-\xbd\x8dT\xe0\xf6\xfc\xac$d\"\x9cG]Wx\x1d\x94w2.\x87\xa2\x19d\x1b\x104,E\xa3\xe2~\x91F\t\x87\x02\xf1\xa5\xc9', 0x0) pwritev2(r2, &(0x7f0000000080)=[{&(0x7f0000000100)='Z', 0x1}], 0x1, 0x0, 0x0, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r4 = dup(r3) getdents64(r4, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r4, 0x0, 0x0) r5 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000240)=0xffffff45, 0x40800) getsockopt$bt_BT_SECURITY(r5, 0x112, 0x4, &(0x7f0000000180), 0x2) finit_module(r2, 0x0, 0x0) 18:31:20 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000300)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfffffff8}}, './file0/file0\x00'}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r0, 0xc0506617, &(0x7f0000000a40)=ANY=[@ANYBLOB="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"]) unlinkat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000a00)) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r3 = openat$cgroup_ro(r0, &(0x7f00000006c0)='blkio.bfq.avg_queue_size\x00', 0x0, 0x0) openat(r3, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r0, 0x40106614, &(0x7f00000002c0)) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x87) [ 2967.865873] audit: type=1400 audit(1682965880.587:26): avc: denied { module_load } for pid=16258 comm="syz-executor.2" path=2F6D656D66643A23D5819BD07F04202864656C6574656429 dev="tmpfs" ino=2210 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=system permissive=1 [ 2967.865879] Module has invalid ELF structures 18:31:20 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x0, 0x1000}, 0x4) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000000)={0x4, 0xffffffe1, 0x81, 0x2de, 0x4}) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 18:31:20 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x804002, 0x42) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 2967.949892] 9pnet: p9_fd_create_unix (16267): problem connecting socket: ./file0: -111 18:31:20 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x0, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:31:20 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:31:20 executing program 2: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=ANY=[@ANYBLOB="38000000000101040000000000000000020000002400018014002995480878e6b0018008000100ac14140008000200000000000c000280040001"], 0x38}}, 0x0) [ 2968.016262] 9pnet: p9_fd_create_unix (16269): problem connecting socket: ./file0: -111 [ 2968.024852] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2968.033064] 9pnet: p9_fd_create_unix (16273): problem connecting socket: ./file0: -111 [ 2968.035604] 9pnet: p9_fd_create_unix (16274): problem connecting socket: ./file0: -111 [ 2968.172303] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2968.227148] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2968.250683] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:31:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) unlinkat(r2, &(0x7f0000000a00)='./file0/file0\x00', 0x200) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:31:35 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x101002) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000003c0)={0x53, 0xc633703baeff4a4b, 0x6, 0x0, @buffer={0x0, 0x0, 0x0}, &(0x7f0000000100)="ed9164cf9226", 0x0, 0x0, 0x0, 0x0, 0x0}) write$binfmt_aout(r0, &(0x7f00000003c0)=ANY=[], 0x126) 18:31:35 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r0, 0x3, 0x0, 0x18000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r3 = dup2(r2, r1) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000540)=ANY=[@ANYBLOB="6ab3d3e33078f930bd7dfcfc17df19e5c5c98b3bb77e88a5b0efaa18ea6b511cf19e5809c0757c2a5fc88a8c0689f1c70a434c13b80314dd16044ac5f999eb9197965334dce200a4a2f86038a742ab22a3c3bf14bd798cccd38c69e5792ffc6a8e84c9bd36b2c6d32d213a93bf5533df5ada7cc10c6d735b291ca25c5e3756c0bdc86a534f6347d61431b26f572287f359bc4284d8f5a696a42009144007732e9f77ae5bddb9694fd4de8eea7a01dfddb758328eb6f5fb0d27abc9873b234732883172af6192825f35a7f92bd6a42a072918eae1d4c36efc21df2ee84cf93c74c187bed0a0eb855c5192c2a56772c46d5244750d26ccadcdb49bd0b94cef31b80efdea9c0fc188cf9f41c85a9aa282797853986bbaddaad9d3d3944e76abaffa9998d6b4dee0b4d5b43d2595b1b116ee5583182200c1205eaf372f83875a3541a3b35d2b7ae397e38d2d08323f283ba1cc4fa0abe5c530d75f603b106b546f0d7d58fc2ee08a51058bf3d974ee7a2638a3f7bbe7bf96bece0996d211ea58c27bc3c2537bc1a46375e5e86207c921f65c8c264c765fda8b2b0b3910406994969edffc183f1b48b9ca1cb57651bfd58dfa848cd5009021e750a7c8298c84ad26f16505803ac96508e00e01bf5be841c47c2a7741dc571abd0007e897853e7b543b235ef6a77b37c68e", @ANYRESDEC]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) 18:31:35 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0xd3, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x3, 0x0, 0xffffffffffffffff}, 0x0, 0x3, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000140)={0x0, 0x0, 0xfffffffffffffffd, 0x3}) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:31:35 executing program 5: mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:31:35 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x0, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:31:35 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:31:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xeee2, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x110, r0, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) close(r2) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xfdef) r4 = syz_io_uring_complete(r1) ioctl$BTRFS_IOC_DEV_INFO(r4, 0xd000941e, &(0x7f00000000c0)={0x0, "3258a23099f5cfb1165902c2b9322eb0"}) ioctl$BTRFS_IOC_DEV_INFO(r4, 0xd000941e, &(0x7f00000010c0)={r5, "ae1ae410294f8658fa3dfc36239c37a0"}) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r6 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8001) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r6, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x6}}, './file0\x00'}) [ 2982.838795] 9pnet: p9_fd_create_unix (16310): problem connecting socket: ./file0: -111 [ 2982.845346] 9pnet: p9_fd_create_unix (16298): problem connecting socket: ./file0: -111 [ 2982.846747] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2982.856972] 9pnet: p9_fd_create_unix (16310): problem connecting socket: ./file0: -111 18:31:35 executing program 6: rename(&(0x7f00000006c0)='./file0\x00', 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) accept4$inet(r1, 0x0, &(0x7f0000000140), 0x81800) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e21, @local}, 0x10) setsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xfffffffe}, {{@in6=@private1, 0x0, 0x6c}, 0x0, @in=@rand_addr=0x64010100, 0x0, 0x2}}, 0xe8) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r1, &(0x7f0000000080)="a8bb77a50c50feb39cfa2b2796a1e7150d911823fb47f4c65e583986b4f103cae377c6b2b3c37974a8ebc67cae319f1d13787b48650bf14a6484d876c662c8c0f98ccbaed6c1e31c2107e51a302d7746acd7", 0x52, 0x40081, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) r2 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001740)={[{@mpol={'mpol', 0x3d, {'prefer', '', @void}}}]}) mknodat$loop(r2, &(0x7f0000000240)='./mnt\x00', 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(r2, 0x4040942c, &(0x7f0000000100)={0x0, 0x9, [0x4, 0x81, 0x9, 0x1b35, 0x5, 0x4]}) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='cgroup\x00') preadv2(r3, &(0x7f0000000580), 0x0, 0x0, 0x0, 0x17) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000600)={0x1}) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000480)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="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"]) unshare(0x48020200) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002880)=[{{&(0x7f0000000000)={0x2, 0x4e22, @broadcast}, 0x10, &(0x7f0000000840)=[{&(0x7f0000000380)="a568da2b8cb1bcd701a9903f9090f56e5f0080717438027197a0c5ec1b9402e6d6bdad90d134428cec161d6400a96fec08654f62b8dcd496f1cf2f55dd05e4c13d0b4df760b0d65aaa59dca2fa5b2241d2ed24d2adee4a2946b1043d4581af0831c336ffd3b6ca13fb428975f7328cabc7", 0x71}, {&(0x7f0000000700)="f332b1924439b294b8a052889682d3dcd319a61f2913ca9b82bab8f7acad2ce9cd20a22b05cf92faed300d7b372f9e9ff1670b87577177f61b9ca8c3fc0b2e8da4fd1b615eb24ee8b7f53e5a479c3466a9cd54c4cab6ab1fc07bc00ae90aebdd1e1877ec8abe9574b515099a4157993b74d47def2c7ea79baa0fcfeaf07bae68ff6450511e57c9e7088d9c8fa4ddb944cebb654e99674e48d72f75b5880a4d6fbef31d3d592493e4d15ef238741c8da8a9", 0xb1}, {&(0x7f0000000400)="9407ef33a7a720ac0c82ae97774d846d5d7a16472a219771740e2c31f9533a9f465ee42087f44b348c293b31a5d61c9121b15b6578605e226d34962723479d12f9a54a8b315c0e32d32dfe9e33c3388b8d7096db796626abd5", 0x59}, {&(0x7f0000000640)="e92e7f5e59b2432125db43751922aa4cf8d8a51feae0eaf3121adf294f4795105ed0a2e87dd5ef144c773ddd1b39284e5a55a227c0b922804be08fd3fe813bfd3c42e26c13d283c92fff3c7a21b8878cd7af84cc3e5a", 0x56}, {&(0x7f00000007c0)="5ca828431475ea5d564d39cb942960263b2dbed9e2784c34129f8bd8d441d437b1aca46a309330d0f9dea8b11a8ce55ff94a53d2c232de9dfecfeb2c1555dae7b035ebee9d1f4e5106394a24d6b9799f21a99210d944d98a2e0dbb", 0x5b}], 0x5, &(0x7f0000002a80)=ANY=[@ANYBLOB="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"/411], 0x140}}, {{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000a00)="f1390d41e04f679e17361d58e3ad9fb8f2ffb81b5ac83d3d56b02e6d5d0bcf12a99016723e28aabb99bfe119605500d42cfb45ad56cae6ac9b3d8a9cbcf38ee40d4492a42d529c9ff06dbe3db0f60d0026a880d98361ac88c31c5daf4d2ed9e9e78b16acf6a2f6a7418e334b9db98ecafb0864bc3da39c6b815d14ade80027f872db8ece10d29e16c7dcbf57675aaf1fd0153c00b3732bec96fa7a0f586e0eddc932", 0xa2}, {&(0x7f0000000200)}, {&(0x7f0000000ac0)="93ff8a30bd00f468f99072fed0fd346bc5d895b401be58311b70a9bc6796cd62f649cb4d92f60f7bfcd3dfc227e9f35d2038c95f7997ad58443ac91b5c3e7eaabe8ac8cf19a3d07f1ed010e846c18b1a392719f44bc4ddfb4836e4f47ab71d1f8a207d8a92004dc0a8a4cddf8f224e38ba98ca91cd79a068", 0x78}, {&(0x7f0000000b40)="cfb6807139811fd94f2e53ad58958fac7b63db8fff827d218e379c07f1c0226a156b79b88cb7fa6243d16fb11f4b2e77d5891dd35a6fc3e30e6252a1e297aa91d40894866362f5da22217bb7e20b0f95b22d76090fb23f5d679a158110af4a3dc06e5317b6ae80070e9682823b2e08d60e3db123d812cc0227f4d2a4de3882edc75819e05e1cc7e84e36fd33751932b3cbeb1669e0d33a7d59dd9d09ebb2d5a4c553a66e33aed0d918060a1be748aca46021560e4fccab8964448f45d9d76db2536cd882b1944e23249cd497af9c1fd81cad4d45a6866a7b8a69bb", 0xdb}, {&(0x7f0000000c40)="7478cb073c9b0658a0f00cb8547e276ad7e0a1df646132d838289ac4cc28e9efbe264ca25913b6083b69b0249ad87a38cb67478b2e605d03814d500a589797b948ea7f6a5ec565123e7ec0957a6a9eb40b0a105946294fdb33d0e2910d11a358586f5724f1bbeb908c1bc6bb010b93e24fc6ec9c46d1dc139163372ef08e61722182d3dbd732a3cf9359bdbc9beaae0cf5f7938a", 0x94}, {&(0x7f0000000d00)="f4381dc3012567907fc0ad0460da511345d009b31d02d2ca86b95c702804a2a37a7977367d10e71a0130deaa6de1bdab6f07851a136c6805f41791e268f012ef90c27ec1182e028dc3d67ab532c06cd52c8b02f1bff3ae16ef146e66c797c419ac0f5d7c92abb261e2df37f291f8c5d8a6109b398b5d247496067349c93ca861dfed54f2ca1086999813944737acc7577ba386ba90d34825bcce814e3595b634eed29ae347d2f31cb402e6c48509d91fe8cc", 0xb2}, {&(0x7f0000000dc0)="dbd7b668ca303040f678ff8d2c33ca847276b3d598ff85c77666b47058bd62e2dfceba472638ff7a732976835b1ee93f5c6a05f2bd1f7d6d0d8053fcece1918adb4924f01f9de5ae6bd6b521f0229159c48caad0760a630c43e1b7ac577cee32b245b3bff79537213434c1d728df6b06bfe56a75188d6504ae670599549c98b134f2f22996e30c2177f170ebcc6e2030947d174f31d8ff357fa7c07098d115449b69309699e4b86756987ea22fb3f7c364d1e799dddcc780a7f5e0e0955d9479c620cb9396ab2308fbd99812236a79d79449d7493bccc6f0376f5731b8055bfce6f8ce453d73b69e46fc93030508ca4ad6ad2092", 0xf4}], 0x7, &(0x7f0000000f40)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x5}}, @ip_retopts={{0x80, 0x0, 0x7, {[@ssrr={0x89, 0x27, 0x4b, [@loopback, @multicast1, @rand_addr=0x64010102, @remote, @local, @empty, @remote, @private=0xa010101, @initdev={0xac, 0x1e, 0x0, 0x0}]}, @lsrr={0x83, 0xf, 0x80, [@broadcast, @multicast1, @multicast1]}, @timestamp_prespec={0x44, 0x14, 0x20, 0x3, 0x8, [{@multicast1, 0xe62c5d3}, {@empty, 0x1}]}, @timestamp_addr={0x44, 0x24, 0x60, 0x1, 0x2, [{@broadcast, 0x9}, {@dev={0xac, 0x14, 0x14, 0xf}, 0x4}, {@loopback, 0xff}, {@multicast2, 0x8}]}]}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xe35}}, @ip_ttl={{0x14, 0x0, 0x2, 0x2}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x80}}], 0xe0}}, {{&(0x7f0000001040)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0xd}}, 0x10, &(0x7f0000001500)=[{&(0x7f0000001080)="625436329bf98d5bd23aac2ce8f1439d4592b869dd4fabe2d1f9962e58a0f54d04cb224a6f5a58cbdba461e121fc72401805c5a7489f983e7ee53f993deedb1d34b60326001aaf7a1e89ff74bba5c0f2a6760a1c291f05f6c7bef8ec9d3401d6e985ebd2f35ae08e89e26940646e737fb08cd7a35770259ce11847e478739e2a5e74153ddcbef47004fca59d33f41efd718ab08024e273528255772f858bfabca8700fc118034cd0531576348ba5b71e8ab585ee535025b232c8c2d8dacc9c0adffdbb73", 0xc4}, {&(0x7f0000001180)="6a352a827738dab55f4fda10ea0215a9e01cedcaff9dc4432dc92d5154a2216cdc2ef6d81645", 0x26}, {&(0x7f00000011c0)="72382c298867788e16a5d2648683b1911829b9093cb026d5e3ee48c5130017aad1a636eddff2767c8e847f5febe0877abf79c77940062e17e890df00a4702e5a52b33327e3c4f6f07c1096540ab8df7e628ff63692140db96e136256e86ec6db53b45dc49798ebc5bfbaf2300a558a795afc0f89be58d2fdb92b90e0857a10c856907acbb289b87408500235d3fa199687ac666fb67bda9e7475611f2db33f651b96e36d6f94c34f6debf474e37067d49bb787448429ea3e9d", 0xb9}, {&(0x7f0000001280)="c2f5aee8e360b75b432bfa83883298067119c44a305566e478b7a6e0d5a2a92e04bb62d478bbfb8c13dc4f128939c56302ed149449788350d79b072b0f27b587780b361e86575782068f2cb05f46cd7be79f89856440a3b0fed2a564783818d5d06121b9d48dfaa3fcdc61dee1a8518a7bed877a550839f2d95c2c8479d2da1d6b192f41a29d988dc733f4c985f9e3a7bae0755806293f", 0x97}, {&(0x7f0000001340)="50c17abca6fb68b6229e62b6aab739d69e38758955ec63303329308ae7f9bd24f3bdff6be6db214ef3cf0b1266edd86a3ba4f64f5ae8807bc8159479dbea260b5494186a312431463b329c4d53af0f4fb95884b30f9e0d09d1741b1ebce4881f0fe2d96d5fb019a4630e4ba6d3b063891fb2fc9545a0cbc4cb986dce32abb624ba8466f272fc75e59875d707f8bd559e5488f81d8621a2a3e5c0498ef9d74a074d530e2ed6f85720ea851ffaf9a8324bee8a8086573b1373c8df8e95186f86526080c6d67a59209ebd133aea2ff7002484d72c3b11f2a26d6c01b7900059b9", 0xdf}, {&(0x7f0000001440)="0864208964304dd75566f33c07823d487143d277e1af47f96ff3f13bae340f22c05d10282c9499e7913252c716366e66674d212c7e1a473ac81cbfe66860ac8227be4e69ed7ada04d06678c6ec34a182427ecbd1bca8c8b349d38ca7f307812334d650fe59afd51bc9c8a1beae1cfbd1a4afbe3cdd11c59ec29284e5c41d08286ce709f80cd4e4252979e2547c73e4ce9ccc9d6a06a31d", 0x97}], 0x6, &(0x7f0000001580)=[@ip_ttl={{0x14, 0x0, 0x2, 0x16b9}}], 0x18}}, {{&(0x7f00000015c0)={0x2, 0x4e20, @private=0xa010100}, 0x10, &(0x7f0000001680)=[{&(0x7f0000001600)="20213d77af382f3dc8fe593cb3d5e20801562cfb696c0e57bb3e03a2ba69bff5863ca63f7dd11d898be3831d1930c15cac4046f15c9b81d6e8b25eddec72e5e9ed69a0cea7afa7045a79d66916ad0442e4bdb21d13350835cfd0cdc7227778c4974fd8b6cbd70fad4c7027cb4b8318cdcd50c676f7cbdbe46f698dd8", 0x7c}], 0x1, &(0x7f00000016c0)=[@ip_ttl={{0x14, 0x0, 0x2, 0x40}}], 0x18}}, {{&(0x7f0000001700)={0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10, &(0x7f0000001d00)=[{&(0x7f0000001780)="74f5300d0958512318b81a551c9c36ebecea6a50e16054dae8d0071d177d0bdfce08dc4409775f9efede758e4aaa26f3ffaf27546d4abebc62567db2c2d36c2840fe14af1072a0787031e33a82a8bfb8f97228d1704808", 0x57}, {&(0x7f0000001800)="7d283776f646e3f2219b04d2c0f08903b12d068d598d33c1186e75ed87fef288c27b0df84abca756241f131084887bf030289eb4bc5ecdcd402c1057a307f1cf86212924e9defc59ca7a73f2a78055063ddb255b52d10b5bc1f5615e2346042ffd77fff80cb993c58b72b689681b835c44fea7c61f4262fde4914880e816c59a2ed2c763debe4cf75c636835fd4a2b5bab46e3e7f99785c954e8572de3751e93c822b071c55ff9a18badc81c78df096146f24a02acfaa44b4a96004560d360612a5e27947ee533e5595e421d0e88ea0b90652e40a9a079b6990f", 0xda}, {&(0x7f0000001900)="960c6545c2af7729403b3977431453b31e69e47d3c002bc0e70344ce7a27d75ed41af274620554646880acbbfc5d173c0f7e670f547836d0a61cffbbe93cc380ddec5ba861eb426a6a52d183abf25ab1a4071bf4a98505051ea1cc809d02688df76c4a8dfcc608ba5f7c8bd89b5ba260d98ecaad1496f53fc66a1e83b2145927161918dba5036c52e14d2c7cff6c", 0x8e}, {&(0x7f00000019c0)="84cc2e56b4b3ceeec1941cb86e20f677723e9b47a06230df37e83a8ad0c55206a0507eb1f0e194a01bf838a254c5d07f21140e0923d05ade817332f5b7ffdc8a7a790c9e8bc61fcaa2de5e3dcadc518115d832", 0x53}, {&(0x7f0000001a40)="7a25bf3b9b224ccb1c6f81add15229721896b3013620d439e8ea6d5a741e3d26085fba77dfcef2e86b4a32f304c5e5a105c91457013a02d0167d5cf70ff684ca8235dc3352d7d378fb778d354790ff3b405053ebfd9d5cb2f225e0858527d183169faef843c5619c627fbb62", 0x6c}, {&(0x7f0000001ac0)="113569197926f0f5b01713", 0xb}, {&(0x7f0000001b00)="b67cf22e451cb57c9010a2e1fd2950840fa485c1b3d2a55c48e4649ea4b40cf3e58a8d3c23b88cb98784d449b01aca45e1335cf986a2669bf1ecf40f89dc46483c4ffe707545e6b430c9f2a87267a2673afb5cc0fdac78144be173cc44d52671a7d6dabf90fae572ab94fb4526855ef0346476a1653942689453db46e0ba77f00c979880b28f2d5015c733f7d5dd59d7d9dbd9afdc22a3cde3a334e1e209af7f99b60731648e0f649f55d284144518a1580536be8d290f6036fbd55d8adefa15b537aa01ff6b9f05c9567aaf20", 0xcd}, {&(0x7f0000001c00)="59f931c5268126c9521c334c5bd9b8936f257d217335ac493fbb6b3bdc3070eab3687b238f554707da96ef326ee40125996a345270a391bc3a44a8ce80f878c1cee23dd9318aea2fa3686f76fbf09db2896408ee41608ea1ba5f21741c0cc4606c1b5b3358227475f64a05b1360cc22b31249ec74b5726118e4c9d9817a4d1efce41541c1142c584b69856ea14bcf59f2d43b5bc3d89841470ed414d5a0f833b089d15a029ae7d978704bb125e3f6104f3a0b757ef92b641d5a6ea2fcaade9cea4bf65864147ace6bf35bdaa691479a1783c0bb9e7c45d2e9ea8f63b81328861707a4aa74d5cc6b1b864", 0xea}], 0x8, &(0x7f0000001e00)=[@ip_retopts={{0x20, 0x0, 0x7, {[@ra={0x94, 0x4, 0x1}, @lsrr={0x83, 0xb, 0x6f, [@multicast2, @rand_addr=0x64010101]}, @end]}}}], 0x20}}, {{0x0, 0x0, &(0x7f0000002000)=[{&(0x7f0000001e40)="a4c6735685621c49151d38a3cd08ab0bbce23e14d4746ccc1e79a355a837a58e28da70dade073416f9c2023a6462e8c60a3a6ffe67c8a5cbbe0b5b262b77076e45996472b564dcc1021c63e70430382eb2c5a459412d5d2cfd6d514654a291ec32f032fae151653ad792ac846d98f6b537435908e1c57e17073e64b1939b72886cc0709939c6be56945879541365410443b304698ee2e6cdf9d58ce602670368c696d93959b568041c5c4e6c2d29844338509a3dfa562d", 0xb7}, {&(0x7f0000001f00)="b6730c10f5251da32fdbcb27fbddafb1de30110c7bb39cd4fc09665fd9a80f12753b11a8a42f374b39daa132cf7146b4a94dd7041989863bcac54f8169f157f47cb81b4ff4f7303afc0904d12edfa4029d7dd91ed0eb927e754f79293000ed4aff1bad7d8844c1c413a2a2e3d90b22f1fdb89bc0d8fd945f98fd04ed686b11cf208c185f789efdb53c6f6907cd6f2139bb7b05cd626168775e8bf4db2e2ede3669bfc0bcc4a7542fe7188fee769ce769a82e77c48d4554ad13c14f295940d0c6c51b686ebd8f1f6b95", 0xc9}], 0x2}}, {{&(0x7f0000002040)={0x2, 0x4e22, @rand_addr=0x64010102}, 0x10, &(0x7f0000002540)=[{&(0x7f0000002080)="cf7545b1", 0x4}, {&(0x7f00000020c0)="4ca146c91d83a12d1b49a9f2c6c76f8321ca315bce2b5e4f210d8479ef54b667d617e6952067bbf5cb62cd18dd00c36772bf411d91acb176069cf2ed07aba9f652913993eb744a96515fd04b94e3adcd4ceb63891fca577602c7088c38090c293e92ba5705c23f9742", 0x69}, {&(0x7f0000002140)="041e99b696c03e50b1b7ed1562ac079153bf48279e375d14d757cfa9e385814d35def9be0b6c60ff6995916f4942a3e1f0e29d26f475d7fe60f180a2e930f89003f81a1a532adf4c33e49d15c935807417850627dbcee4ee1024444c17d937c86bc780899243", 0x66}, {&(0x7f00000021c0)="bb95168bbe50651c53b61fc488f1c9843f5202d3012a7e5034c8ca8f6afd92513d40c4b7d6385cb27ba2d9ce1c4f0600e5f97f22ebd4a67ddfca910ea6e3732749810f7e619d4c84b3fa5fb61bac83c10802f1fca57a1d6fa48cf9c1def9ab13386efa597cf6698a666c84d70bf907dce7400aef5bb0572e0bef5cfabc201c79b86e20233762374efca943a6864519f123e7b3c46ff431117b415cc47c8c1185aef0084db530575c293b3ce6718c664c8e679ff393be130d065c1d24a79dbdee7f67e11e1f9629f2651544f8e50e93cfdbdc4619971aa8fa7969d8f1b9c458675149751ea24b4784fa2954175c2eb07b12899fb3470f9f44031885", 0xfb}, {&(0x7f00000022c0)="0d1e11128e4b3287b451b088459d34e69f6606dd8613435a113d1ae715b7c18ddf31f05122225f1a89f7ee317d06fed30460c05f7a7f32dc06be13e31a385a102a352ec32fe9e2", 0x47}, {&(0x7f0000002340)="2433f9782635d1e9c430eab7add962d9c907a873776bd5dc01d9c9b6180de9dbfec4f88f8b8a6b2ccc941e083d2702c6cbd0151e782f1dfe3ea645da65a0616ff9753cfe41863d9f1be58969cc2a29ffbe80cb0ed8e21344507308c049e8e386c7e31874aa12ad7841a3", 0x6a}, {&(0x7f00000023c0)="ce0d581f90adfc278f1d12fe046d3ce680c5bfb6fdafae5e3a8831", 0x1b}, {&(0x7f0000002400)="41ef6a2a0da03262305b6e2d5e2651de0d222353b106a3a86aac11ca1ba7e98b98650850661db1c01555ade0676828eb4cbad8625e8c2bb6bcfa3f1e64edbaf614cd80bc924b6e94b1fe344f35f87627c9b7244af4da40dc8a8ec0edd0b2923b521af01d81110985a7e54b06e8fdd628afffa7f48cc53bbee81c48214f797bdb0920ab1758ebaec63d34b3308c7fdabba80812f5b58fe8cb316541f0152f04accbe0965e1da4c954628c1edba96d914bf5419ad97e69a59f", 0xb8}, {&(0x7f00000024c0)="2f03f7bec830ae0b1d413a8a83e2e2b4ad86202a64ea0618aedcf91d36e6ba5ba31c474170ae3b66578812c0a4f66e5526e5e73cfc3861845873c4a468b9f52f6b045309f4c8ec3eaed1af13f86cce7ab4419f5939f0a327b827b7e4d9e87674605145d9154d015334cff3636724f7bd96780caf3741c9bd647aa15a9832a1", 0x7f}], 0x9}}, {{&(0x7f0000002600)={0x2, 0x4e24, @local}, 0x10, &(0x7f0000002700)=[{&(0x7f0000002640)="2e9ecbcfd815abf67222a88f667abf91042a113e8fbee35f1ec35db232954fe7273f1a27b1de9e627418ab6620e2d696c619729d896fbf9eebf7a44ad9e9302967326108c60d90d5fcc7e1304bfa23d41a376a05eefe031950109da59f8dbe4472e06751270ce56a8d4d4f21cf5335907e9c08e7107ed24858ec6183ddf94198b45ec726a7abdc3f7542753303a917b39e72b70ae211c469f277e3a291ad518f37a5f511f888bb2542564d0b4f3081da82f37a06443a5f64", 0xb8}], 0x1, &(0x7f0000002800)=[@ip_ttl={{0x14, 0x0, 0x2, 0x6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x4}}, @ip_tos_int={{0x14}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0xd}}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}], 0x80}}], 0x8, 0x801) [ 2982.877040] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2982.878702] 9pnet: p9_fd_create_unix (16298): problem connecting socket: ./file0: -111 18:31:35 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r1, 0x40106614, &(0x7f00000002c0)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) symlink(&(0x7f0000000a00)='./file0/file0\x00', &(0x7f0000000a40)='./file1\x00') 18:31:35 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000c00)=ANY=[@ANYBLOB="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"], 0x70c}}, 0x0) r2 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)) io_uring_enter(r2, 0x76d3, 0x0, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x10, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'batadv0\x00'}) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYRESDEC, @ANYRES16=r3, @ANYRESHEX=r0, @ANYRES32, @ANYBLOB="93c39a22d20149fc5af8dc08343ea892971c6f4d3258a18dcd66a193314eb6170808c8c469748ebe", @ANYRESHEX=r0], 0xfdef) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r5 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r5, 0xfffffffffffffffc, r4, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0xc0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_CQM(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000780)=ANY=[@ANYBLOB='\t\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="0b0c00000000000000003f00000008000300", @ANYRES32=r6, @ANYBLOB="14005e8008000200000000000800010000000000"], 0x30}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000280)={'ip6gre0\x00', &(0x7f0000000200)={'ip6_vti0\x00', 0x0, 0x2f, 0x0, 0x3f, 0xb6a, 0x5b, @mcast2, @dev={0xfe, 0x80, '\x00', 0x37}, 0x7800, 0x7, 0x5886, 0x7}}) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x24, 0x0, 0x20, 0x70bd2a, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x7}, @BATADV_ATTR_HARD_IFINDEX={0x8, 0x6, r7}]}, 0x24}}, 0x4000010) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0xfec4) 18:31:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000b80)='./file0/file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x200011, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000000b00)=[{&(0x7f0000000a00)=""/217, 0xd9}], 0x1) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r3, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000000bc0)={0x1, 0xfffffc7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000140), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x121180, 0x100) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 18:31:35 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb060000009d949a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) [ 2983.080539] 9pnet: p9_fd_create_unix (16338): problem connecting socket: ./file0: -111 [ 2983.089941] 9pnet: p9_fd_create_unix (16338): problem connecting socket: ./file0: -111 [ 2983.130231] netlink: 1768 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2983.140931] 9pnet: p9_fd_create_unix (16342): problem connecting socket: ./file0: -111 [ 2983.167667] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2983.171709] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2983.200217] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2983.217982] 9pnet: p9_fd_create_unix (16347): problem connecting socket: ./file0: -111 18:31:35 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) syz_mount_image$nfs(&(0x7f00000002c0), &(0x7f0000000a00)='./file1\x00', 0x4, 0x3, &(0x7f0000000bc0)=[{&(0x7f0000000a40)="3b82ffa060926b9da2748d407229bcd9ecf5709b5fa271d2e0ef6f023f50c2ee2a", 0x21, 0x120d6a0a}, {&(0x7f0000000a80)="1d30d61d332baa317bf5b047733b4b65c5ad79156a4ebb719ac5539b4d7031726ce3d2d48834070094782ea6fe5a116d98f8bdec744e6c9de944d467b667c144735839bd45efb52eab111c9cd4ff3af7aecd2b4b9a64525c211a878cddf8fe57bbbadfbd831f519139685b7f7ec7efd387c6507fb1f9449a01c49ec6ba88ce47", 0x80, 0x1ff}, {&(0x7f0000000b00)="5135c9b6c80222e1d89c077ee40738f408f79e0faed38b309446e9d97a8f30ef3c3bd4a5167f5dbf6e09256dd6f3a404204f4814b93b356e1f2f4100404eafc246c7fdad07b938cc20a0174bd6d665b5f5dc729b287c1d7aa7dcbdb06ca4398846b817b01e1274c66bbea378831ee29433087a21c1caac53d6a9a2231a64fd7ac6842c63efe194c445a8", 0x8a, 0x8000}], 0x40000, &(0x7f0000000c40)={[{'ip6gretap0\x00'}, {'blkio.bfq.dequeue\x00'}, {'blkio.bfq.dequeue\x00'}, {}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'cgroup2\x00'}}]}) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:31:35 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000140)=0xb14c) write$binfmt_script(r2, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r5 = dup2(r4, r3) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r5, 0x0, 0x7ffffff9) 18:31:36 executing program 7: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet6(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)="3bb31d6a", 0x5c8}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="140000000000000029000000437600"/24], 0x18}, 0x0) 18:31:36 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:31:36 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x0, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) [ 2983.377770] netlink: 1768 bytes leftover after parsing attributes in process `syz-executor.2'. [ 2983.454152] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2983.462594] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 2983.501177] 9pnet: p9_fd_create_unix (16366): problem connecting socket: ./file0: -111 18:31:36 executing program 7: syz_io_uring_setup(0x6b11, &(0x7f00000000c0), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000140), &(0x7f0000000180)) syz_io_uring_setup(0x72af, &(0x7f0000000000)={0x0, 0x100983e, 0x2, 0x10003, 0x10004e4}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000280)) syz_io_uring_setup(0x68dd, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0, 0x40000021}, 0x0) r4 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r5 = dup(r4) getdents64(r5, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r5, 0x0, 0x0) io_uring_enter(r5, 0x4f1d, 0x9cc2, 0x1, &(0x7f0000000240)={[0x5]}, 0x8) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r0, r2, &(0x7f0000000200)=@IORING_OP_READ_FIXED={0x4, 0x1, 0x4007, @fd_index=0x6, 0xffff, 0x3, 0x2, 0x8, 0x1, {0x2, r6}}, 0x48000) 18:31:36 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9b0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 2983.628920] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 2983.646716] 9pnet: p9_fd_create_unix (16366): problem connecting socket: ./file0: -111 [ 2983.693764] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:31:52 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x0, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:31:52 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) setsockopt$inet_int(r0, 0x0, 0x14, &(0x7f0000000140)=0x34, 0x4) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:31:52 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x6, &(0x7f0000000000)) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003e80)=[{{&(0x7f0000000100), 0x6e, &(0x7f0000000180), 0x0, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}}, {{&(0x7f0000000200), 0x6e, &(0x7f00000013c0)=[{&(0x7f0000000280)=""/118, 0x76}, {&(0x7f0000000300)=""/146, 0x92}, {&(0x7f00000003c0)=""/4096, 0x1000}], 0x3}}, {{0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000001400)=""/36, 0x24}, {&(0x7f0000001440)=""/26, 0x1a}, {&(0x7f0000001480)=""/109, 0x6d}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001500)=""/167, 0xa7}, {&(0x7f00000015c0)=""/218, 0xda}, {&(0x7f00000016c0)=""/137, 0x89}], 0x7, &(0x7f0000001800)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}}, {{&(0x7f0000001880), 0x6e, &(0x7f0000003e00)=[{&(0x7f0000001900)=""/205, 0xcd}, {&(0x7f0000001a00)=""/111, 0x6f}, {&(0x7f0000001a80)=""/66, 0x42}, {&(0x7f0000001b00)=""/160, 0xa0}, {&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f0000001bc0)=""/89, 0x59}, {&(0x7f0000001c40)=""/248, 0xf8}], 0x7, &(0x7f0000001d40)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x28}}], 0x4, 0x40, &(0x7f0000003f80)) syz_io_uring_setup(0x5d68, &(0x7f0000003fc0)={0x0, 0x21e0, 0x8, 0x3, 0x307, 0x0, r4}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000000180), &(0x7f0000004040)=0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000004080)={{0x1, 0x1, 0x18, r3, {r3}}, './file0\x00'}) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x3, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r7}}, 0x7f) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd_index=0xa, 0x5, 0x0, 0x1f, 0x0, 0x0, {0x0, r7}}, 0xfffffffa) syz_io_uring_submit(0x0, r5, &(0x7f0000004100)=@IORING_OP_OPENAT={0x12, 0x5, 0x0, r6, 0x0, &(0x7f00000040c0)='./file0\x00', 0x41, 0x0, 0x23456, {0x0, r7}}, 0x3) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x20, 0xfd, 0x81, 0x2, 0x0, 0x5, 0x20, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x2, @perf_bp={&(0x7f0000000040), 0x3}, 0x1050, 0x1000, 0x4, 0x8e765956edfcad03, 0x9, 0x3, 0x0, 0x0, 0xb7, 0x0, 0x54}, r1, 0x3, r0, 0x2) 18:31:52 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000340)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a80b56149a2b95cb4ff840981e000000000400", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:31:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9b0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:31:52 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file1\x00', &(0x7f0000000a40)='ecryptfs\x00', 0x400040, 0x0) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r2 = dup(r1) unlinkat(r2, &(0x7f0000000a00)='./file0/file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r5 = openat$cgroup_ro(r0, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r5, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r4, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r6, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r7, &(0x7f0000000200)='./file0\x00', 0x86) 18:31:52 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) recvfrom$inet(r0, &(0x7f0000000100)=""/244, 0xf4, 0x0, &(0x7f0000000080)={0x2, 0x4e22, @empty}, 0x10) timer_create(0x3, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f00000000c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) timer_create(0x2, &(0x7f0000000300)={0x0, 0x23, 0x4, @thr={0x0, 0x0}}, &(0x7f0000000280)=0x0) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000200)=0xffff, 0x4) timer_settime(r1, 0x0, &(0x7f00000002c0)={{}, {0x0, 0x989680}}, 0x0) clone3(&(0x7f00000005c0)={0x40182300, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 18:31:52 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2a, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c20100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e33323134393739343100"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040000c00000000000000e0f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000004400000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0300000004000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000010500)="ff000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000e0f4655fe0f4655fe0f4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011600)="ed41000000080000e0f4655fe0f4655fe0f4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000020000000", 0x40, 0x2400}, {&(0x7f0000011700)="20000000b45b976cb45b976c00000000e0f4655f00"/32, 0x20, 0x2480}, {&(0x7f0000011800)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040000000", 0x40, 0x2800}, {&(0x7f0000011900)="20000000000000000000000000000000e0f4655f00"/32, 0x20, 0x2880}, {&(0x7f0000011a00)="8081000000180000e0f4655fe0f4655fe0f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000050000000", 0x40, 0x2c00}, {&(0x7f0000011b00)="20000000000000000000000000000000e0f4655f00"/32, 0x20, 0x2c80}, {&(0x7f0000011c00)="c041000000380000e0f4655fe0f4655fe0f4655f00000000000002004000000000000800000000000af301000400000000000000000000000700000030000000", 0x40, 0x4800}, {&(0x7f0000011d00)="20000000000000000000000000000000e0f4655f000000000000000000000000000002ea00"/64, 0x40, 0x4880}, {&(0x7f0000011e00)="ed4100003c000000e0f4655fe0f4655fe0f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c65310000000000000000000000000000000000000000000000000000006b1710a600000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x4c00}, {&(0x7f0000011f00)="ed8100001a040000e0f4655fe0f4655fe0f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000600000000000000000000000000000000000000000000000000000000000000000000000000000006f20934800000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000", 0xa0, 0x5000}, {&(0x7f0000012000)="ffa1000026000000e0f4655fe0f4655fe0f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3332313439373934312f66696c65302f66696c653000000000000000000000000000000000000000000000afa6093f00000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000", 0xa0, 0x5400}, {&(0x7f0000012100)="ed8100000a000000e0f4655fe0f4655fe0f4655f000000000000010000000000000000100100000073797a6b616c6c65727300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009270a1b300000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000000002ea040700000000000000000000000000006461746106015403000000000600000000000000786174747231000006014c0300000000060000000000000078617474723200"/256, 0x100, 0x5800}, {&(0x7f0000012200)="0000000000000000000000000000000078617474723200007861747472310000ed81000028230000e0f4655fe0f4655fe0f4655f00000000000002004000000000000800010000000af301000400000000000000000000000500000070000000000000000000000000000000000000000000000000000000000000000000000000000000743fdfdf00000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000", 0xc0, 0x5be0}, {&(0x7f0000012300)="ed81000064000000e0f4655fe0f4655fe0f4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c2efb56f000000000000000000000000000000000000000000000000020000000b45b976cb45b976cb45b976ce0f4655fb45b976c0000000000000000000002ea04073403000000002800000000000000646174610000000000000000", 0xc0, 0x6000}, {&(0x7f0000012400)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00lersyzkallersyzkallersyzkallersyzkallers', 0x40, 0x63c0}, {&(0x7f0000012500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x10000}, {&(0x7f0000012600)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8070000", 0x20, 0x18000}, {&(0x7f0000012700)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x18800}, {&(0x7f0000012800)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x19000}, {&(0x7f0000012900)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x19800}, {&(0x7f0000012a00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1a000}, {&(0x7f0000012b00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1a800}, {&(0x7f0000012c00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1b000}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x20000}, {&(0x7f0000012e00)="0200"/32, 0x20, 0x20400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x20800}, {&(0x7f0000013000)="0400"/32, 0x20, 0x20c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x21000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000200"/96, 0x60, 0x21400}, {&(0x7f0000013300)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x28000}, {&(0x7f0000013400)="0200"/32, 0x20, 0x28400}, {&(0x7f0000013500)="0300"/32, 0x20, 0x28800}, {&(0x7f0000013600)="0400"/32, 0x20, 0x28c00}, {&(0x7f0000013700)="0500"/32, 0x20, 0x29000}, {&(0x7f0000013800)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000200"/96, 0x60, 0x29400}, {&(0x7f0000013900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x30000}], 0x0, &(0x7f0000013e00)=ANY=[@ANYBLOB='\x00']) r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = dup(r0) getdents64(r1, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r1, 0x0, 0x0) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x0) [ 2999.732698] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:31:52 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x0, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) [ 2999.789649] 9pnet: p9_fd_create_unix (16408): problem connecting socket: ./file0: -111 [ 2999.832498] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 2999.864686] 9pnet: p9_fd_create_unix (16424): problem connecting socket: ./file0: -111 18:31:52 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x0, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) [ 2999.904896] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:31:52 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r3, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 18:31:52 executing program 6: ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f00000001c0)={{0x2, 0x4e20, @empty}, {0x0, @local}, 0x28, {0x2, 0x4e22, @multicast1}, 'veth0_to_team\x00'}) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') creat(&(0x7f0000000240)='./file0\x00', 0x60) mount$cgroup(0x0, 0x0, &(0x7f0000000400), 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000100)={0x0, r0, 0x101, 0xffffffff, 0x8f0, 0x6}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) [ 3000.036685] 9pnet_virtio: no channels available for device ./file0 18:31:52 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000040)=ANY=[@ANYBLOB="180000001d00210c0000000000000000f7ff010004000f80"], 0x18}}, 0x0) [ 3000.133392] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 3000.142514] 9pnet_virtio: no channels available for device ./file0 [ 3000.160995] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3000.188160] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:32:09 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000001e00)={@link_local, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x18, 0x3a, 0xff, @private2, @mcast2, {[], @ndisc_ns={0x87, 0x0, 0x0, @private2, [{0x0, 0x0, "2997"}]}}}}}}, 0x0) r1 = getpid() perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x8, 0xe9, 0x7, 0x6, 0x0, 0x9, 0x8, 0xb, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0xc190, 0x3, 0x1c0000, 0x6, 0x3ff, 0x8000, 0x4, 0x0, 0xffffffff, 0x0, 0x1000}, r1, 0x4, r0, 0x8) 18:32:09 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x83}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000340)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB="2321202e2f4abd0964caa7"], 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000140)=ANY=[@ANYBLOB="000000004295d184b078a7b73a00000066c39b1b1f101de9f82a525e09324b7c87b8b434748c6b0000000000", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:32:09 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x10, 0x0, 0x0, 0x5e, 0x81322, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x1d3004, 0x0) pivot_root(&(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000240)='./file0\x00') mount(&(0x7f0000000040)=ANY=[@ANYBLOB="2f0365764173b3774d85f0fc24628af2eedca9ed4a03"], &(0x7f0000000080)='./file0/../file0\x00', &(0x7f0000000140)='reiserfs\x00', 0x1018, &(0x7f0000000200)='^},\x00') 18:32:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xf) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:32:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9b0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:32:09 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) connect(r5, &(0x7f0000000340)=@nfc_llcp={0x27, 0x1, 0x2, 0x2, 0x1, 0x3f, "961785d011a66ed4e1ac70ceb1d8127559accb414b4583d0c99896b7187b7fd55cb660c6c1f6f57b962340b6bbfc3fa99888b4edf5e90eb7fb3dda2ff22ce3", 0x21}, 0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r4, 0x0, 0x7ffffff9) 18:32:09 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x0, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:32:09 executing program 6: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, "f31a0000434ef9bab774bdcab95c000d00", 0x0, 0x8}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000300)={0x4, 0x2, 0x68d, 0x1000, 0x9}) r1 = socket$inet(0x2, 0xa, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4000, 0xffffffff, 0x10000, 0x0, 0x200, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) r4 = dup(r3) setns(r4, 0x2020000) r5 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) r6 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) dup(r6) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, &(0x7f0000000140)=ANY=[]) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4a1c, 0x8, @remote, 0x3}, 0x1c) dup3(r1, r0, 0x0) syz_open_procfs(0x0, &(0x7f00000004c0)='net/l2cap\x00') [ 3017.113011] 9pnet: p9_fd_create_unix (16465): problem connecting socket: ./file0: -111 [ 3017.125253] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:32:09 executing program 2: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000000140)=0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x10000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x2000, @fd_index=0x9, 0x9, 0x0, 0x0, 0x10, 0x1, {0x0, r4}}, 0x0) close(r3) r6 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) pipe(&(0x7f0000000100)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r6, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 3017.190004] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' 18:32:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4", 0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r2, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r2, &(0x7f00000000c0), 0x12) readv(r2, &(0x7f0000000000)=[{&(0x7f0000000240)=""/170, 0xaa}], 0x1) r3 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x0, 0x0, 0x0, 0x8f, 0x20006, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f00000000c0), 0xe}, 0x4501, 0x3, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x9, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) fsetxattr$security_evm(r4, &(0x7f0000000040), &(0x7f0000019500)=@v1={0x2, "175e133ddef6ba02fd77"}, 0xb, 0x2) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000019300)={0x3, 0x0, 0x1, 0xff9a, 0x7, [{0xffffffff, 0x1, 0x3}, {0x2, 0x0, 0x0, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x1, 0x4, 0xf9f8, '\x00', 0x1}, {0x0, 0xef0, 0x8, '\x00', 0x1000}, {0x0, 0x8, 0x29d040000000000, '\x00', 0x180}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x80, 0x7d, 0x9, 0x6, 0x0, 0x192f, 0x1, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7831, 0x5, @perf_config_ext={0x30b, 0x3}, 0x0, 0x7ff, 0x0, 0x6, 0x7, 0x6, 0x8000, 0x0, 0x3, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) r5 = socket$inet(0x2, 0xa, 0x0) socket$inet(0x2, 0x1, 0x1000) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) copy_file_range(r1, &(0x7f0000000200)=0x10000, r5, &(0x7f00000194c0)=0x2, 0x3, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 3017.220825] 9pnet: p9_fd_create_unix (16486): problem connecting socket: ./file0: -111 18:32:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a3", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9ea) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3017.339208] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:32:24 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c6530be2c4f75629c339cbb03a8fe55819a0a549635181f9f7e7e6c35d9b904d4bdf8f7e152493597df043795a9617f4ee06a337f01838a26d0b5dd333a2ebc5877aeb5bca4a0183b91ed8c7fccf722afe95d0c363421412b78ce645eb40c47eb9564429f2a27c467731a4e9b10982d96e255b1"], 0xb) fallocate(r0, 0x3, 0x0, 0x18000) r1 = socket$inet(0x2, 0xa, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4a20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f00000003c0)=ANY=[@ANYBLOB="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", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:32:24 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) readv(0xffffffffffffffff, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4", 0x14) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r2, &(0x7f0000000300)=""/102385, 0x18ff1) write$cgroup_pid(r2, &(0x7f00000000c0), 0x12) readv(r2, &(0x7f0000000000)=[{&(0x7f0000000240)=""/170, 0xaa}], 0x1) r3 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x80, 0x3a, 0x0, 0x0, 0x0, 0x8f, 0x20006, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f00000000c0), 0xe}, 0x4501, 0x3, 0x0, 0x7, 0x9, 0x0, 0x0, 0x0, 0x9}, 0xffffffffffffffff, 0x9, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3}, './file0\x00'}) fsetxattr$security_evm(r4, &(0x7f0000000040), &(0x7f0000019500)=@v1={0x2, "175e133ddef6ba02fd77"}, 0xb, 0x2) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000019300)={0x3, 0x0, 0x1, 0xff9a, 0x7, [{0xffffffff, 0x1, 0x3}, {0x2, 0x0, 0x0, '\x00', 0x984}, {0x1, 0x2, 0x8, '\x00', 0x1}, {0x1, 0x4, 0xf9f8, '\x00', 0x1}, {0x0, 0xef0, 0x8, '\x00', 0x1000}, {0x0, 0x8, 0x29d040000000000, '\x00', 0x180}, {0x100, 0x0, 0x0, '\x00', 0x200}]}) ftruncate(r0, 0x1000003) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x80, 0x7d, 0x9, 0x6, 0x0, 0x192f, 0x1, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7831, 0x5, @perf_config_ext={0x30b, 0x3}, 0x0, 0x7ff, 0x0, 0x6, 0x7, 0x6, 0x8000, 0x0, 0x3, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) r5 = socket$inet(0x2, 0xa, 0x0) socket$inet(0x2, 0x1, 0x1000) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) copy_file_range(r1, &(0x7f0000000200)=0x10000, r5, &(0x7f00000194c0)=0x2, 0x3, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 18:32:24 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) openat(r0, &(0x7f0000000340)='./file0\x00', 0x400000, 0x10) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r4, 0xc0096616, &(0x7f0000000140)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) getsockopt$inet_udp_int(r2, 0x11, 0xb, &(0x7f0000000380), &(0x7f00000003c0)=0x4) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:32:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xe4c8, 0x1f6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:32:24 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x0, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:32:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/cgroup.procs\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) close(r1) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r2 = fork() perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfff, 0x4}, r2, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0x2) 18:32:24 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a3", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9ea) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:32:24 executing program 6: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = dup(r0) getdents64(r1, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0x6, 0x8, 0x0, 0x2, 0x0, 0x2bb3, 0xa41, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6e6e805b, 0x2, @perf_bp={&(0x7f00000000c0)}, 0x0, 0x1ff, 0xfe, 0x5, 0x4, 0x8, 0xff, 0x0, 0x46, 0x0, 0x101}, 0xffffffffffffffff, 0xd, r1, 0x2) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r3 = dup(r2) getdents64(r3, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r3, 0x0, 0x0) getdents64(r3, &(0x7f0000000380)=""/138, 0x8a) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000180)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) r6 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r6, r7, 0x0, 0x80000001) [ 3031.392758] 9pnet: p9_fd_create_unix (16518): problem connecting socket: ./file0: -111 [ 3031.446764] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3031.455660] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3031.471023] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 3031.480709] 9pnet: p9_fd_create_unix (16534): problem connecting socket: ./file0: -111 18:32:24 executing program 7: creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000000c0), 0x17, 0x10001) openat(0xffffffffffffffff, 0x0, 0x80001, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) ioctl$BTRFS_IOC_ADD_DEV(r1, 0x5000940a, &(0x7f00000002c0)={{r0}, "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"}) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0xffffffffffffff65, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = creat(0x0, 0x0) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) pwrite64(r5, &(0x7f00000000c0), 0x17, 0x10001) renameat2(0xffffffffffffffff, 0x0, r4, 0x0, 0x4) sendfile(r0, 0xffffffffffffffff, 0x0, 0x7fffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}}) 18:32:24 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a3", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9ea) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:32:24 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x0, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:32:24 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(0xffffffffffffffff, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:32:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r3 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r3, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d756e69782c6163636573733d757365722c64656275673d3078303030303010303030303030303030362c64666c747569643d", @ANYRESHEX=r2, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) [ 3031.824458] 9pnet: p9_fd_create_unix (16547): problem connecting socket: ./file0: -111 [ 3031.933371] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 3031.973757] 9pnet: p9_fd_create_unix (16555): problem connecting socket: ./file0: -111 [ 3032.042863] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3036.536472] Bluetooth: hci4: command 0x0409 tx timeout [ 3038.585363] Bluetooth: hci4: command 0x041b tx timeout [ 3040.633601] Bluetooth: hci4: command 0x040f tx timeout [ 3041.594604] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3041.596628] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3041.599396] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 3041.648774] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 3041.650590] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 3041.653286] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 3042.680340] Bluetooth: hci4: command 0x0419 tx timeout 18:32:49 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = dup(0xffffffffffffffff) getdents64(r1, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r1, 0x0, 0x0) move_mount(0xffffffffffffffff, &(0x7f0000000140)='.\x00', r1, &(0x7f0000000340)='./file1\x00', 0x20) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x7) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x100) write$binfmt_script(r2, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r5 = dup2(r4, r3) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r5, 0x0, 0x7ffffff9) 18:32:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB="2c726f6f7463ef6e746578743d726f6f742c00"]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) getdents(r1, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000a00)="9b4890f3994f96aad7708549e1b46c999545e215d54dcd3b33b7275533f586147eee526f96aa458b3709e6b5eb9ea242d672fdcdfebc0cb9d809eda698b7300b1489ef06fb6a2947f226212b893d8922d3", 0x51, 0x4010, &(0x7f00000002c0)={0xa, 0x4e20, 0x58, @local, 0x1}, 0x1c) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:32:49 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r1) sendmsg$IEEE802154_ADD_IFACE(r0, &(0x7f0000000100)={0x0, 0x21c1, &(0x7f00000000c0)={&(0x7f0000000140)={0x34, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_PHY_NAME={0x9, 0x1f, 'phy1\x00'}, @IEEE802154_ATTR_HW_ADDR={0xc}, @IEEE802154_ATTR_DEV_TYPE={0x5}]}, 0x34}}, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000140), r3) sendmsg$NLBL_MGMT_C_ADDDEF(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000002c0)={0x14, r4, 0x1, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(r3, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x28, 0x0, 0x2, 0x70bd2a, 0x25dfdbff, {}, [@NLBL_UNLABEL_A_IPV6MASK={0x14, 0x3, @private0}]}, 0x28}, 0x1, 0x0, 0x0, 0x20010}, 0x4008002) 18:32:49 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5a, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) getpgrp(0x0) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x62, 0x9, 0x7f, 0x80, 0x0, 0x549, 0x2000a, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x9, 0x1000}, 0x50, 0x1, 0xbc, 0x2, 0xff, 0x1, 0x6, 0x0, 0x2, 0x0, 0x85}, r2, 0xe, r1, 0x2) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)={0x24, 0x1e, 0xe21, 0x0, 0x0, {0x7}, [@generic="d9153d1c3ae08c9cf14f60a0b6cd", @generic]}, 0x24}}, 0x0) mount(0x0, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)='rpc_pipefs\x00', 0x82804, 0x0) 18:32:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x0, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:32:49 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x34000, &(0x7f0000000480)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000001d00210c0000000000000000000000000200000000000000"], 0x1c}}, 0x40000) pread64(r0, &(0x7f0000000340)=""/181, 0xb5, 0x8) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000000c0), 0x7, 0x4002) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r3 = dup(r2) getdents64(r3, &(0x7f0000001d00)=""/4085, 0xff5) r4 = dup2(r3, r1) r5 = openat2(0xffffffffffffffff, 0x0, &(0x7f0000000100)={0x2b0100, 0x1c}, 0x18) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r4, 0xc0189372, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r4, {0xfffffc71}}, './file0\x00'}) r6 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x404700, 0x0) pidfd_getfd(r6, r4, 0x0) fsmount(r5, 0x1, 0xf9) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB="140000004200210e00000000000000000000000086bc22c2831223b3b57f9c686f3b231bf0464349f5bab057f519066e91d98d6e5fd1c5fa0cf73e0c2d00"/75], 0x14}}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000001740)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) unshare(0x48020200) 18:32:49 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f00000003c0)={'#! ', './file0', [{0x20, '#! '}, {0x20, '$*]'}, {}], 0xa, "16a080c47bc8276f13c7276c17a872a1978c4119c613faf6e21a0527be0d47996ae644d7f7eb9de910d500cc5fe73aaf4390762885f4efcff2e23c7086e8a20cd8d4bc757de2227aa33755e3955538107547481733cac56e8cc4b23bad12d67f"}, 0x74) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:32:49 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf9", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa07) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3056.872910] 9pnet: p9_fd_create_unix (17041): problem connecting socket: ./file0: -111 [ 3056.944417] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' 18:32:49 executing program 6: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/tcp_cubic', 0x10000, 0x48) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, r0, 0x0) syz_io_uring_setup(0x543f, &(0x7f0000000140)={0x0, 0x0, 0x2, 0x2}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) [ 3056.965314] 9pnet: p9_fd_create_unix (17055): problem connecting socket: ./file0: -111 [ 3057.039114] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:32:49 executing program 2: r0 = syz_io_uring_complete(0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x527ff059745acfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x4000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x100010, r0, 0x8000000) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000004, 0x10010, r1, 0x10000000) r4 = socket$inet_udplite(0x2, 0x2, 0x88) syz_io_uring_submit(r2, r3, &(0x7f0000000080)=@IORING_OP_ACCEPT={0xd, 0x1, 0x0, r4, &(0x7f0000000000), 0x0, 0x0, 0x80800, 0x1}, 0x28) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)) 18:32:49 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="652c616e614d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646fac03d620c76c52185e6e31359c6e745f61707072616973652c616f6e746e65723d00", @ANYRESDEC=0x0, @ANYBLOB="2c726f6f74a26fe772a91aa13f6923ca910000"]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x244280, 0x0) [ 3057.052862] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3057.178031] 9pnet: p9_fd_create_unix (17072): problem connecting socket: ./file0: -111 18:32:49 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x80049363, &(0x7f0000000200)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r1, 0xc0189376, 0x0) fcntl$setlease(r1, 0x400, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x40086806, 0x5) readv(r3, &(0x7f0000000380)=[{&(0x7f0000000040)=""/13, 0xd}], 0x1) ioctl$SG_GET_RESERVED_SIZE(0xffffffffffffffff, 0x5421, &(0x7f0000000080)) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r4 = dup2(r0, r2) copy_file_range(r4, 0x0, 0xffffffffffffffff, &(0x7f0000000040)=0x3a, 0x8, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f0000001580)=0x10000, r1, 0x0, 0xb3a, 0x0) accept4$inet6(r4, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0xffffffffffffffe6, 0x800) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffc, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb3c906d6b66732e66617400020101000470008000f801", 0x17}, {&(0x7f0000000240)="53595a4b414c4c45522020080000ea80325132510000ea80325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c45302020202020201000b9ea70325132510000ea70325103000000000041660069006c00650031000f00100000ffffffffffffffffffff0000ffffffff46494c45312020202020202000b9ea70325132510000ea70325107", 0x9b, 0xa00}], 0x0, &(0x7f0000000140)=ANY=[]) fspick(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) [ 3057.230603] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' 18:32:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x0, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) [ 3057.255483] 9pnet: p9_fd_create_unix (17075): problem connecting socket: ./file0: -111 18:32:49 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf9", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa07) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3057.295874] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 18:32:50 executing program 2: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, "6d0008004eff0000000001000000008000"}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) pread64(r0, &(0x7f0000000240)=""/186, 0xe, 0x0) r1 = io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x1cf}) r2 = socket$inet(0x2, 0xa, 0x0) r3 = syz_mount_image$nfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x7, 0x7, &(0x7f0000000540)=[{&(0x7f0000000740)="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", 0x1000, 0xfffffffffffffffa}, {&(0x7f00000000c0)="d35f9605ce00fd212aa7aaf386f47593ba899ea502f9614ce28394eb63790bd3ba1c6f3d2b092094486e86d304adfec48ad1330fb3926971258f040be8c56e21f33a3d5ab202048f565a16f0b8d45d658e0214c774ce212150f93a134c16ac214842af57bb2185fd91816026575a4ee4da046e7462be11726d05", 0x7a, 0x9}, {&(0x7f0000000300)="ee5e759caf01364f45a8d66362a3f523e195c0c052f46aa08e8bf5bbdf299bed9fb034bf6b0db72aa288fec4d1b87b01c526f3d9490209727ed3e906c3268769fffec7436ecb937808cddef78913c32c065a649237507c034afe80982c2bc015f6bc2825eb2ef03f91f58290cb0b628675bb207e187ccb2793152e6803acf34953f2a3c3ea5b2a95bc28728c73692b3bfe52848472a2e00dc2acb6113a4c435b37c05c11f9457c381e9d3d1b888e393a1f7f88e0458a1a8e4aae9b0e33bb75d3a384be844c7d146a62400448332582f7dd23cc", 0xd3, 0xfffffffffffffff8}, {&(0x7f0000000140)="fcc81849bc595435c6cfff712b7e579c04c084904cabd2f244792d1df077e8", 0x1f, 0xdf}, {&(0x7f0000000400)="96bc74bd268489632eb116cf6ca5d39bb1b2e5c3666a2f583db1e60ae30b437e69f5f2c63a371704e40f2cbc8fc84d327127219d0106b4aa1afafa3a2114ded21a3f2d2b47e401019f58e980aacba04f594530fe6da5f5f46c93be4197eeb6cbcc41c3113d8759836fec7ceeaabf73994e94d9a2131e416f04f0c8489f515b26af", 0x81, 0xfff}, {&(0x7f00000004c0)="1e59d24198bbc63442cfcfa07452aa40d81dc8bdfecc2f3c3adc1ba0e442601c0725f54d626ca69f4d8b6dc879a173b6a8ebcb66734fbd49e6878e8dbfdd04043a36257bf34840414c1e950de53170f8aef9e28ee2f2cc9fd7846e1199cf14715bd3d25afe56", 0x66, 0x100}, {&(0x7f0000000180)="0f943fadbbe8fefc650e758b774becee3e2c0f32e0", 0x15, 0x3ff}], 0x80, &(0x7f0000000600)={[{'/dev/net/tun\x00'}], [{@smackfsdef={'smackfsdef', 0x3d, '}\xe7&,{'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@fsname={'fsname', 0x3d, '/dev/net/tun\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@hash}]}) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) readv(r4, &(0x7f0000002c40)=[{&(0x7f0000001740)=""/47, 0x2f}, {&(0x7f0000001780)=""/110, 0x6e}, {&(0x7f0000001800)=""/216, 0xd8}, {&(0x7f0000001900)=""/19, 0x13}, {&(0x7f0000001940)=""/96, 0x60}, {&(0x7f00000019c0)=""/183, 0xb7}, {&(0x7f0000001a80)=""/172, 0xac}, {&(0x7f0000001b40)=""/250, 0xfa}, {&(0x7f0000001c40)=""/4096, 0x1000}], 0x9) splice(r3, &(0x7f0000000680)=0xa32, r1, &(0x7f00000006c0)=0x6, 0x0, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) r5 = socket$nl_sock_diag(0x10, 0x3, 0x4) dup3(r2, r5, 0x0) [ 3057.430934] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 18:32:50 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x123) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000500)='./file1\x00', 0x501503, 0x82) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000b80)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000a00)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d866c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d800a78c95d057b0c1eda387175ed1fa2117d0fd8a384e5593e6d7e82597dfb4f0e6a651e4c9a273a332960c703b2253a5b189250e055642f8ae9acf4b65629cc32274bf12cc373ecb241e34675ff6c0ab8643d1d333ee086f28f47a1d4340d38542bd9687c31444a6ae575236e10d8b60c8124c620d7252c205a11106037ca6c84d0a23a61a1a97f8f14e38b73e4e0", @ANYRESDEC=0x0, @ANYRES64=r2]) r5 = openat(r4, &(0x7f0000000540)='./file0/file0\x00', 0x105142, 0x12e) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) bind$bt_hci(r5, &(0x7f00000002c0)={0x1f, 0x4, 0x2}, 0x6) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 3057.500985] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3057.570528] 9pnet: p9_fd_create_unix (17096): problem connecting socket: ./file0: -111 [ 3057.618261] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 3057.625344] 9pnet: p9_fd_create_unix (17101): problem connecting socket: ./file0: -111 18:32:50 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000340)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0b90850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:32:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf9", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa07) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:32:50 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000280)=ANY=[]) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', &(0x7f00000001c0)={0x800, 0x93}, 0x18) fadvise64(r2, 0x9, 0xfffffffffffffffe, 0x4) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) socket$inet6_udplite(0xa, 0x2, 0x88) openat(r4, &(0x7f00000000c0)='./file1\x00', 0x585101, 0x22) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x40802, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd, 0x0, 0x6, 0x0, 0x2000}, 0x0, 0x2, 0xffffffffffffffff, 0x0) write(r5, &(0x7f0000000240)="01", 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x10) sendfile(r0, r1, 0x0, 0x20d315) 18:32:50 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r3 = dup(r2) ftruncate(r0, 0x1000009) sendfile(r1, 0xffffffffffffffff, &(0x7f0000000140), 0x5a) setsockopt$IP_VS_SO_SET_ZERO(0xffffffffffffffff, 0x0, 0x48f, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00'}) sendmsg$NL80211_CMD_SET_CQM(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}}, 0x0) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x20000011}, 0x40) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r3) r4 = dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)={0x1, 0x0, 0x0, 0x80, 0x71}) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) dup2(r0, r4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0xbf, 0xa9, 0x0, 0x0, 0x5e, 0x8081f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x3f, 0x2}, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x6c, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[@ANYBLOB="2321202e2f66696c65300d7926d04c32bc5bc12f5c43f1ed5369d597e5942b50d4f2c235096839d7dc9dc2dee778f37bad9fe0e9fd40ee0c99e28b7538b58564f015d758843879bc8f34e989f0a265685bcd6eba662c32352263669ec7027af3cb9d851ba205c1d93f0b1cf5d9dc802b5962a68e52e0445d0b20d6f9bbbe99aaca28f7205c5473fb8df1b90c9f38766e0255a37f402aca5fa69821f1715b89bdf70ce7e1b9a9fc9065e7d635824bbee3982616ef53c331fe92e27b0612323108a1180c13e1b97b7feab65a26f4e9e586c49167b49b34fa"], 0xb) 18:32:50 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:32:50 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/pm_print_times', 0x2002, 0x160) perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x4, 0x1, 0x3, 0x1, 0x0, 0x5, 0x2080, 0x6, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0x4, 0x20}, 0x10, 0x2, 0xfff00000, 0x6, 0x101, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xd, r1, 0x8) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r5 = dup2(r4, r3) mount(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='qnx4\x00', 0x223048, &(0x7f0000000440)='#! ') getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r5, 0x0, 0x7ffffff9) [ 3057.785123] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3057.797392] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 3057.811821] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3057.814442] device veth0_vlan entered promiscuous mode [ 3058.323991] device veth0_vlan entered promiscuous mode 18:33:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:33:08 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) open(&(0x7f00000002c0)='./file0/file0\x00', 0x519800, 0x110) 18:33:08 executing program 2: setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000100)={'ip6gre0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x29, 0x3, 0x0, 0x9, 0x4, @remote, @local, 0x7800, 0x700, 0x6}}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0xfffffffffffffffc}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) openat$cdrom(0xffffffffffffff9c, 0x0, 0x10100, 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) r3 = accept4(r1, &(0x7f0000000180)=@can, &(0x7f0000000000)=0x80, 0x100800) getsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f00000000c0)={@mcast1}, &(0x7f0000000200)=0x14) close(0xffffffffffffffff) r4 = open(&(0x7f0000000240)='./file0\x00', 0x103000, 0x105) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) dup(r5) ioctl$LOOP_SET_FD(r4, 0x4c00, r5) 18:33:08 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) r5 = syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) r7 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r7, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) accept4$packet(r6, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000340)=0x14, 0x800) fspick(r5, &(0x7f0000000380)='./file1\x00', 0x1) sendfile(r4, 0xffffffffffffffff, 0x0, 0xd6) 18:33:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa16) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:33:08 executing program 7: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, &(0x7f0000000680), 0x0, &(0x7f0000000300)=ANY=[]) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f0000000240), 0x4200, 0x0) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r3 = dup(r2) dup(r2) r4 = dup(0xffffffffffffffff) getdents64(r4, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r4, 0x0, 0x0) fsetxattr$trusted_overlay_upper(r4, &(0x7f0000000280), &(0x7f0000000300)={0x0, 0xfb, 0x52, 0x2, 0x7, "b76466086b5c490556901453e1ba0cbb", "41ba5aed70fa6d88b911ae94f2dec463371352885a0d857868bd08a4dece80c9f822f73b98413edb1b28ac0bdfad7df8c1a665781f0a13163501a6c6e8"}, 0x52, 0x0) r5 = dup(r1) r6 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r7 = dup(r6) getdents64(r7, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r7, 0x0, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r7, 0x40106614, &(0x7f00000000c0)) getdents64(r5, &(0x7f0000001d00)=""/4085, 0xff5) pwrite64(r0, &(0x7f0000000440)="cbe923f0336ad2043d6e91e7e2e14e195cf4781ef604e729ce490f674839e9cebc79f5ad934c8fbb6d3b6b292a14891329f1c0b6dfcbaaebd1420acd1f35d55bdd06f9bcaa7b90f698eb68dbb4f94fc52e425abe7f7ae847", 0x58, 0x100000001) getdents(r5, 0x0, 0x0) pidfd_send_signal(r3, 0x16, &(0x7f0000000040)={0x0, 0x6, 0x800}, 0x0) getdents64(r5, &(0x7f0000000140)=""/231, 0xe7) 18:33:08 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2321202e2f669ba2fde9f851437d5e9097230000"], 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:33:08 executing program 6: sync() r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x90101, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)={[{@subsystem='freezer'}]}) preadv(r1, &(0x7f00000002c0)=[{&(0x7f00000005c0)=""/101, 0x65}], 0x1, 0x61bf, 0x2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) creat(&(0x7f0000000980)='./file0/file0\x00', 0x8) r2 = fsmount(r0, 0x1, 0x71) r3 = openat(r2, &(0x7f0000000680)='./file0\x00', 0x1, 0x100) sendmsg$nl_generic(r3, 0x0, 0x4) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000180)='./file1\x00', &(0x7f0000000200)='autofs\x00', 0x362801, &(0x7f0000000240)='.\x00') r4 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='./file0/file0\x00', 0x800) pwrite64(r4, &(0x7f00000008c0)="9edef34b70f2722466856ed611023eab60080a789e3dc35b54f459c07335e55e405aed496407ed0fdbcca6f664ca6a7711f94014aeb8e300f63aebbdcf7090b14c374a3a5a25bd795820dd048fdda8cf241ccd4995413bcd81e7088f6b6bb2d43aafea6cf509a09581bb0b5782c60cb732d90f73951a1f7cb58642ce3794a71827110a6d", 0x84, 0x5) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r5}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040) umount2(&(0x7f0000000000)='./file1\x00', 0x6) [ 3076.025098] 9pnet: p9_fd_create_unix (17154): problem connecting socket: ./file0: -111 [ 3076.049807] EXT4-fs (loop7): VFS: Can't find ext4 filesystem [ 3076.106014] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:33:08 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000a80), 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000000)={'wpan4\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000140), r3) sendmsg$NLBL_MGMT_C_ADDDEF(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000001c0)=ANY=[@ANYBLOB="14005582354719250000", @ANYRES16=r4, @ANYBLOB="0100000001000000000002000000"], 0x14}}, 0x0) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) sendmsg$IEEE802154_LLSEC_LIST_KEY(r3, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, r5, 0x200, 0x70bd2d, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4010}, 0x44004) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f00000004c0)) 18:33:08 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000080)=ANY=[@ANYBLOB='\x00'/11], 0xb) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x30, 0x59, 0x0, 0x8, 0x2, 0x3, 0xffffa85f, 0x234, 0x40, 0x1e6, 0xcdb, 0x4f, 0x38, 0x2, 0x8001, 0x100, 0x2}, [{0x3, 0x80000000, 0x4, 0x4, 0x100, 0xdcd5, 0x4, 0x5}, {0x7, 0x3ff, 0x2, 0xf99, 0x9, 0x7, 0x4, 0x80000001}], "b95ab801b65e69f687eb693a2a8ce7779e33efc9305602c4077341b00d3f3f936422cc5d5bd02b902794154724ceb12a91c2be09f2a42d7ce483dfbe23259c4a79", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x8f1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r5 = dup2(r4, r3) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r5, 0x0, 0x7ffffff9) [ 3076.170075] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3076.179598] 9pnet: p9_fd_create_unix (17186): problem connecting socket: ./file0: -111 [ 3076.231697] EXT4-fs (loop7): VFS: Can't find ext4 filesystem 18:33:09 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:33:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file2\x00', 0x0, 0xfffffdc5, 0x0, 0x20, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) openat(0xffffffffffffffff, &(0x7f0000001a40)='./file0\x00', 0x400882, 0x100) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) statfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000a00)=""/4096) r3 = openat$cgroup_ro(r0, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r3, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xe9c6, 0x4}, 0x0, 0x2000000000000000, 0xfffffffc}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 18:33:09 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xff}}, './file0\x00'}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e20, 0x80000000, @private1, 0x21}, {0xa, 0x4e23, 0x8, @private1, 0x76}, 0x8, [0x101, 0x7, 0xb71, 0x4af, 0x6, 0x3, 0x3f, 0x401]}, 0x5c) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000000), 0x4) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0x2}], 0x1, 0x0, 0x38}}], 0x1, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x4) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000180)) mkdirat(r2, &(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000001c0)=0x2, 0x4) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000180)={0x2}) epoll_wait(r1, &(0x7f0000000080)=[{}], 0x1, 0x6226) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x8, &(0x7f0000000140)={[0x31]}, 0x8) 18:33:09 executing program 6: connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFT_MSG_GETTABLE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000f10901080002400000000000000020000000000000005b7de309be669c241a75a21877e0ba5139262839c46ffa42f80d85383a02976b7a09ddc732d14f81fc6352a3236b585d41fc257895604b49d5b580d088bfafaf0539ae1a785b038392c48a465ec9c4ac1a045d29cf35e9c4e10539f47b64ea8a5d933c325b15384df4333ec684ad438bd700561f38aa84ed58f47bf7571faf7fd4101ee34117730c7700"/174], 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x10000) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r0, &(0x7f0000000000), 0x1b4000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0xf7, &(0x7f0000000000)=0x0) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) io_submit(r1, 0x3, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x3000000}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x4e21, 0x7, @private2, 0x3}, 0x1c) r3 = getpid() capget(&(0x7f0000000040)={0x20071026, r3}, &(0x7f00000000c0)={0x7, 0x1, 0x400, 0x7, 0x8, 0x1f}) clone3(&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 3076.405234] 9pnet: p9_fd_create_unix (17202): problem connecting socket: ./file0: -111 [ 3076.417636] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' 18:33:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa16) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3076.488496] 9pnet: p9_fd_create_unix (17202): problem connecting socket: ./file0: -111 18:33:09 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9b0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:33:09 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x13300}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_flowlabel\x00') r1 = syz_io_uring_setup(0x7bf4, &(0x7f00000001c0)={0x0, 0x319, 0x8, 0x2, 0x32c}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000240)=0x0) r4 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3db}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000380), &(0x7f0000002a40)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0xa, 0x0, r5) syz_io_uring_submit(0x0, r3, &(0x7f0000000340)=@IORING_OP_WRITE={0x17, 0x4, 0x2004, @fd_index, 0x400000000000, &(0x7f0000000280)="a871b3c099be2bc32b14c91bd8c17184e2b9386d1941463187616d05e4e9b9d4bc2b8559c00bc5d11bee229342d9f7a298b47249e40e4be6a5e3c516b28f0b1e3c8d9710b52a8526397857ff26861a3b65f22422ebac9e6fe6422c7a4b05f8be0adbc05200df46d72cdb5ce53567ce84eb240a235d40f7e92c195f0cf9c91bb4a6c23bc7104bcc2ccbac8e508223926c340fc32ed0cc7726818efe81e49155be1811b2440d9414f534b18a15db17589fb3b7a2c2d3", 0xb5, 0x0, 0x0, {0x0, r5}}, 0xa99) syz_io_uring_setup(0x6944, &(0x7f00000003c0)={0x0, 0x204d, 0x10, 0x0, 0x2fa, 0x0, r1}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000440), &(0x7f0000000480)=0x0) r7 = syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r6, 0x0, 0x3) pread64(r0, &(0x7f0000001100)=""/4095, 0xfff, 0x6800) syz_io_uring_setup(0x5957, &(0x7f00000000c0)={0x0, 0xbb5c, 0x4, 0x2, 0x1bb}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000180)) r8 = syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, &(0x7f0000002a40)) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r8, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r8, 0xa, 0x0, r9) syz_io_uring_submit(0x0, r3, &(0x7f0000000600)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index=0x8, 0x9, 0x0, 0x9, 0x0, 0x0, {0x0, r9}}, 0x7) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6) 18:33:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa16) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3076.610084] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 18:33:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000500)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f00000003c0)=ANY=[@ANYBLOB="7472616e733d756e6978246163636573733d757365722c64656275673d307830303030303049e3217bdf6bcc0200000064db000000000000000000000000003b26d4a0647b3038dd024ca42ae5cd56f93cba043914c8c3", @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c666f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f77a965723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcnQ^\b\x00\x00\x00\x00\x00\x00t,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) getgroups(0x6, &(0x7f0000000b40)=[0xffffffffffffffff, 0x0, 0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0xee00]) lchown(&(0x7f00000002c0)='./file1\x00', 0x0, r6) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r7, &(0x7f0000000200)='./file0\x00', 0x86) 18:33:09 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000340)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e1c34e9ae54359a5b42d6851fe4ac9e6340f0a299b4ce5e900b11cb263b6ad5cfd5e26e76f3a98bcf0631aa368d66ba69e3c2acb1a10e213f6b702a57b34f73e32d5a059a4efc6c0000000000000002807589179f7df769a8456b3e42fa0b276c190c49771f2d4cd7ed9260e124ae5d7121a3dcb10da545f9f25f5fe0d2bf775aed68f12db868af98f85eaf746a07627d0f958241deef2aa844", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) [ 3076.741253] 9pnet: Could not find request transport: unix$access=user 18:33:09 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9b0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) [ 3076.765219] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 18:33:09 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xff}}, './file0\x00'}) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r0, 0x29, 0xd2, &(0x7f00000000c0)={{0xa, 0x4e20, 0x80000000, @private1, 0x21}, {0xa, 0x4e23, 0x8, @private1, 0x76}, 0x8, [0x101, 0x7, 0xb71, 0x4af, 0x6, 0x3, 0x3f, 0x401]}, 0x5c) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x41, &(0x7f0000000000), 0x4) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0x2}], 0x1, 0x0, 0x38}}], 0x1, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x4) r2 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000180)) mkdirat(r2, &(0x7f0000000040)='./file0\x00', 0x0) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f00000001c0)=0x2, 0x4) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r2, &(0x7f0000000180)={0x2}) epoll_wait(r1, &(0x7f0000000080)=[{}], 0x1, 0x6226) epoll_pwait(0xffffffffffffffff, &(0x7f0000000240)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x8, 0x8, &(0x7f0000000140)={[0x31]}, 0x8) [ 3076.780798] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 3076.796922] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3076.813625] 9pnet: Could not find request transport: unix$access=user [ 3076.884854] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) [ 3076.919211] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3076.970548] FAT-fs (loop7): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 18:33:25 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="238bbe72e5947827d752d526c34a830d41c7793e0ce513ac0458cfcfe7d52dbe03f7b60415e7fffd214bc4a6f55d91617e9cded8575b888344e86913979c14beb7938075b174d70dbe539df982f7880ec48e28b151e273588822942cbbd5b2bd83367ac3239f47a317a1508b9edcfca0b002a13a18897de1483d5691632ee81b5c4321106eb8bf32f8dcdcfd27fb5440f9d520338f32ad2c79541b58146ebd7a89c6070d7c8675426a8661109b815b741a07730b0d363a3d9b2a317829a64354b89680"], 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:33:25 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup(r0, &(0x7f0000000140)='syz1\x00', 0x200002, 0x0) pwrite64(r1, &(0x7f00000003c0)="f966a8", 0x3, 0x6) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) dup(0xffffffffffffffff) signalfd4(0xffffffffffffffff, &(0x7f0000000400)={[0xfffffffffffffffd]}, 0x8, 0x800) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:33:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ftruncate(r2, 0x5) ioctl$TIOCGPTPEER(r1, 0x5441, 0x3) r4 = memfd_create(&(0x7f0000000340)='\x00', 0x0) ftruncate(r4, 0x2001000) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000009, 0x2011, r4, 0x0) pwritev2(r4, &(0x7f0000000180)=[{&(0x7f0000000000)="92", 0x1}], 0x1, 0x0, 0x0, 0x0) ftruncate(r4, 0x84) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) openat(r5, &(0x7f0000000140)='./file0\x00', 0x101000, 0x60) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000000)="b683ae40f3fdac402b06fa055e4299bd37dddcc878d124b8", 0x18}], 0x1, &(0x7f0000000200)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @broadcast}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev, @multicast1}}}], 0x40}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000700)={&(0x7f0000000780)=ANY=[@ANYBLOB="dc010000", @ANYRES16=0x0, @ANYBLOB="01002cbd7000fedbdf2507000000200001801400020076657468315f6d61637674617000000008000300020000005800018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="1400020076657468305f746f5f6272696467650008000100", @ANYRES32=0x0, @ANYBLOB="140002006e657470636930000000000000000000140002006d6163766c616e30000000000000000030000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="08000300010000001400020067656e6576653000000000000000000048000180080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="140002006e72300000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080003000600000008000100", @ANYRES32=0x0, @ANYBLOB="5c00018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800030003000000140002006e723000000000000000000000000000080003000000000014000200766972745f776966693000000000000008000100", @ANYRES32=0x0, @ANYBLOB="4000018008000100", @ANYRES32=0x0, @ANYBLOB="08b28ca0f6926722a419f7aea2000100", @ANYRES32=r7, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="14000200766972745f776966693000000000000038000180080003000500000014000200687372300000000000000000000000000800030001000000080003000000000008000100", @ANYRES32=0x0, @ANYBLOB="04000180"], 0x1dc}, 0x1, 0x0, 0x0, 0x4000845}, 0x4000041) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) 18:33:25 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) rename(&(0x7f0000000280)='./file0\x00', &(0x7f0000000a00)='./file0/file0/file0\x00') mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:33:25 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa1d) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:33:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x13300}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_flowlabel\x00') r1 = syz_io_uring_setup(0x7bf4, &(0x7f00000001c0)={0x0, 0x319, 0x8, 0x2, 0x32c}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000240)=0x0) r4 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x3db}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000380), &(0x7f0000002a40)) r5 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r4, 0xa, 0x0, r5) syz_io_uring_submit(0x0, r3, &(0x7f0000000340)=@IORING_OP_WRITE={0x17, 0x4, 0x2004, @fd_index, 0x400000000000, &(0x7f0000000280)="a871b3c099be2bc32b14c91bd8c17184e2b9386d1941463187616d05e4e9b9d4bc2b8559c00bc5d11bee229342d9f7a298b47249e40e4be6a5e3c516b28f0b1e3c8d9710b52a8526397857ff26861a3b65f22422ebac9e6fe6422c7a4b05f8be0adbc05200df46d72cdb5ce53567ce84eb240a235d40f7e92c195f0cf9c91bb4a6c23bc7104bcc2ccbac8e508223926c340fc32ed0cc7726818efe81e49155be1811b2440d9414f534b18a15db17589fb3b7a2c2d3", 0xb5, 0x0, 0x0, {0x0, r5}}, 0xa99) syz_io_uring_setup(0x6944, &(0x7f00000003c0)={0x0, 0x204d, 0x10, 0x0, 0x2fa, 0x0, r1}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000440), &(0x7f0000000480)=0x0) r7 = syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r7, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r6, 0x0, 0x3) pread64(r0, &(0x7f0000001100)=""/4095, 0xfff, 0x6800) syz_io_uring_setup(0x5957, &(0x7f00000000c0)={0x0, 0xbb5c, 0x4, 0x2, 0x1bb}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000140), &(0x7f0000000180)) r8 = syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, &(0x7f0000002a40)) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r8, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r8, 0xa, 0x0, r9) syz_io_uring_submit(0x0, r3, &(0x7f0000000600)=@IORING_OP_FALLOCATE={0x11, 0x2, 0x0, @fd_index=0x8, 0x9, 0x0, 0x9, 0x0, 0x0, {0x0, r9}}, 0x7) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x6) 18:33:25 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9b0) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:33:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa16) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3092.622085] 9pnet: p9_fd_create_unix (17264): problem connecting socket: ./file0: -111 [ 3092.681715] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 3092.688831] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3092.704134] 9pnet: p9_fd_create_unix (17264): problem connecting socket: ./file0: -111 [ 3092.710629] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3092.913237] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:33:39 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) unlinkat(r0, &(0x7f00000002c0)='./file0\x00', 0x200) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:33:39 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000140)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file1'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000340)=ANY=[@ANYBLOB="6a75a83ec0bb1050db0b5e95cb4ff842981e99bca6bc9cbc324609850aa4899cf8025f68d34090df14baeaf04682a5c3ec6a67cdc1ba3e0710475b7dd099db99d028085ee91754ef8f5d2e283e0d71bd7f8c9d630af084b38e759060275f55cc6c84f574c762fdb584f82b1034afc473d1f974f5beb35358c03113ab1fdbdeafae9718966f91de7c53443dde16a47b403e189eedf4c734b03fa14e14eb9d82fc4f368acf08174849c1f8b24406221da2fc70278399af586ea86d2d75f1f8e6ef3c3952b89516", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:33:39 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r0, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x2, 0x5, 0x1, 0x0, 0x0, 0x0, 0x41000, 0x8, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x7fff, 0x1, @perf_bp={&(0x7f0000000340), 0x3}, 0x1, 0xffffffffffffff6d, 0x0, 0x5, 0x8001, 0x7f, 0x3, 0x0, 0xffff, 0x0, 0x28a9}, 0x0, 0xc, r0, 0x0) openat(r2, &(0x7f0000000400)='./file1\x00', 0x8001, 0x1) r3 = dup2(r2, r1) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/asound/timers\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x4010, r4, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r3, 0x0, 0x7ffffff9) 18:33:39 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a3", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9ea) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:33:39 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x207e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/44, 0x2c}], 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0xf, r1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_GETFSLABEL(r0, 0x81009431, &(0x7f0000000140)) fallocate(r0, 0x1d, 0x1, 0xd5) copy_file_range(r3, 0x0, r2, 0x0, 0x200f5ef, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0xd1, 0x7f, 0x9, 0x0, 0x8, 0x0, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8001, 0x4, @perf_bp={&(0x7f00000000c0), 0x4}, 0x5, 0x36, 0x9, 0x8, 0x2, 0x1f, 0x1ff, 0x0, 0x7ff, 0x0, 0x7}, 0xffffffffffffffff, 0x9, r2, 0x8) 18:33:39 executing program 7: ioctl(0xffffffffffffffff, 0x1, &(0x7f0000000040)="651001879a8d3285cc8658def6") r0 = socket$netlink(0x10, 0x3, 0x13) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x14, 0x58, 0xc21}, 0x14}}, 0x0) 18:33:39 executing program 6: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00'}) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1001, 0x0) fchmod(r0, 0xa0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x406e2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000011c0)=ANY=[@ANYBLOB="28000000100001130000000000000000000000000000000c00008008001000", @ANYRES32=r2, @ANYBLOB], 0x28}}, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1001, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r2, 0x89f9, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'sit0\x00', r4, 0x4, 0x85, 0x53, 0x0, 0x10, @dev={0xfe, 0x80, '\x00', 0x14}, @mcast2, 0x1, 0x80, 0x9, 0x3}}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x412040, 0xaa) ioctl$BTRFS_IOC_DEFRAG(r6, 0x50009402, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00'}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffb, 0xfffffffffffffffc}, 0x2, 0x0, 0x1004, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:33:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa1d) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3106.572500] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. [ 3106.592467] 9pnet: p9_fd_create_unix (17310): problem connecting socket: ./file0: -111 [ 3106.616723] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. [ 3106.649129] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3106.695124] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3106.716665] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 3106.731126] 9pnet: p9_fd_create_unix (17310): problem connecting socket: ./file0: -111 18:33:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) dup2(r2, r1) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') preadv(r3, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0) fsmount(r3, 0x0, 0x88) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000740)='net/icmp6\x00') preadv(r4, &(0x7f0000000440)=[{&(0x7f0000001e00)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x8200, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x90000, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000003c0)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)=[r0, r3, r4, r5, r6, r1, 0xffffffffffffffff, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x3) syz_io_uring_setup(0x68dd, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000040)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r9, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0, 0x40000021}, 0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x3, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r10}}, 0x1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r10}}, 0x7f) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd_index=0xa, 0x5, 0x0, 0x1f, 0x0, 0x0, {0x0, r10}}, 0xfffffffa) syz_io_uring_submit(0x0, r8, &(0x7f0000000140)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x4, 0x0, 0x3, 0x3, &(0x7f0000000100)="d7783d3a8a1f45e4ae5b93a22939d05d63426d1804b6f3b616142573f4f5e6cc34d21378e641effe3d199c898f7ebff4295ceb03ee56c71771eb0b390631", 0x9, 0x0, 0x1, {0x1, r10}}, 0x2) 18:33:39 executing program 6: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00'}) r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1001, 0x0) fchmod(r0, 0xa0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x406e2, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000011c0)=ANY=[@ANYBLOB="28000000100001130000000000000000000000000000000c00008008001000", @ANYRES32=r2, @ANYBLOB], 0x28}}, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1001, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r2, 0x89f9, &(0x7f0000000100)={'syztnl0\x00', &(0x7f0000000080)={'sit0\x00', r4, 0x4, 0x85, 0x53, 0x0, 0x10, @dev={0xfe, 0x80, '\x00', 0x14}, @mcast2, 0x1, 0x80, 0x9, 0x3}}) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r6 = openat$dir(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x412040, 0xaa) ioctl$BTRFS_IOC_DEFRAG(r6, 0x50009402, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00'}) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffb, 0xfffffffffffffffc}, 0x2, 0x0, 0x1004, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:33:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa1d) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3106.804556] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.6'. [ 3106.889120] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:33:39 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) r3 = openat(r2, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) sendfile(0xffffffffffffffff, r3, &(0x7f0000000a40)=0x1, 0x4) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000a00)={&(0x7f00000003c0)=@abs, 0x6e, &(0x7f0000000dc0)=[{&(0x7f0000000440)=""/76, 0x4c}, {&(0x7f0000000b40)=""/71, 0x47}, {&(0x7f0000000bc0)=""/114, 0x72}, {&(0x7f0000000c40)=""/176, 0xb0}, {&(0x7f0000000d00)=""/184, 0xb8}], 0x5, &(0x7f0000000e40)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000010000200100"/20, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000002c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x70}, 0x40000002) perf_event_open(&(0x7f0000000ec0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) openat(r0, &(0x7f00000002c0)='./file0/file0\x00', 0x80000, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 18:33:39 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = inotify_init1(0x0) r1 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x20) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000000)='./file0\x00', 0x10000400) rmdir(&(0x7f0000000180)='./file0\x00') recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) 18:33:39 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a3", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9ea) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:33:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) dup2(r2, r1) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') preadv(r3, &(0x7f0000000080)=[{0x0}], 0x1, 0x0, 0x0) fsmount(r3, 0x0, 0x88) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000740)='net/icmp6\x00') preadv(r4, &(0x7f0000000440)=[{&(0x7f0000001e00)=""/4096, 0x1000}], 0x1, 0x0, 0x0) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x8200, 0x0) r6 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x90000, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000003c0)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)=[r0, r3, r4, r5, r6, r1, 0xffffffffffffffff, 0xffffffffffffffff], 0x8, 0x0, 0x1}, 0x3) syz_io_uring_setup(0x68dd, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000040)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r9, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0, 0x40000021}, 0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x3, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r10}}, 0x1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r10}}, 0x7f) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd_index=0xa, 0x5, 0x0, 0x1f, 0x0, 0x0, {0x0, r10}}, 0xfffffffa) syz_io_uring_submit(0x0, r8, &(0x7f0000000140)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x4, 0x0, 0x3, 0x3, &(0x7f0000000100)="d7783d3a8a1f45e4ae5b93a22939d05d63426d1804b6f3b616142573f4f5e6cc34d21378e641effe3d199c898f7ebff4295ceb03ee56c71771eb0b390631", 0x9, 0x0, 0x1, {0x1, r10}}, 0x2) [ 3107.029896] 9pnet: p9_fd_create_unix (17343): problem connecting socket: ./file0: -111 18:33:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa21) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:33:39 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a3", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x9ea) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:33:39 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:33:39 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb56149a2b95cb4ff840981e00000000", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) [ 3107.109622] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' 18:33:39 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa1d) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3107.132140] 9pnet: p9_fd_create_unix (17354): problem connecting socket: ./file0: -111 [ 3107.352662] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3107.381782] EXT4-fs (loop6): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3107.416827] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:33:55 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x100) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x4, 0x80, 0x1, 0x49, 0x0, 0x9, 0x0, 0x7, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x2, 0x5}, 0x240, 0x6, 0x8, 0x8, 0x0, 0x0, 0x5, 0x0, 0xb653, 0x0, 0x1f}, 0xffffffffffffffff, 0x3, r1, 0x3) r4 = dup2(r3, r2) getpeername(r4, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) write(r3, &(0x7f00000003c0)="81e97c9aee5057119ac51d33b22266833b143d1a411be8aadbe539cf87aa1ce7974a613214be181b2887df6e792ca1f7c0cba08e475fa8c8fc0584a659b2ec50044e0f5c49e109eac079b245ed9ba01534236917b7e7afecab9d2b4ada63da1321c38c1724616565c46f3362152e423793dd23e4fee546a8b71cff7a1272bdba395681722e88d353f0840131f320d41f6a8362aa54b3f7a03c80aef440ef69c887b1267844b50b04fd0746fd8a0874dfb208d9cbac913aaee934365774589371679739ca915cb161f707c9388ceb207269cedeaa06ecf191cc3fcfd5", 0xdc) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:33:55 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="23211e2ef10260fdc82ba783ab396c65300a00002000000000000000"], 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000340)=ANY=[@ANYBLOB="6a75a83ec04ff840981e00000000000000000000004eaadd4d613ae11659d124e1791d0ad7a67c073684ac62d8fdd125a8674af3856a84e56d32f2c5b172916d46643d4754c98ed0ba1abcc08e1703940ae98b0a4df716e2dd08564f681777c49420d050b6bd6cebb58ff289668a17d3658268e6d977bfe4b0ba526b91bc7ff811d8853aea71f8254f76b2478a4a1e2554affcb627dc5b2b18ebe35ae7794fc0498e71d87708d8471664df789a752706d2", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:33:55 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,acqess=user,debug=0x0000000000000002,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffffff, &(0x7f00000006c0)='./file1\x00', 0x0, 0x40) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) ioctl$F2FS_IOC_MOVE_RANGE(r6, 0xc020f509, &(0x7f00000002c0)={r2, 0x4, 0x81, 0xb47}) open_tree(r7, &(0x7f0000000a00)='./file0/file0\x00', 0x8000) 18:33:55 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x200001, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f00000000c0)={0x6, 0x3, 0x7fffffff}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000001c0), 0xc, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="5eb10828000000f703a000281cbf827fdbdf250700c83ae27fd2364cf466696c65302e2f66696c1b0b0000"], 0x28}, 0x1, 0x0, 0x0, 0x40040}, 0x40) bind$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r1, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x80800, 0x0) bind$inet(r2, &(0x7f0000000300)={0x2, 0x4e22, @rand_addr=0x64010102}, 0x10) fallocate(r2, 0x78, 0x9, 0xc000) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x1c, 0x0, &(0x7f0000000180)) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, 0x0) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r4 = dup(r3) getdents64(r4, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r4, 0x0, 0x0) setsockopt$inet6_tcp_int(r4, 0x6, 0x7, &(0x7f00000002c0)=0xfffffffa, 0x4) unshare(0x48020200) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000200)='/sys/class/mem', 0x4000, 0x4) 18:33:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa21) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:33:55 executing program 6: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x1) fsync(r0) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r1, 0xc038943b, &(0x7f0000000040)={0x7, 0x30, '\x00', 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) clone3(&(0x7f0000000ac0)={0x134124500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, &(0x7f0000000080)={@remote, 0x778, 0x0, 0x2, 0xc, 0x101, 0x3}, 0x20) 18:33:55 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x2d3043, 0x84) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, r0, 0x2) ftruncate(r0, 0x1000003) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) fcntl$getflags(r0, 0x40a) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fsetxattr$security_selinux(r2, &(0x7f0000000000), &(0x7f0000000080)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x0) r3 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/attr/current\x00', 0x2, 0x0) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r3, 0x8008f512, &(0x7f0000000140)) getresuid(&(0x7f0000000400)=0x0, &(0x7f0000000440), &(0x7f0000000480)) mount$9p_virtio(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x4, &(0x7f00000004c0)=ANY=[@ANYBLOB="74010400000000000074696f2c63616368653d6e6f6e652c64666c746769643d", @ANYRESHEX=0xee01, @ANYBLOB=',cache=fscache,nodevmap,dfltgid=', @ANYRESHEX, @ANYBLOB=',access=', @ANYRESDEC=0x0, @ANYBLOB=',msize=0x0000000000000101,access=user,debug=0xfffffffffffff597,access=any,fowner<', @ANYRESDEC=r4, @ANYBLOB=',defcontext=unconfined_u,\x00']) fstat(r1, &(0x7f0000000600)) ioctl$RTC_WKALM_SET(r2, 0x4028700f, &(0x7f00000000c0)={0x1, 0x1, {0x24, 0x24, 0x1, 0x3, 0x2, 0xfe2d, 0x0, 0x1d, 0x1}}) acct(&(0x7f0000000040)='./file0\x00') unshare(0x48020200) 18:33:55 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf9", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa07) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) [ 3122.725377] 9pnet: p9_fd_create_unix (17388): problem connecting socket: ./file0: -111 [ 3122.828142] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3122.853394] 9pnet: p9_fd_create_unix (17406): problem connecting socket: ./file0: -111 [ 3122.860130] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:33:55 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r2 = dup(r1) getdents64(r2, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r2, 0x0, 0x0) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000240)={0xffff, 0x2, 0x4, 0x0, 0x7, "18aedfbeb01b478c"}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000160db0018000000", @ANYRES32=r0, @ANYBLOB="05000000000000002e2f66696c653000"]) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f0000000100)=""/254) r4 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)={0x200, 0x41, 0x6}, 0x18) getdents(r4, &(0x7f0000000380)=""/220, 0xdc) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xe57, 0x0, "0400000000000000473dd18f736f0ff281f183"}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0x4) r5 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000080), 0x40002, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r5, 0xc018937a, &(0x7f0000000200)={{0x1, 0x1, 0x18, r3, {0xa0}}, './file0\x00'}) ioctl$TCGETA(r1, 0x5405, &(0x7f0000000300)) 18:33:55 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r3 = dup(r2) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r5 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r5, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r4, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r6, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r7, &(0x7f0000000200)='./file0\x00', 0x86) 18:33:55 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x46e2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x6, 0x0) r1 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_generic(r1, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x40811) ftruncate(r0, 0x1000003) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x1ff) r2 = dup(0xffffffffffffffff) getdents64(r2, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r2, 0x0, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_SET(r2, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1ea55bc0060f4bb4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x50, 0x0, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@ETHTOOL_A_COALESCE_RX_MAX_FRAMES_LOW={0x8, 0xf, 0x2}, @ETHTOOL_A_COALESCE_TX_MAX_FRAMES={0x8, 0x7, 0x7}, @ETHTOOL_A_COALESCE_TX_USECS_LOW={0x8, 0x10, 0x1000}, @ETHTOOL_A_COALESCE_TX_USECS_HIGH={0x8, 0x15, 0x1}, @ETHTOOL_A_COALESCE_HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_COALESCE_STATS_BLOCK_USECS={0x8, 0xa, 0x3}]}, 0x50}, 0x1, 0x0, 0x0, 0x40841}, 0x8000) open_tree(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x81001) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) ioctl$VFAT_IOCTL_READDIR_BOTH(0xffffffffffffffff, 0x82307201, 0x0) socket$netlink(0x10, 0x3, 0x9) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), 0x0, 0x0, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7, 0xbc0d}, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 18:33:55 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf9", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa07) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:33:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa21) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3123.208575] 9pnet: p9_fd_create_unix (17428): problem connecting socket: ./file0: -111 [ 3123.297569] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' 18:33:56 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf9", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa07) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:33:56 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x24482, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="a0092f905e9b2592edae3d56a689b6aa275b02016274eaabb2d5db7b69dce518bdc85e9979080b8283d9701e28e5cffcbf3256aba3075faecce3bb3276e49a604e5aed9c1c000000000000"], 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff84056c3", @ANYRES16]) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x7ffffff9) [ 3123.315090] 9pnet: p9_fd_create_unix (17433): problem connecting socket: ./file0: -111 18:33:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf9", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa23) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3136.641543] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.7'. 18:34:09 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) r1 = dup(0xffffffffffffffff) getdents64(r1, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r1, 0x0, 0x0) write(r1, &(0x7f0000000340)="6aa6cdf12d0f8e6b99d119749fa89bf1a7dc4aeada8d3839e9078eeaf2be979ab6ba87819e586ddf0333c2efeefa18aa17984fccbaedda7a5e8f324488d65e573254b52c8f9b7905f90ffd48a19d09a06d2166dd8192975aa010bd91bc428806929dd4cc3514fabd0c829760e1d603", 0x6f) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r6 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r6, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r9 = dup2(r8, r7) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x8, 0x8, &(0x7f0000001880)=[{&(0x7f00000003c0)="bba694ad826b60cb83ecc961811494f7eb3137019a86ce2cfc1331189de30f1efbf40a15c8ec22584f5c175b7dcce2823b0f7d1c70f39e73126e436d49fbca44b931c661a28523ad21641fb7a299eab64467ee744d49ef92de767b243382b75245f90d0e33d2559b2d50dc63afa0161a41ad065dfe40ed9d319fbe7d7b98d9f47874980b0be235d383ea2fd883c42001226a96ccbc9a27ccb945ae1de014", 0x9e, 0x66c}, {&(0x7f0000000480)="f6278868c9bf516f49183abd555b711c7026239e5b11a8c8d864d07b22a8db862e1b201e684e3147057b65c9c49eef8909affec1e6dba2e3cf33191b2bf4c6b81f912710ecffa57b450b9025f58a4c1b717ebf69cc64c1bdd3df0402a2658beff2b1684c20218d8fe87ea516b223a3f062ce52eff6f9f6f9b8abe2ee317a75bb5a9794cae948bc6ed261d32c4a3243945c3d059dcac9175daee2b65e0d2a113a53e3f6152bbf59d088efc4cc589496ffd5758506ed98bfc2a86b2aa983e229d11e7b9be07cb0b815a1c8b1992e5d2e0a7f4d26239472ccc07276ceed061864f362a8e1de4b08449b4665c51a994dcfa49c5ece801eb5c7dd6c55705af5d311d3472fa0dc77af8ca4bb8f9ae1be330f061be616828073d7eabe15d22798d0b9004eb5aefafdb244fc7e05f46cf527a1ea8477bcbe2808bc53aee3fdf7611e3e00479a6c414aed6d40b89b692d15e90148508072fe1435acfab231f79d8ccdcbbeeea1398a7573c3f12e530b33de589f8549857afedd0b4b126f021185e17a9937bb36a0eff1a60ac9e7fa6e8cb52e4e90fe81660ff01e32a87c19c2c562c738d1e8ee30b3288bb9f90e86e0ddd6f227c9b06c3bacacca7b006435712f2d231883c937f6999be584f1f9aa05b178afdf3d0336187ef09bacad1fb6919dbb86ac8a21dacbf30616aedc3d8ee6c28c7a2ad337d0f2dda98fc27561a7084b3e476f33c35400676bd4fa2fcce1a2ba4987b1874f6c632294c9f485b2c9c26d375a6160e27e95b7989bb584f01b131214360159becb3147d3f22bb8948910d6a2c8aa8b195cfa80de292a26e97aa0971f2dd884af647a801634207b3c41ecbe39e842f870d8e83cbd65a4f512ecef4df8feea3ce51240949c1d3b9c55ffce2ddbb9decda069a4e24d0f53518ed4ccd523d103a2e7baf886cb948ad9fc01159a817be66d212692530f959977b30c3eb850aee2aa50a758fc18e9488cd91288834361e1197a18b95bcd3a59637e0a4c2352d0137a511c26ec9392df3d9cdc98372ced6b39d4970001c6ad097e0ef2e2dcd0ff1a09c7277795bc1d745cbef4edf4ec9db47db72ee51e9c03604b65267460e0d44744a8495aee002b96a29bf78b259c7359cf02ea4de0d34cde964e6362f1ca6564e0ad09a2292a655b27fbbf081a2b79296402a0aa7c50188d711e5aa4aa24716c47eae7dd1836a607977c59d4956a310020b34f40f130a3d9db0bd622aaf149ee5dde865b68af944f620be414881db2fe38f1940c3d47e01ab9a24a6bc4557ca362455d27ccea0a6201348bcc2df462d14b3c53fb427338d44375662e2b8382c437ee9424a788bc904ca9aaaacb861b6dd14b8931cd6fdbda76dfe44566dbe2e72b9ff4179667194cc965908f2d9eec08cfb1f10b18939e5bc7370b694e667a7d6abb3ba7f120f9558597d1b845a308d003f7f8dba020761782e39fd1c4e6146764eaf2da92e81703c480d756a184f857107c9fe2f6d3851d904ca0a803d57cb05c061b683d7b7ff9fd4ce0011e7777ef85bb78fda840d84198b6e2819494554c6135f47e530c128eee1926a5e2f193a5309beb4f48ed31d5d3781e141e1d1cb84f8c1772d4bb24288ba5ce43590553a9d1db733df4036419407e1ff728be1f0cbd0422dbe02f7298ae43b3200e8c0008bdbf3fde06f515314b7bd423eb5acce680afb7d4127694b4108461246814c57a340fd6d0e10d2cb1a23998f8a3c9705853e38b1dceebab773075ae112120bab0879443d765a6ba6bda9d3166b3ffa28ef089a978d6ac1e7858c84da6eac94de79f904e8fb686b9700892d68909f485b221ab4ff5f3896902f1956b221425c82de17da34da7cc427a82cfcdfaa9729773a92da38c7689b3c2ba6de5d8d4f141b584f4071d2eea85fe07f02fbcd11e9280b7ad330ebac6b435008ca4d66d3249d3038f1b121a566c5df3158d8785b639d84e79f6d9507484d370ca0444b19176ecbb39d9f846219aba77ee08bf0ebf693356db7d9d675a5f8c14ff873a22a2e8840e5eae9f2bf8bce4b609e75d4580f947f2a49c5815acfcadada5506a8e1c5bed9ad0f0a904b54f70bfe6a60c16b1022358ba6b3f80765c8fbd874d211655c8a849e7f0c965ae0565197ae172679dc31cf5e5bc0fc26f08bb9f66695e5a16d0edca4485ebeb0f8061edbef7792a6d8e84d634b4f51772160619b33ca20f256156feaadd1d64cf64e0e2d5dbd2fdf60cf3cdd5953ab5c1190be0125ffb99957b66249a38bb2014e47afac5d6333e4f6eac71c09bf83d27400a96d8a9745fd9ef9577af88d32e30de3718a05d69bd8299adbef669adfa325930deca6b2f0b7e0e4954ee5cedadd59114201173071a2d41d3f2d6a11773c61a980757f0273685aeefeeced826dd409bf743f6811cce78ee49ba03dc02ab3e87abfdddaec94fd82629e3ddf4e5454682d025ccb96e87aad5aa79b243c56429deda168e2a0011695ad4ffccf86043e58f9d0edc7f76df366186ac6cc3d1f9d746b4a8cd9af0ff67a680db34c4c205d7a05337748955b927fc519c8218986280c391e64fe25f8df0e7c294ac0596024424b93fb2acdf6c7f7db43a8ac8ab081047945591e7fcf2b7a6948810adfae06f2cf4a8127812fa3b236bf0ce120f673f8d3d42476cc1fd8b370e3cbf4f517ff798499d6d62b269e58c1040c7a47b5d9833cfcc84c2728e85b07b2b6144117a3daddc00abc514a2a3f1b876f77bd37660974c8105ea48f85ce3c6c7faf3d002f9c421893614c145c906669c22dd92ec91759c83e8ccee4e184cf2d9d515f758179b7ac18b64348088b075a3dab74459ca1af39b29106a00fe9691e452aa8ae6ffe456c91f4d39bf7a9db0af7d6960baa271a39c9516a118c7ba70e45b0befc9b6bbfdbd902adf71f8af9825788dd96f02844df988df1872141597228d2b1c4db1f083788c5bf9109013407dffec850c5fd4e1418cd3c2353428c79c2a542d590e75610e37044e9ab6d49c7a45206f69e82bcb5a1270d328cb28eeaf76bafe1fe8a17afb39c0962e8b100d43f1b467c495fdb1fcd91071d7ca3c8bbb1de4094ac17815a4a756c0689b797d51c09cf9d293488dee5fa65fa91d091652afb39be75bdb9212583929976708548663f231f842035bfa32ab749b355e7e1625f50cc2cbc88e3ce1518971e8c50ae942831029b2487a452cbb70b28fd20563ffc76519ebde3a050f312b9842d18967866a1e500097ebadba4684bf6e6a8c7f87a346a1559ab59a1db1e51a06117573c15db72d5162b8da6c5a7ab8972293761a5dd21ff1d2aa1ab2f666c247bf8e4965528f462c8c0712a38c6d626a65120d755f306a9bfce2bec002b2f896bbd5335ffb4d04a0c21e2ea92804b64037b0d13e0825460a3c6240e4672afb251cc570c80e1c7ee27987cade984e86154da4ba4887b7abe84f3c63a8b97cf1557f761583c9ed1a9156cea78ca349780f30028dfeba7c68fe87f09f6771a19acd89fae565bf1ada74981dd97e1936b5cf764414d6b47128908ba1c95de5145927459f45bba053a4f59a9512ff53e00f2164f16c2d53fd4dd68e48250b415d13a44749fddfd33ec5b1376040ef572a877b0899835b576c1715222022c27b8c4dc5d406ae5c1a90d816f21e9d670c00fd66f9ea4a89b8b6cec9cb23443fa0da02690cc56d2e5eb69c3ae56ed42a1df66459d9a4e1f4f0398f2a82562660dc4be8001b148f76d619d2dc3f9977d5621a7ab307a0303f4ec503c09d7fae588999fc65d95c285e187727cb5835ea1ffcd93e10bd3e539be55bce6f66f11426d7a9df9956caa3a6ce931680c991c8376beeb11a1c1ca169b122fb8ff26406acdb3dff4dabab47ad6d246594cae202103a9a6cc3bb38709f64de037cef94579a1447c1c5dcb935c93d78072542887ad9cebcdf95b300bd2ac5eb141c0b3f3d69c0bc7c899eb5b10826269096647da7cc6aea7a1dba9af9b07aba99a04449b97a19ef918fd08ffc768c50af1b711d53ce3616c1ac43eb2ba468dd5ba1a52effeef17de8c371e22ccd9ae2691743114fffaf536ad46e70c5359378a27b74ea7d0656b63835e3402a4b134039271630106de49bb9528c9b9c33bd776f6c92d9b729bb7c218b287a618df77b16657978ec08d241311ff8507686313769f97672e8e186bf21fe9f07a4a52b2b885a767894a0933a1344ac634003d6382f12628852cbe963856cef507b9cb7b6c3beae210e2eb0917e37fe7ce94fd3b42ea2f60bc76a3a36c088892c017ebce2c17c03ba73f0e99b5d0e699601bd80e9615761a6313455c0115f0cc8848618df7d6beab3cbe1b239ccac8b2bb36c848f25188704e4196d05b803179fffb8cb552f32be1dc7d2b0cebe07d4e465b1e7b4e03bbc3a7a38e2903e074c89a7ccf70cd2f536b72d53cf009e4cb5dd1080cae8b8f860681c905cc3f7b11e6c4f9873592adadcb5dad430de3141ce679c82b82a565c4838f28cf932618e593bf7b7c3968e618a2f41c329b9e31b7672041a43c645e288bdb78ce3d5aa3ee4667ed53cce714e684a9d06d8ea19faa280fb94debb560ab19cd870ec7b3a2f593cda161da9156eacda5db4e664178c0d1f90ca62ba76613d5c7997c8adf6579327db02c7fa8086d7e12ac44479477ec7dcc8e6da8a52276d17e04a99c835b4d90d3dcf5196692be82add9c2306da2e7bad3235a8146f70cff05fa61fb2867858d2d92190ea23effb8a151fb4d9c8743c883f6496ced11fc715b8dc1a71939bc10aaea32aefda23c3371349f5c225f20809b46db80c29de347420ee104b893d0266e536a75b7e1d750835877bd7e0b24c171cca530df96e23962ff3c4c16d02d1cbdd29d26746c7799b0628a3bbdfa57a84df60941f3733908a1e3241127d54fea3409ffcaddd88f4d8bd67e04da919aeaa9b114ddf49e639e550f3bc1120fc3bcdcc0fd518e26c3ac209bd0ca6cdc7caf56f988e8c16a7486303193107f03f076ead87467920f0d92a654cd9f9ccefa70aad0c3930f4f6f9c0c2b1836677e6856c82f41262e5c8a002b87485ac0ce1171911130880a9cbb33af6c600a873ca7ef74ae9eb6cd21e91de1f0f379de985f54122acd6bf8c1afac2f44f56756252a03d06fb46584ad5d93a05a177787ffd31c2c72e8c8b463bc9f56c680a072132bb8c8fcd4d367713910055d227ddf81468b5d26ac6cc7405215a22a28c34daf8524ccfe7208340b88ceb69e0c183c942e7377cc5ddb3a20301f3d4e9b8e2c32b2f2151d76d66146eeabddeed32e05f32310e240b87b5a53df111691a2ad7ffc785fe430e6a78b9269c13ba81d1ee52ef63d84f843a2b742aa42c4e03f06e352603c2ac332e1ceea1d78a272dd2142366b20c89f14d8b5ca8ad91b748218437b15525e0eadaab7f5c4196c69a9b9c601a67810161af686c96657973a5efc0dc661ef2302ebd1eef56a611efdc2b183580e90ec1ada462cd107a0b76e7bd2ef47dacd043e9a7564564fb258638c99df32a2e6924e1859980b8ecba859e6aac2c590b6e9218c5f5b62f66a6928f6fe4359ddfedc238e1bca74704f1a67485ad5550e742d76254e9bb6f8f3679d67c55a8178091b066b5f1a307ce44c88351551e8a4c95daa6b4b7d6663b143dc9abded4cb34e48e0ae3964549e20babee39bc1d61981645cb6706d21a462698e4f10a8a4cdfa1c9961c64e6dcbdcc067e423ff024bb410122ec80f2eec5ab55f1bfcf13afabe2234052664f7e2cf6bc683f4f682109f3ab859e2a1350816bf89796cb9de65bf137", 0x1000, 0x1}, {&(0x7f0000001480)="8982acbc999ce73390d77991d4a7586f36804bbd88a65b8d9bbebbd3c538b9aa2a20e41b573cef96960726c452a63ae0574fe1891e9c875adc7d199b4d3e24bdd60a9e41847997b15d37436a6220bba52e0af957125f721c829a996fc1696a5c6d9337e2aeb4942ad7ada4b4db39252301de116e334a9209eead21e004b6328486cf4cdfa74954868cf7be00c77d41d3e640", 0xfffffffffffffffc, 0xfffffffffffff4f7}, {&(0x7f0000001540)="a05ba77d47d0cc108f57c4b1db415aaad64938ded3cc31d186176b800c97db0cf47468c92418cc02dc98ae89e91a5c1d72c826acc8010c81d75b3707ded68f84f4e199940ed483fb43d1fdb990a767d53a3c0ae4ef499e819a302dfe323b43680461ea85236f969323e59effa2a5824b2fcbfc135b70feacfd7437b8ca03eebb79d4a67327ee81e48b6908c1b9dbaa759dc2e0d7fc3408810a487888e392826d0038f12879d3193a74c26844b62998f88ed5ea5872a7ff5bebfa99120c9fb001c7992e4a1eca28ddac36a34b3fb888c5687b593998ab6c6398c356d77b1072c455459b0bbe0d06ecdf1bd6f395036744ffdcb9", 0xf3, 0x2}, {&(0x7f0000001640)="796712903eb9b337c77250ed282a5dbedf2c895ce82a5a46ee36ec2b066af07d1afd9398e8a1afc7f0ac63812181b8c8eeced5f5534b9b2bee3e4679c1e3836d48153fdbbd64ebb690aafe1d2097ce6d36debc96acf5bf081f6340eca84e302760089d27ecb0b845e8f91dab66ff1ab076f965390d5dae2bf9cf762ef9e272c5af351c068c5f08fcd27a569b6123673e755aa44bf5dc81252a9833f60230906e8c4913202b29a1937f49174c9d2a8bfdf4fe", 0xb2, 0xff}, {&(0x7f0000001700)="4471009665f9950ddbbc5139215f6d042f409c431f8b708c9d74575937d0ae96dc52ce393ac26107137ec07f12a5791eb302a9522f595efd406318ff369cebec472ca37439f8540c3150a669bdb2c35c91f2b9a18710b0ab7cf25f745966d1bec77b6c9d7a4079c5f91e5294b7b4816ecfdabaff1a54c7a2487322c7d3c8cfbed2b46c14c2b79bf0b5f90a7d20b2be8b25200a380afa3fd43fa23aa6be9cd0a6cf6f6fe4e2319d10b78a4d51678566340dfd38a6f4d93c49f7d2c3faf024bb", 0xbf, 0x20}, {&(0x7f00000017c0)="414502d217f41ee84231d57a204e98507923fe282ea99a7c631c397e9f45543033cfeabe1bba386cb6f145028e281df17bf66565ab776e92b6cd375ab9fb26396a77aa34d9f154f855d795e535659b3b9026ec1d3634bade03db3d107bd756737a59ee2c00aaf79d17c1de3842fc7b3db1881b835feaa2ae26350df2cab73cf180ad6350f05f16be0582a065dc7eae7d", 0x90, 0x7ffd}, {&(0x7f0000000140)="edddb43a991c505b7dbaf9a2a3859ce6a428a340c580324ebe86cdeef04c2cdb32737e56f2d0d8140dc96762de87ddc5be9488eab54d9e58faf9e636dd022bcb2ff6bdb1720cd012f856726d31edbecefacd2ec30ebbf9f9e2e493", 0x5b, 0x8}], 0x0, &(0x7f0000001940)=ANY=[@ANYRES32, @ANYRESOCT, @ANYRES64=r3, @ANYRES16=r5, @ANYRESHEX=r4, @ANYRESHEX=r2]) r10 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r10, r9, 0x0, 0x7ffffff9) 18:34:09 executing program 6: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_IOC_PROTOSUBVER(r0, 0x80049367, &(0x7f0000000180)) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x0, 0x800, 0x70bd2d, 0x25dfdbfc, {}, [@NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x9}]}, 0x20}, 0x1, 0x0, 0x0, 0x448c4}, 0x4040) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000001c0), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00'}) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000000c0000000c00018008000100", @ANYRES32, @ANYBLOB="180003801402038010000180040003000800010000a5000000"], 0x38}}, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000780)={@private, @empty, 0x0}, &(0x7f00000007c0)=0xc) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000340), 0xc, &(0x7f00000008c0)={&(0x7f00000005c0)={0x9c, r1, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team0\x00'}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x9c}, 0x1, 0x0, 0x0, 0x2ab7d754959b02d8}, 0x4008000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) r7 = socket$nl_audit(0x10, 0x3, 0x9) openat$null(0xffffffffffffff9c, &(0x7f0000000280), 0x100, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000440)={{{@in=@broadcast, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@dev}}, &(0x7f0000000540)=0xe8) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000580)={r8, 0x1, 0x6, @multicast}, 0x10) sendfile(r7, r6, &(0x7f0000000040), 0x80000001) syz_genetlink_get_family_id$nl80211(&(0x7f00000003c0), r6) 18:34:09 executing program 2: syz_emit_ethernet(0x51, &(0x7f0000000080)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaad84fcc174ad4aabb08004d00004300000000001190787f030001e0000002441c0003000000000000cd00ac1414aa000000005fe000000000020007030000000000005ee43d5f8a"], 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8401, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f00000000c0)={'ipvlan1\x00'}) syz_emit_ethernet(0x1e, &(0x7f0000000000)={@empty, @random="108e0ddee893", @void, {@can={0xc, {{0x0, 0x0, 0x0, 0x1}, 0x1, 0x1, 0x0, 0x0, "c2617e946391c202"}}}}, 0x0) write$tun(r0, &(0x7f0000000100)={@void, @void, @eth={@random="be963db19a98", @broadcast, @val={@val={0x9100, 0x5, 0x0, 0x4}, {0x8100, 0x5, 0x1, 0x3}}, {@generic={0x17, "a8b01fe96a38d6ca3ed87aef53b275b5c874d1282ea0af3a024b004e2d63c885b1c8fc23d637380cb7d5c29da684a76a54aef42b992d31dbc4092d9679c4ee210d04971e198c2107acc8e47e0e5de9488804f57573935810b0"}}}}, 0x6f) 18:34:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf9", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa23) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:34:09 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa16) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:34:09 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='v7\x00', 0x2, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000a00)='./file0\x00', 0x80000000, 0x3, &(0x7f0000000c00)=[{&(0x7f0000000a40)="8e8fd86190e1c00d5700fc2da874cfe5255e8ffa7deb72b1e74663dbf228687fa4035bcdfbde3bc966e3eda9b36b542baa15f787292131681d132ea3c1cf3440fc380e19b43e3ca89212c05d449b0f2515bbcbd42ee807b722a943b6f5039ef8a71916d09afe9785cfe520c73c9039dc3a54b3bf3a0594e2c74f45b9f0ac97a17351d9056732027966b7117ff8a8c549bbb6cc95dcae8fe7455afef4c5a95c919348175117e18c0405e1b1ea0b46592ceca10d84e463605db4a3ba1b8cee680072febd4385138d79d24e2dba3da150d0f42a6fcc7677d7599dc8504bb90f3924e7aeea53e953187c4937f0d60b291567c4c727caa34d3796ad", 0xf9, 0x9}, {&(0x7f0000000b40)="7e1941a9c6256d8a9b9798a8ea0ad9333d03d5679712f622deef6228886d7698de6581eb8738bdd59efa2914ab30d349d894629979e87f11a2ea2521348f23da1826efba9655c2e5aecf0d0c0fd0cd6998bca82f65ede632617b6020998b9f67cce8", 0x62, 0x7}, {&(0x7f0000000bc0)="784881f8d6ea45dd7bd7477ad246531631b37f7812da88dae0f3442c59bcd3", 0x1f, 0x4}], 0x8004, &(0x7f0000000c80)={[{@utf8}, {@uni_xlate}, {@shortname_win95}, {@nonumtail}, {@shortname_win95}], [{@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}]}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x200181, 0x40) socket$inet(0x2, 0xa, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r3, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 18:34:09 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="60010000100001000000000000000000ff020000000000000000000000000001fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x160}}, 0x0) sendfile(r2, r0, &(0x7f0000000140)=0x7, 0x0) fallocate(0xffffffffffffffff, 0x41, 0x80000001, 0xfffffffffffff74c) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x5, 0x1, 0x0, 0xff, 0x4, 0x0, 0xa400, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x7ff, 0xffff}, 0x300, 0x0, 0x0, 0x0, 0x17a, 0x5, 0x0, 0x0, 0x2c}, 0x0, 0x0, r1, 0x0) 18:34:09 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000340)={'#! ', './file0', [], 0xa, "8a40ec3fce621ba8cefb51a8f8b8f0d60fffd4dfb962506282bf3faf66cdf0f79bff765af2f2e5766dfbc2276cc9152f443f91836a5702cccab57da42eb1937590c099d59da295ac45de795db731d3556eb338d3109de6fc4f8030bddeeae961a75c6787908c60a45c38e84fd5bcca45873c6f82a5372038f7af9beb8861892e6d5b84f7c09598d0f727da4105000000f23fa347b4a4cdec4bb7ca42be92f5069a97174c34ebcd20c7edf2"}, 0xb6) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) [ 3136.666165] netlink: 112 bytes leftover after parsing attributes in process `syz-executor.7'. [ 3136.781867] 9pnet: p9_fd_create_unix (17463): problem connecting socket: ./file0: -111 18:34:09 executing program 7: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = getpgrp(0x0) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000140)=r1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0xc0000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @empty}, 0x1c) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r3 = dup(r2) ioctl$RTC_PLL_GET(0xffffffffffffffff, 0x80207011, &(0x7f00000004c0)) getdents64(r3, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r3, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000100)={0xa, 0x4e23, 0x0, @empty, 0x7ffc}, 0x1c) sendmsg$inet6(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000180)="583689e90016f174a8c619ab34151d5fd7ce5dde0d7b5f8ff72d0302988df87f35c451e79e10d41bf44b1e370324bf8b3379ab9661", 0x35}], 0x1}, 0x30044011) syz_open_dev$vcsn(&(0x7f0000000440), 0x5, 0x5e000) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000700)=ANY=[@ANYBLOB="d2a9c28639a703e66f19f98fe65b7df1c6f18a583dd2c955f9bada0221d6c0dc9887b9be468e0e537e1166101d69f6411dfe35c553", @ANYRES32=0xffffffffffffffff, @ANYBLOB="120000140000000060952e2f66696c6530001beceae2801d362942c3b9857657c5ec3af5def4f925af8fe523ba120e7838f0a72f4373dca0d8c229d074f636dbcad3c253b29156901aba73d5d684ff4046091fc50616e3f6cbd120ec9385906045f584a80843b1627bf7db3f4cf596b2ae2f00a6975b699bb2a149d18b7d1eb2e0f2aeaf558467664701b77fd593ccec27198d0f9fe09d9f055b2fc955a1ded0066db5936abb95bd6a2eb4aa7e84d54444"]) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f0000000800)=ANY=[@ANYBLOB="01b7afa2ad00d2000400a500f27f9e46e9add6fec905ac8c4430d42a932be0152853fcf95054dd61", @ANYRES32=r4, @ANYBLOB="0600000100000cfc5895027314028d1fe83e9a8bc4fe02000000000000c73000e051e85b992b18f42f2182b8883570eee431afc27d2c8e4de0c88cdf91d8f2e5505cc87576395610e874c47a49cf6639ad13745d36e25a1a4d4b4dc7c60d0abcef0f721bc0a6474a837bdf32beb9497bd5e63525e6a9391f98ea25f28f8d4fb4a36fb49c1777ca175b80453d9c8cf41b76da088fb58a4a94f98e128913b66cb153e7b02944d9e360efa3c4d3ca6a4251a3488c9e49434a235bde529bd87faf19b3e24c3fbde7dc"]) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000280)={@remote, @broadcast, 0x0}, &(0x7f0000000300)=0xc) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000003c0)={'sit0\x00', &(0x7f0000000340)={'ip6tnl0\x00', r5, 0x6, 0x5, 0x9, 0x5d, 0x46, @mcast1, @local, 0x40, 0x8000, 0x5, 0x7fff}}) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000400), 0x121440, 0x0) connect$inet6(r6, &(0x7f0000000200)={0xa, 0x4e22, 0x7fffffff, @dev={0xfe, 0x80, '\x00', 0x1a}, 0x5292d922}, 0x1c) [ 3136.886693] 9pnet: p9_fd_create_unix (17486): problem connecting socket: ./file0: -111 [ 3136.952579] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3136.955621] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:34:09 executing program 2: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x200000, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) socket$inet6_udplite(0xa, 0x2, 0x88) r3 = openat(0xffffffffffffffff, 0x0, 0x0, 0x22) signalfd4(r3, &(0x7f0000000500)={[0x6]}, 0x8, 0x800) openat(0xffffffffffffffff, &(0x7f0000000540)='./file0\x00', 0x214800, 0x120) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x40802, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f00000005c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r4, &(0x7f0000000240)="01", 0x1) fstat(0xffffffffffffffff, &(0x7f0000000480)) lsetxattr$security_capability(&(0x7f0000000180)='./file0\x00', &(0x7f0000000140), &(0x7f00000000c0)=@v1={0x1000000, [{0x4007c, 0x3}]}, 0xc, 0x1) socket$inet6_tcp(0xa, 0x1, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x10) sendfile(r0, r1, 0x0, 0x20d315) 18:34:09 executing program 7: socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, 0xffffffffffffffff, 0x8000000) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xe, 0x4000010, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r0, 0x0, 0x0, 0x80000001) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TIOCVHANGUP(r1, 0x5437, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x200) vmsplice(r2, &(0x7f0000001580)=[{&(0x7f00000002c0)="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", 0xfa}, {&(0x7f0000000080)="94d4335ceb3f19625dbab0ce7ef2b1bc6deacc7f814b85fbbc3104bf807b37d6adb172b7aef3a25a163562e39430b42e7c52f4bead29291d1685d6b5ddd147f25b6999e344424cdf9325099ee6dd21b4efb224a8f801e512c57edf32dc9316", 0x5f}, {&(0x7f00000003c0)="c1fda4818a6486dbf81bc6f4260b7f7400fabbea4614a9c7434c90d28dc67d45d14e26a6c3ea75bb95701d0828359a39be0c970dd9570d16cdd621f3ec0696dad4a28e0367ba903e4ef220ceeb36005c49699c272630d6ed817bf197b70a7793667f9de031bc57f49450c59a9c02862609495f48db8f4a96344f6a813f41ba0e1ca0070536a39dda89db90c855a13f19d0be92570dcca44f2a177baa01fdbab9b554260dcaa08d159abbd9d8f8a5bb27749bc94e4aca70133ead96fa91ffb05c44", 0xc1}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f0000001e00)="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", 0x1000}, {&(0x7f0000000180)="a11da42c70c5702060384e34c1b465297e2444657d2b22a841d488c1a55d613cdd0906bc21f595abbc5c5a5b5fa044c39f4a5b1a92330e6b4bc43ec4330bcce5c829a2f781e7e5f5af721333cc1cdcccf4", 0x51}, {&(0x7f00000014c0)="05822ba4319e65ea7c9cfb77faf77a6ff223bdd56799a13a5541c1fc6579ba06ff1d11b65624e5cd4b78b8e660a9327f8728afbdcb4615391202ce23b5c100139131e3b4b8e1137adaf62d7a99b8e3c382318c53eef2db4ac6b1cbc30f83e878e0bc7722980d345620b002990ded84342e09e195ee21f2d9c6f1ed50f929ee174f9d34f7ad3df0c53e4b754dafa12008c03d5d0b0d4cbc", 0x97}], 0x7, 0x2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) 18:34:09 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000780)={0x2, 0x100, 0x4}) symlink(&(0x7f0000000640)='./file0/file0\x00', &(0x7f0000000a80)='./file1\x00') r3 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x103942, 0x40) mount$bind(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000a00)='./file0/file0\x00', &(0x7f0000000a40), 0x2080000, 0x0) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) statx(r0, &(0x7f0000000180)='./file0/file0\x00', 0x2000, 0x10, &(0x7f0000000680)) r5 = openat$cgroup_ro(r2, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r5, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r4, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r6, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x86) 18:34:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf9", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa23) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:34:09 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_bp={0x0, 0x2}, 0xf492, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0xdffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(r2, 0x890b, &(0x7f0000000280)={@private1={0xfc, 0x1, '\x00', 0x1}, @mcast2, @mcast1, 0x2, 0x5, 0x0, 0x400, 0x8, 0x2000040, r1}) setsockopt$inet6_tcp_int(r2, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) r3 = dup2(r0, r2) accept4$inet6(r3, &(0x7f0000000340)={0xa, 0x0, 0x0, @remote}, 0x0, 0x800) openat(r3, &(0x7f0000000000)='./file0\x00', 0xc0, 0x50) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x644e2, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, r4, 0x10000000) socket$inet6_tcp(0xa, 0x1, 0x0) pkey_mprotect(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x7000002, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_alloc(0x0, 0x0) 18:34:09 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa16) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) [ 3137.224709] 9pnet: p9_fd_create_unix (17503): problem connecting socket: ./file0: -111 [ 3137.239673] audit: type=1400 audit(1682966049.960:27): avc: denied { execmod } for pid=17500 comm="syz-executor.6" path="/syzkaller-testdir927990494/syzkaller.e9MCKk/464/file0" dev="sda" ino=16022 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:unlabeled_t:s0 tclass=file permissive=1 [ 3137.279004] 9pnet: p9_fd_create_unix (17503): problem connecting socket: ./file0: -111 [ 3137.283213] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 3137.299054] ext4 filesystem being mounted at /syzkaller-testdir251793573/syzkaller.0LoT9k/458/file0 supports timestamps until 2038 (0x7fffffff) 18:34:26 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000040)={&(0x7f0000002e00)=@updsa={0x1414, 0x1a, 0x1, 0x70bd29, 0x25dfdbfe, {{@in6=@ipv4={'\x00', '\xff\xff', @local}, @in=@multicast1, 0x4e20, 0x5, 0x4e21, 0x0, 0x2, 0x80, 0x0, 0x1e3}, {@in=@remote, 0x4d2, 0x3c}, @in=@loopback, {0x7, 0x5, 0x4, 0x7, 0x1, 0xffffffff, 0xf7, 0x3}, {0x7, 0x9, 0x1, 0x8}, {0x5, 0x9, 0x3f}, 0x70bd26, 0x0, 0xa, 0x3, 0x86}, [@encap={0x1c, 0x4, {0x0, 0x4e21, 0x4e20, @in=@rand_addr=0x64010100}}, @tmpl={0x104, 0x5, [{{@in6=@dev={0xfe, 0x80, '\x00', 0x29}, 0x4d4, 0x2b}, 0xa, @in6=@rand_addr=' \x01\x00', 0x3500, 0x0, 0x0, 0x8, 0x401, 0x5}, {{@in6=@remote, 0x4d3, 0x6c}, 0x2, @in=@remote, 0x3500, 0x1, 0x0, 0x9, 0x0, 0xfffffe00, 0x7}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d5, 0x3c}, 0x2, @in6=@rand_addr=' \x01\x00', 0x3502, 0x0, 0x0, 0x4, 0x0, 0x9, 0x1000}, {{@in6=@mcast1, 0x4d3, 0x3c}, 0xa, @in=@multicast2, 0x3504, 0x0, 0x3, 0x9, 0x3, 0xffffffff, 0x3ff}]}, @migrate={0x1cc, 0x11, [{@in6=@mcast2, @in=@empty, @in=@multicast2, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3c, 0x2, 0x0, 0x3505, 0xa, 0xa}, {@in6=@private0, @in6=@loopback, @in=@loopback, @in=@dev={0xac, 0x14, 0x14, 0x2b}, 0x6c, 0x0, 0x0, 0x34ff, 0x2, 0xa}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, @in=@rand_addr=0x64010102, 0x2b, 0x0, 0x0, 0x3506, 0xa, 0xa}, {@in=@loopback, @in=@multicast1, @in=@multicast2, @in6=@empty, 0x33, 0x1, 0x0, 0x3506, 0xa, 0x2}, {@in=@local, @in6=@local, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x6c, 0x2, 0x0, 0x3506, 0xa, 0xa}, {@in6=@mcast2, @in=@private=0xa010101, @in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@local, 0x2b, 0x0, 0x0, 0x3502, 0xa, 0xa}]}, @replay_esn_val={0x20, 0x17, {0x1, 0x70bd2a, 0x70bd28, 0x70bd27, 0x70bd2c, 0x4cb5, [0x5]}}, @offload={0xc, 0x1c, {0x0, 0x21af88385c22b7f9}}, @sec_ctx={0x100c, 0x8, {0x1008, 0x8, 0x0, 0x3, 0x1000, "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"}}]}, 0x1414}, 0x1, 0x0, 0x0, 0x8000}, 0x5) sendmsg$nl_xfrm(r0, &(0x7f00000019c0)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000c40)=@updsa={0x164, 0x10, 0x1, 0x0, 0x0, {{@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in=@remote, 0x0, 0x32}, @in6=@private0, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_crypt={0x58, 0x2, {{'cbc(aes)\x00'}, 0x80, "0f24aa6b13c2e62f3556b1cbcfeac2a0"}}, @encap={0x1c, 0x4, {0x0, 0x0, 0x0, @in=@multicast1}}]}, 0x164}}, 0x0) 18:34:26 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7ffffff9) 18:34:26 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) fsetxattr$trusted_overlay_upper(r1, &(0x7f0000000140), &(0x7f0000000340)={0x0, 0xfb, 0xf2, 0x3, 0xb4, "b08a554027437c86d57ca16957da1356", "ee9f48524cc48c109c68da29af02a802ee4c50c10ae6c8de4b97539ccf82791e5a300618055f728c8a3af76300dbc11a55abf730fc40aa25bac4b3d7f2c9513962efb5dd6365a2cd93b00f3d9972670e002e8584a2d7b4f0103b2d0cff044dcbce0a6932ce803ec27eeffe63b699fa39941d85d07ecd621d89c3726cafd83fefb4393b97486e3dd4b4184b779b48c00c416df67609098894b54854605454bb5c59f154e5f86da044bc72ee0a01e07ee160b8b45ebe3d020acd164884cd52897e77270cdfccd8528eb9752a7bf67843b307224dab16469fdfbc17a2269f"}, 0xf2, 0x2) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:34:26 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000003c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r1, &(0x7f0000000240)="01", 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(r0, &(0x7f00000000c0)='./file1\x00', 0x4c0000, 0x17d) r3 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x0, 0x0) copy_file_range(r3, 0x0, r2, &(0x7f0000000280)=0xfffffffffffffffb, 0xc3a, 0x0) 18:34:26 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) sendmsg$802154_raw(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3d8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x1000, 0x1002, 0x3}, 0x0, 0x4, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000001300), 0x0, &(0x7f00000002c0)=ANY=[@ANYRES32=r0, @ANYBLOB="de3c2bd914dfdae31025734499fbc3e7ee3be9f9fa8f05ad23a682feb1fd0fc8d5c419cffa739cee33e1f02d757dc6676ac51cd058230d595ed26a8927293d62837b9e8ddb15c1c1242faa09facdb03ec46f07bae81138cb84acc173ccf47983c02ff5b24881dd1098509c5b819d01bea08d807814357d5786bdb16fd0ae974ab79256150a2a0619c5ac6a58c0b1146059b6a69f4a3d8fbef4e6ad2b65158d81e1f6042b6058eba380e34fbb4ab66e6e32e292fec2b65a0f2026796295158666fc5c4a15c0fafe17c327905363a3fb9a483309b37949e7a57b0818718e3f87b24b7762df3117aecb35bec0c2b27857d5465f4082caf31d75b255e0291d81eef5cec39e008e24ae7a2c6a49fa4117f8a95eca719f9812bc8bcc3652eac5521dc4ef5a477024fde221f176f1583c05b288086cd1de25b5bf5d8bc92c4b02b2facd54c74feb4f4db4b17734456ecb326105eba096a1246efc08405d8b8a079a355a42ecff5259849024991bbf7ddb4b85b48a3df9daff048a1c40575856fd576bf5c39a239eb83181a226033262eea4f3d9613f933a925a40c9c16cbfac23e0fd2930a6bf9bf5dce161903e1d9ee086ce2b6b4ea79fbe777916da9927e320b7b21a6f7ad17062a3a400bee5b0f1cfaef75523d8d2c34f7e0f22977423d3532796cb6b0fb8f3892e3c5d433290bd8a2a727a388d78bd3a47f6ca3c1c0f08f77df92c35264a4e1899098ecff7fc2a2d415136452c9a2078800db8af68405feba60b4d4874777721c8757543ac7b8d11c96bac8efd849288706f2c7773864694b88c4afb8a13b8fd4d2844ce25f2b3b0d326f7fd86fe1d27550a043ce878259540424042167aab80ff510c2eb3a22486ca8124952ce6fae25e32b3cb1c1a707bea145b79a40cf34e9bf3bdfd3085ced4c4bfd6bbe06a7cc2c58ae075918c598c2b067655ffcc6f4f531b65f96c75b97ad41ec2993761a7ac2ea8650d51b2ea9359098e5a6001f0209b88126676f4a981217553a7eff3e6a6e0fb2abd7054819f67f8aee779eddced5697d4ce02cce3856887f08111ae033118ed3043f05ef6d218ac53713cb8d91526ea76ad8bd85abf65eb2c0ec7250c0573a92ab448599140b3a74e9390425a1a7698d1df40bca403e64053815127f1c0096df17d5b1e09cc997bb624f1ddb5aa373ba4eb383539bfec8dd3aa3b0cdeab1bc3db9aae4f10359ec9f5ba9b868c41d5d0376f86e3b93c8de9a00ab3b513be3c8a1e43809e6777a48e707fdc9d0af7c57f242abc7556762e731cc74b8232a80df97e87297c8881ce92139e0acbb9c976760214baff578bee31f217eca0f1dd4c5c5bc285f67d53b02e61ae998aba2c3c534181cdcf8d35190e94cb533a00f5abb8c969bfcdf200ec1739edcb8dab172783212defd34325934159ed7bb480362e1f58408daef0c38292b89740aca4e0127a7d6f618f3f7ca04317a218dc77508e3dc410d56ff812727f5aa7e03887afaa73680f6539293f3708ca27655391d929982f4602140fcb9ab1ab623a45b11ffd67b1230e18a9343e13b4449cae18fca00277c0fa412db7b818c3f9f48a2577b4a992d296d97c5186d50e2154bbfe0d4f8e7fa0afe6ce5f47da3214822bd7db34b1cdcabe0daf31e2511d6e036e267b66f2f798b1030a0e03796fa6db037f80d152c7a47add2c5ba7c68f999c27f30fd47bb3ea8de09498ce2e7408919820f12f598a0f64aa7d48d4d4c38e94936d195ef01e5e9b3e4b7849748838d846899ce869b6f9ef8ea1b6bfc3d21957474f70a208f8b3ba49606f2c099758baea04d4529319c4b64628c5e2442beff9e859d2887888cf214b2399862f9d77a409fd12d9a0a33b057ef01a87c5274a9ac6de68abd431d864e7d99137e5f044154241e870fd663113e69977538b33bd113d76c90d2daba18204ebc1e09184f0fd75c33fe717af0399550092a2e4268b1e00909820df5eda2c271930f9d5689e63afd574a5216ec05c54e9b4a09a5b843c73ece149252f29e9c8d948ad99750e4bb8185eb60bdd30ceebc2f69cd623abb3b9af9a43aced76f38a12cb249d802a202869c8df0bea39cd471c21826e3928bea5565c7c4d9c0badcc2121d644549f2b9f8a3299831bdbd3f2b479ec653cd4ba0bef979567f1e076770f7048d361dde51010c6e7a41db3b212d54ea11e2183f9abc85030ad569ebb3399d9f344f3c47ab4159625caf9559eae813ca81afbf1b2a4fea8cba20a6308f77edd31c0b2f2d846dd06ebcd0221aca70c6cd291d26bf995786f07c93ef3e004aa1c090b22746ab61d89448a9c0c31c1808c04f7349dcc74c6527cac27847291677212fc8c06c3a6b03a0c88eec41456675139c4fccef2f588ff0cd46770d56c1f83664cfd95caed92e949fa493d4292fc185c61de11bc63b5b9602eccd871fba27b0e5fd01835d9316444d57f835070dc98a033bed5e61e35b8575eac9a1f9ca664fcb483bb5396808b0e4a185b195dfe0472f4b3570e521af124911bcddfde00b7f35b0c17d83a8bc0e95d0b6bbda2d2b736d76dfd04d81fe4419a8faa9346aaa37c1527b31b199cf8a9bbbdba48397b6eadb7d38857e7cd738644289593ea26cbb13052d3383b41e712819cf9f1aaad3ea004da093927b77f0ee480bc6a0c17397669ea8c56fd69ca03208ef53a09c98d6135fb1c5dc389a602cc59be58545b06bba26fd8a6c987a0f320e72d0362abef373a4726cca20e5c0f3d6153abeee79f362908121033ddf9fd73067b576ee3730e99090fd340b79f16f49bcb422e53dca9e151db8780a29cd01031652e728d446035eaef19c6715243a2afacab6aa0d56e09d22285bc93dbd9c51f08ee095047ff5739bf2e3f78c9b03e730223f3a5ab9ee702ff1027b0d1fc02c1e9b8a1d49c8e1707c0d187d5ce6cd6d4fef6cf6df754b7028d266da1fef02cd45cf1af682c12b53de6587276184646c66a87695a52b30157ff27e21967f7a21ffc8748641331ed050cdf27d2d74e03611270001bf51101e1bf1949ee9e232b9732ce405bb85798ede3381f4d9a7859bf4a29d4e2bdd254fa76d0725aaf70fc21f86cd9900321b793217ca5725243fe83f0248240ddb0ea2c1f6daaa8fa29115e0efab85bba30099501a889a3e5c33b66e67f028aed7f310e73c5f1cafb2ab300cd8dc2bb57d3dd7f1e4f4ed31f48f895a4f696e5a041ec3bae95ca007dda3266c40212bbda996bd7c4180dbba0af4036f4740e8db793fced03acc128c1c4fa7cb6941f0b020c7cf9bf63c5e010ffc9da32e45b1de2fc5e2f3d9902eb19a3eb5a246ed3680e2b138de9ac5c26f85d9cc7f4f8981464e19571917cd8fe84635ea1dfc7856ecd466659665142d43ef8126ffeda8800576e3e05dd476ae7bc35596f1eb543b852cd7effe698392e3039b2d62a7979e4d8cd7e4b09fcd517f75535130783a5429075a5dc525d9ee6e1f39991b5e293a54133738acb5dbe8c84d4dff7749ad1c0e0e18af36646242ab7dfa9cec91b11f1d2241a96ecff1254a6065131a1f04890eb237b4d6b374e97ccc784725921e8c976f942b526e8d7eec63f2f259807a2851dda88130850a4260fbb3c8512b2eab2f204a27de7f8f607b813b6bb8e6358829c519c0bc14464613fb55fc5bee4e7fbb4e45e58813f0661b120312e08a472a07d17e64d49030b542fbb5397058e0fa8d617fd3612a53f37ffbe7da5b5fd49df13bc1b549fd0f5a2aec3d760c4d36d300cb44965698d0113d140b9fc27a0ae248e6e75fed6651c385492095865ee233b0c09d00c255439371e5d0e0fc7dae1a6f68e0b64a37c72ee5d3e1b9f9a71def7f592cca504347705dd83129518fe47a6d62f398069f32f95da8835f26875b5c7d2e1c34a0db035c34ee277db9c0a76ca486a12fdcf0b4dacccffc59c5a75d20662401df11edd92fd07c8e97ddf33b2ebea2d8d6432cb5b2932c4c21f491a4780360707a780b3f99f4f21194b80ca0da5e3fc99a425709bdccaf47a9d3b90ee4601cd5f10d1b20f5f8bf3b62d5380a03fcf92637da7cf1325a9a9b6d6259e8a13e1695394e31304882f6122179a184ae94241eec24e2060e0e740f4711ac48a007210a91e0160f9b666a83f8df5e3de6f3d89ae08c82e6e12139a1bece182bd9120ed9eb298d95135dc3fed2dc7385631672097b9b8817a3295ba24020860ee45878cff9ce17c7af751bcdffb671fdfab3e5ceb33f64609b6fdf0f2116fa0fe9e15143416c7d4daeccb34f754a8ac2e079551e0a9e246de66fd01b9a15416ee4e97c7b51bfaa42245020212cd1fffb7637b081d6f4ebdc473f0a15a9f6072d8f41f5eb858c1f157e0fd11bc37ba1bda2762c0fa6deea4ddb07ef8efe36692bbdfcafd9386a337c541e31c251b8d8321d96a7c1bcb481f49dc270f650f4e3c4a1739124889667ebeda64d9cf4eddc724a7ed6a7c5ce5873913446ce634ca85ca3cede4bfd6ba452718f39dfc82d5734626510f1c6a6365c2396cc66efd72dcdf93539be12f48ce901f3345c8249153223aa9073ae7b6a32d80f130d7f2bcd7e12c486456a95ef8b879f01260daff523f0202a3e19f6dd61f29ba281ca4ced450ec6088c255c1f85adaf7b7ec1ab11ec58d0c8b130a7ce30c2f7ed48d5d42cbe83a11655d06fe1c7efcc30b11817c36bce5dda32c59986c937f831ea2ad3efdf6adf548ae21a4c5c2a1f60336739da719af2359de224bf1873269330425ad6fe3ad09250b071d24682c93f5d48ceedd5c044adcfb6291f1e49140a9b87f90608a841a876d3aa9da1d51a5108d454200283544c6767b54c2a8f09f27f9196824485aaef512fd0fdf2789345eb766fed82aad388789e4475621f10c6d3b3713c3b948f4b120ed1d72c54d2d23f3c27e121cae25b71989fe5bf439c9e91beec21b6604a4fc9c1efaba2c5de11347710b06c0236e3727a5c9bed89fb9e5847a9e8a53b212abc2e3ff678d85d2f9b61188ad448d750e908b832f0b6e7512a3cd9d6fb0e67aab3eabe3cd19e96f6b02559698fd4f5ba81f1587784f13b7e70d19e16b7b4472dc3f0dd51264e43b631909cd1ea9350ae17ba468ae7cc091e914a6139b452fc3586fa6f726dd52676087add1db7779feeacfee4efc8a652d4c9729a2dc2bf3cbfff8f507b436e6945376d77e48c3058d37f7bcf76d4d0ef2ffafedb81bf54893fd1f386caca2a6025b5fb335434caa1ba96201a1ed90a58224411df9bab8f4abcc0d2d1c0c98040d3289c8bb349d23c40f7c680c664eec5d933242fec82955c06e408008bd3659129837f8b6e7c2546f215982a634ce70c9c84812f6d543ae082d0de2eaf0d7cc3db66759ede5b1a5c22f162548c2a0fa4c40f628ee67409829573ed95a144e3eb33e363421c0a959edb592f44f114d0a19465ebf2c78c546b3b1517d0e40f1402617c20d6c216e7de7537bade4f53b1e0d5808e8de1d0b09bdcc363c9dc28973787e04c6c5d92852bad762ec8a04555c26f5beca79b91688df5bf0cd0bccf84d703ece145f5fc20997f75890629a33b9043601b5d575f6b84d3b589c82ba0e441129724d94d1ca18a172206b29f3df0bda07800c2218f155cf27b180260a19239b56b02ffa55be02d1a72e9f1e009dd9adc5b11a2945b8b7ab324a25432ab7f3fcead8754326fd6e1c37e99542b0add5800cb1a01dfe41704a821e6961cdbd03ce802f47ea21837c36921254380ce2e43a78ed7b1ca72da556e21c34970d0fcd1d4003753b0b16664f42e03d354e4d1828cf2cf94f88c44e568ad38d"]) 18:34:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:34:26 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa16) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:34:26 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x7bf3, 0x0, 0x0, 0x904420, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000a00)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r3, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r6 = dup(r5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x20000007, 0x608, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffbff, 0x0, @perf_bp={&(0x7f0000000140)}, 0x44, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2000, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, r6, 0x0) r7 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r7, &(0x7f0000000200)='./file0\x00', 0x86) [ 3153.473812] 9pnet: p9_fd_create_unix (17533): problem connecting socket: ./file0: -111 [ 3153.523058] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3153.528163] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 3153.536074] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' 18:34:26 executing program 2: timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x1, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x691b}, 0x0, 0x0, 0x0, 0x7, 0x1, 0x2, 0x6}, 0x0, 0x7fffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) r1 = getpgrp(0x0) r2 = getpgrp(0x0) kcmp(r1, r2, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) openat$vcsu(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) readv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/183, 0xb7}, {&(0x7f0000000400)=""/253, 0xfd}], 0x2) sendto(0xffffffffffffffff, &(0x7f0000000040)="6e23a27f696609a59ab7077b258f8522806cc6359a325a1fdd16fecc26726fa5", 0x20, 0x0, &(0x7f00000001c0)=@l2tp6={0xa, 0x0, 0x3, @private2, 0x3, 0x1}, 0x80) unshare(0x48020200) [ 3153.564219] 9pnet: p9_fd_create_unix (17551): problem connecting socket: ./file0: -111 18:34:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3153.586865] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:34:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:34:26 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000500)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x2960422, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161d3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb471864c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140740d4f21d717a9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd00000000"]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) openat$vcs(0xffffffffffffff9c, &(0x7f0000000280), 0x40000, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000a00)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0/file0\x00'}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) r3 = openat$cgroup_ro(r2, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r3, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x38033, &(0x7f0000000c80)=ANY=[@ANYBLOB="7472616e733d756e6978196163636573733d757365722c64656275675913ecab77b73d3078303000003030303030303030362c64666c74756976a7e418d655a2c63bbb687c89f0ddf954054dac4ec84df5dd662bdcf9e9a0cdc2aef99e0eb14fa47de358000000000000000007b5efba6ea8", @ANYRES32=0x0, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c690400742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d850952ad3cba6fde3623e4779860ca72b5a954e951556ec587cd2daa4cfa50ef7e790ee0be4c7d446b86d71dfe3f00"/153, @ANYRESDEC=0x0, @ANYRESOCT]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) [ 3153.714576] cgroup2: Unknown parameter 'trans' [ 3153.722752] cgroup2: Unknown parameter 'trans' 18:34:26 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa1d) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:34:26 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:34:26 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c7072ccbd46c7a45b929bdcbf6976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) mount$9p_unix(&(0x7f0000000a00)='./file1\x00', &(0x7f0000000a40)='./file0/file0\x00', &(0x7f0000000a80), 0x204002, &(0x7f0000000ac0)={'trans=unix,', {[{@cache_mmap}, {@debug={'debug', 0x3d, 0xeb}}, {@aname={'aname', 0x3d, 'cgroup2\x00'}}, {@access_client}, {@access_user}, {@posixacl}, {@aname={'aname', 0x3d, '9p\x00'}}, {@posixacl}, {@mmap}, {@version_L}], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@obj_role={'obj_role', 0x3d, '9p\x00'}}]}}) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f00000002c0)={0x8001, 0x81, 0x80000000, 0x5a, 0x40}) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 3153.830885] 9pnet: p9_fd_create_unix (17575): problem connecting socket: ./file0: -111 18:34:26 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="23bbcebca9669321052e2feac74b15bccb0d3bbce51be22537b9021c0e2e6010634cc04daa7e759d1fd0fda20501b812b256ed0de31eef97aee0991879613f8780e9a8661ce65ad4b75264982e03f0263a8fd342307516afd9ce2ec433a24c70348a5564bbfca97bb01f793c683e853bf11d17fdceeda9c4257a6fa2ba3098e30677d206799cbd1fc76a15134266501ee9f69c821760ede87d7b2eca059008b38212ec3c119a890a578aa3aac2f9479d20877a97396267a8fd52a04b46838da95db3"], 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) [ 3153.882538] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 3153.899319] 9pnet: p9_fd_create_unix (17586): problem connecting socket: ./file0: -111 [ 3153.904116] 9pnet: p9_fd_create_unix (17586): problem connecting socket: ./file1: -111 [ 3153.944116] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3157.368322] Bluetooth: hci4: command 0x0406 tx timeout 18:34:40 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000011c0)={0x28, 0x10, 0x1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0xc, 0x0, 0x0, 0x1, [@typed={0x8, 0xd, 0x0, 0x0, @ipv4=@dev}]}]}, 0x28}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000280)=ANY=[@ANYBLOB="20000000120011cd00000000000000008000e9"], 0x20}}, 0x0) sendmsg$GTP_CMD_DELPDP(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, 0x0, 0x400, 0x70bd2b, 0x25dfdbff}, 0x14}}, 0x20004004) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, 0x0, 0x0) unshare(0x48020200) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) write$binfmt_elf64(r4, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x81, 0x1, 0x2, 0x2, 0x3, 0x3, 0x3, 0x1af, 0x40, 0x59, 0x3, 0xa5c, 0x38, 0x1, 0x0, 0xffff, 0x534}, [{0x5, 0x2, 0x2, 0x7, 0x0, 0x7d5, 0xffffffff, 0xffffffffffffffc0}, {0x4, 0x401, 0x1, 0x0, 0x80000000, 0x7d4698e7, 0x401, 0xfffffffffffffe00}], "b6dcf71d7237d548f3a00e8a49706ea5ed2b2e72a1a8d9065e7905e118f7719c84932ceed1fc2b6ea1e557d104b9b1bf8dba033fe47f6389ec3764bbe2f55dfb13bf2617d86c917a616517a4e36a", ['\x00']}, 0x1fe) sendmsg$NL80211_CMD_STOP_AP(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x20, 0x0, 0x108, 0x70bd2c, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x4, 0x78}}}}, ["", "", "", "", "", ""]}, 0x20}}, 0x8000) 18:34:40 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000400)={0x0, r2, 0x6, 0x7fffffff, 0x6225, 0xffffffffffffff27}) write$binfmt_script(r2, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r5 = dup2(r4, r3) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) mount(&(0x7f0000000140)=@loop={'/dev/loop', 0x0}, &(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='fuseblk\x00', 0x1000, &(0x7f00000003c0)='#! ') sendfile(r6, r5, 0x0, 0x7ffffff9) 18:34:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa1d) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:34:40 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:34:40 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r5 = openat$cgroup_ro(r2, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r5, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r4, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB="2c726f6f74636f6e746578743d726f6f742c01"]) dup(0xffffffffffffffff) dup3(r0, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r6, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r7, &(0x7f0000000200)='./file0\x00', 0x86) 18:34:40 executing program 7: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, 0x0}, 0x0) ioctl$RTC_SET_TIME(r4, 0x4024700a, &(0x7f0000000300)={0x35, 0x37, 0x8, 0x8, 0x2, 0xaa, 0x1, 0x21, 0xffffffffffffffff}) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f0000000180)={{{@in=@multicast2, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f00000000c0)=0xe8) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000100)={@private0={0xfc, 0x0, '\x00', 0xfd}, 0x1, r5}) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00'}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'wlan1\x00'}) openat$cgroup_int(r1, 0x0, 0x2, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x0, 0x0, 0x1002}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8914, &(0x7f0000000140)={'lo\x00'}) 18:34:40 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x401, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x800, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:34:40 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f00000000c0)={0xa, &(0x7f0000000080)=[{0x7, 0x3}, {0x595, 0x6}, {0x7, 0x7f}, {0x5, 0x80}, {0x3, 0xd6}, {0x100, 0x9}, {0x7, 0x7}, {0x8000, 0x1}, {0x6, 0x6}, {0x400, 0x8}]}) r1 = dup2(r0, 0xffffffffffffffff) write(r0, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4", 0x14) flistxattr(r1, &(0x7f0000000100)=""/234, 0xea) unshare(0x48020200) [ 3167.728135] 9pnet: p9_fd_create_unix (17610): problem connecting socket: ./file0: -111 [ 3167.737559] mac80211_hwsim hwsim12 wlan1: refused to change device tx_queue_len [ 3167.745026] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17614 comm=syz-executor.6 [ 3167.770148] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 3167.778072] 9pnet: p9_fd_create_unix (17621): problem connecting socket: ./file0: -111 [ 3167.841557] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3167.841776] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:34:40 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = creat(&(0x7f0000000040)='./file1\x00', 0x0) pwrite64(r0, 0x0, 0x0, 0x0) r1 = timerfd_create(0x1, 0x100800) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x8001}}, './file1\x00'}) 18:34:40 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:34:40 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) r4 = socket(0x23, 0x1, 0x0) openat(r3, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000a40)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c70726976706f72742c6c6fab73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65943ddb7dadae1953b5284cc348e77f60fdf3453eb7f32d7408ae5061c8999caed0720729bb1cdd9dff5e36a2c9c9abe2773aca9b2fc4ca1e45b655f5aee83115342377dcbe000000129444c626bebcce31375c47d5aaafb1660ac717de85731a7c1a116c2e2c1f3a584d1fac2a096cde7b2235c77584b4b356826561287c028960ccc5917821dbc03be8fb5c93e8b354ec33fc792f1940ee8f6fe944542a787458e20fdb6f3637cd33873eb07af1a88aae8b5c24f9f6311276e0803012dea42e106c921e86a51cd3a643cd026aa2d60a76b71d2181e68eaf7bfb62da345753f9b7bc8e2342093a73d4f651f97ccf4f6f9e3948340f5136ab25439c108ecb39f540e8d7a29a28594c40f6d93172cd56b37f14e4c87c4352acf4d106ad8f9c8123c5a9821b743f7d03db5d9e9fceccbe41b8f524f6de501598", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) ioctl$sock_SIOCGIFBR(r4, 0x8940, &(0x7f0000000a00)=@add_del={0x2, &(0x7f00000002c0)='veth0_to_hsr\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:34:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa1d) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) [ 3168.153088] 9pnet: p9_fd_create_unix (17642): problem connecting socket: ./file0: -111 [ 3168.189162] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 3168.203124] 9pnet: p9_fd_create_unix (17642): problem connecting socket: ./file0: -111 [ 3168.214894] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=17630 comm=syz-executor.6 [ 3168.317853] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:34:53 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="e0ffffff000000e11441a81a29f127fae1a0000000002555e3a1f4"], 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:34:53 executing program 7: recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_CLEAR_ES_CACHE(0xffffffffffffffff, 0x6628) ptrace(0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x284000, 0xc1) getsockopt$EBT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x15, 0x0, 0x0) r1 = inotify_init() preadv2(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)=""/103, 0x67}, {&(0x7f0000000040)=""/17, 0x11}, {&(0x7f00000001c0)=""/95, 0x5f}], 0x3, 0x3, 0x81, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8aa3}, 0xca0cc, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$802154_dgram(r0, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r0, &(0x7f0000000180)={0x24, @short}, 0x14) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x0, 0x0}}], 0x324, 0x0) 18:34:53 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x19) r1 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000240)) r2 = dup(0xffffffffffffffff) getdents64(r2, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r2, 0x0, 0x0) dup3(r0, r2, 0x80000) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r6 = dup2(r5, r4) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r7, r6, 0x0, 0x7ffffff9) 18:34:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:34:53 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa21) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:34:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa1d) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:34:53 executing program 2: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000280)}, 0x14711, 0x1000000000000002, 0x0, 0x0, 0x2020000000000002, 0xfff, 0x9d7e, 0x0, 0x0, 0x0, 0x269}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4", 0x14) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)=ANY=[@ANYBLOB="147300008000fbc0ce7db1e52ff8d98c4b000000"], 0x14}}, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000300)=ANY=[@ANYBLOB="03000000000000000a00000000000000ff010000000000000000f50000000001000000ed0000000000000000000000002c9d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000a00000000000000ff010000000000000000000000000001000000000000000000000000000000000000006aab9c848249000000000000000000"], 0x110) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000180)=ANY=[@ANYBLOB="02000000000000000000857e000000000500000000000000", @ANYRES32=r0, @ANYBLOB="000000008e00"/28, @ANYRES32, @ANYBLOB="000000000200"/28, @ANYRES32=r2, @ANYBLOB="000000000f0200"/28, @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\b\x00'/28, @ANYRES32=r0, @ANYBLOB="00000000ff1f0000000000000000000000001d000000000000000000"]) socket$inet_tcp(0x2, 0x1, 0x0) r4 = syz_open_dev$tty20(0xc, 0x4, 0x0) close_range(r1, r4, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f0000000140)) r5 = syz_open_dev$rtc(&(0x7f0000000080), 0x9, 0x101001) ioctl$F2FS_IOC_GARBAGE_COLLECT(r5, 0x4004f506, &(0x7f00000000c0)=0x1) unshare(0x48020200) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) unshare(0x300) unshare(0x10040200) 18:34:53 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=2oot,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 3180.989102] 9pnet: p9_fd_create_unix (17672): problem connecting socket: ./file0: -111 [ 3181.086690] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 3181.109001] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3181.124753] 9pnet: p9_fd_create_unix (17688): problem connecting socket: ./file0: -111 [ 3181.207183] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3181.208132] EXT4-fs (loop6): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:34:54 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:34:54 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa21) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:34:54 executing program 6: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) fcntl$F_SET_FILE_RW_HINT(r0, 0x40e, &(0x7f0000000080)) pwrite64(r0, &(0x7f0000000000)="2a13b98dfef3d9bef45d8c4ceb201156fb429efa092b02eba8a60b76261bc8c2ed6624318c661536a882f148973716ae77671b46d5012d258ee065f40406a695b87b954e3d17dc149943f806371251f8c80563958e0e10e3e84e43704082c05e65aac9f308792b4fd362598d091193c39a347958285161d977f7", 0x7a, 0x1ff) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/netlink\x00') readv(r1, 0x0, 0x0) 18:34:54 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec00850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:34:54 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000a00)='.\x00', 0x80000, 0x100) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e20, @private=0xa010102}, 0x10) mount(0x0, &(0x7f00000002c0)='./file2\x00', &(0x7f0000000000)='pipefs\x00', 0x400, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000e40)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r2, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB="2c726f6f74636f6e746578743d726f6f742c00b36768c48b31f0090367601644"]) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file2\x00', 0x115502, 0x80) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 18:34:54 executing program 6: modify_ldt$write(0x1, &(0x7f0000000040)={0x4000000, 0x1000, 0x2000, 0x0, 0x2, 0x0, 0x1, 0x1}, 0x10) open_tree(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, "77004a6efdff00"}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x20, 0x0, 0x1cf}) r1 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$TUNSETVNETLE(0xffffffffffffffff, 0x400454dc, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) [ 3181.577602] 9pnet: p9_fd_create_unix (17710): problem connecting socket: ./file0: -111 [ 3181.599078] 9pnet: p9_fd_create_unix (17713): problem connecting socket: ./file0: -111 [ 3181.600038] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3181.628534] device veth0_vlan entered promiscuous mode [ 3181.985958] device veth0_vlan entered promiscuous mode 18:35:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:35:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:35:13 executing program 6: ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f0000000000)={0x73, 0xf53, 0x8000}) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(r0, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x457e5367276854c0) r2 = dup2(r1, r0) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r4 = dup(r3) getdents64(r4, &(0x7f0000001d00)=""/4085, 0xff5) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x80000, 0x40) getdents(r4, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x0, 0x9, 0x0, 0x60, 0x0, 0x4, 0x100, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f00000000c0), 0x6}, 0x4010, 0x3, 0x7fff, 0x3, 0x5, 0x9, 0x5, 0x0, 0xffffffff, 0x0, 0x1f}, 0x0, 0x5, r4, 0x1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x1000a01}], 0x2810009, 0x0) r6 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r7 = dup(r6) getdents64(r7, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r7, 0x0, 0x0) openat(r7, &(0x7f0000000300)='./file1\x00', 0x163000, 0xc) sendfile(r5, r2, 0x0, 0x7ffffff9) 18:35:13 executing program 7: syz_usb_ep_write$ath9k_ep1(0xffffffffffffffff, 0x82, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') syz_usb_connect_ath9k(0x3, 0x0, 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000340)) mount$9p_tcp(&(0x7f00000001c0), &(0x7f0000000240)='./file2\x00', 0x0, 0x80, &(0x7f0000000640)=ANY=[@ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB]) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 18:35:13 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa21) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:35:13 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = syz_open_procfs$userns(0x0, &(0x7f0000000140)) ioctl$FITRIM(r3, 0xc0185879, &(0x7f0000000340)={0xeb48, 0x9f}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r5 = dup2(r4, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) open$dir(&(0x7f0000000380)='./file0\x00', 0x90080, 0x174) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r5, 0x0, 0x7ffffff9) 18:35:13 executing program 4: perf_event_open(0x0, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000340)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981ea55471e0436692410200db9bf979b04b8822c7ffe52455d2471d45cbbf1be29c3c6cc57285b007c1ba620c76bf23ebee77cdf0d97a63e0234eab280f724b2bb526dab33b23be86e3921f9db42679a17b90140c415a9896924aa0f05b9bd19d3af2bf87286cd7dcaa1b4dcb3fec0210c54b3b52b99cc24fc1a0dc73bd84cec5407771bbb5a9af19fb83bb0f597285d16f6c798327ef489488e9be39ba0eddb657bad668eb42c7fac4fbf9c8adc28320630cd99c2f56826d942b3f23a164d8e38256288241b7c41892b67d4c9fd7021e81618971018e5a1f776c0d9a", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:35:13 executing program 2: r0 = syz_io_uring_setup(0x4d4f, &(0x7f0000000340)={0x0, 0x7c00}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000180)=0x0) close(0xffffffffffffffff) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd_index, 0x0, 0x0, 0xfffffff8}, 0x0) r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f0000000240)=""/188, 0xbc) [ 3200.676517] 9pnet: p9_fd_create_unix (17734): problem connecting socket: ./file0: -111 [ 3200.699806] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 3200.724843] 9pnet: p9_fd_create_unix (17734): problem connecting socket: ./file0: -111 [ 3200.788899] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3200.877944] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:35:13 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a80)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000a40)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000a00)=0xd19) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r6, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r7, &(0x7f0000000200)='./file0\x00', 0x86) 18:35:13 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x10000000000}, 0x0, 0x1, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000300)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10048, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) copy_file_range(r0, &(0x7f00000000c0)=0x6, r0, &(0x7f0000000100)=0x7ff, 0x3, 0x0) syz_io_uring_complete(0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000140), 0x8, 0x40400) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x5) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="00006b0000006669aa261eb9"]) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x6, 0x1, 0x7f, 0x98, 0x0, 0x4, 0x40082, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x1, @perf_config_ext={0x8aae, 0x5}, 0x1000, 0xf91, 0x7, 0x6, 0x40, 0x6, 0x3, 0x0, 0x1, 0x0, 0x10000}, 0x0, 0x2, r2, 0x5) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x109000, 0x0) unshare(0x42000000) r3 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x121000, 0x100, 0x1}, 0x18) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f00000002c0)={0xcbf2, 0x0, 0x0, 0x7cc, 0x1ff, 0x3}) 18:35:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:35:13 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf9", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa23) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) [ 3201.031274] 9pnet: p9_fd_create_unix (17768): problem connecting socket: ./file0: -111 [ 3201.069060] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 3201.095069] 9pnet: p9_fd_create_unix (17777): problem connecting socket: ./file0: -111 18:35:13 executing program 5: r0 = syz_open_dev$rtc(&(0x7f00000002c0), 0x1, 0x131200) sendfile(0xffffffffffffffff, r0, 0x0, 0x401) syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r5 = openat$cgroup_ro(r2, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r5, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000700)=ANY=[@ANYBLOB="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", @ANYRESHEX=r4, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRES32, @ANYBLOB="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"]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r6, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f00000006c0)='./file0/file0\x00', 0x240880, 0x41) mkdirat(r7, &(0x7f0000000200)='./file0\x00', 0x86) 18:35:13 executing program 6: r0 = syz_io_uring_setup(0x5f18, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000040)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd=r0, 0x0, 0x0}, 0x4) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x300000a, 0x10, r0, 0x8000000) syz_io_uring_submit(r1, r2, &(0x7f0000000280)=@IORING_OP_FILES_UPDATE={0x14, 0xf56c760a75d5cc10, 0x0, 0x0, 0x0, &(0x7f0000000240)=[0xffffffffffffffff], 0x1}, 0x0) r4 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) dup(r4) syz_io_uring_submit(r3, r2, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd=r4, 0x0, 0x0, 0x0, {0x2301}}, 0x69) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 18:35:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3201.245028] 9pnet_virtio: no channels available for device ./file0 [ 3201.273878] cgroup2: Unknown parameter 'ÔP[u®vÃðÒ´³bNãym¨AàÊ m\«%’è?ʺ–ó?' [ 3201.304433] 9pnet_virtio: no channels available for device ./file0 18:35:14 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf9", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa23) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:35:14 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r1, &(0x7f0000005e80)={0x0, 0x0, &(0x7f0000005e40)={&(0x7f0000000040)={0x14, r2, 0x1}, 0x14}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r0, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000227bd7000fddbdf250400000014000300fe8000000000000000000000000000bb14000200fc00"/54], 0x3c}, 0x1, 0x0, 0x0, 0x4004}, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000002c0), r1) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="090600000000000000003000000005003500e7ffffff0500330000000000050036000000000008000200d15cdb22bdcf046f6969843e6410faa3944cc932d2038a112ed1c50a702e33b8dd2603cab650320e2be8492a331fd1fe73b50b10e1e37c71389203bea54343783b67d24693dd5e9c7f709df9616adad37e2968b97f71e209225ef55e2194f9acf444d13dd75d3dda1132a42a077bc4f94e4a249531547054aab925f862cd11cdbd30327a49ef548e04fe0348901fd111aa89404d3f113632e36535cbd587a4db40d2716dfbbee3b5925bd4d78d1d8abcb58d3eb8f5fcf05988e0f1c2", @ANYRES32=0x0, @ANYBLOB="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"], 0x34}}, 0x0) prctl$PR_SET_MM_MAP(0x26, 0xe, 0x0, 0x0) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000440)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x2c, r3, 0x10, 0x70bd2c, 0x25dfdbff, {}, [@IEEE802154_ATTR_HW_ADDR={0xc, 0x5, {0xaaaaaaaaaaaa0202}}, @IEEE802154_ATTR_HW_ADDR={0xc}]}, 0x2c}, 0x1, 0x0, 0x0, 0x20000010}, 0x4000) r4 = io_uring_setup(0x2b44, &(0x7f0000000640)={0x0, 0x69db, 0x20, 0x1, 0xb}) ioctl$int_out(r4, 0x4, &(0x7f00000006c0)) io_setup(0x0, 0x0) r5 = creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r5, 0x0, 0x0, 0x8800000) 18:35:14 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:35:14 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9618fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e623f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff69ca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9c47ca8eaeb58ea57f1c2f2dd000000000000"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) r5 = openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r5, 0xc0189372, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r2, {0x101}}, './file0\x00'}) unlinkat(r6, &(0x7f0000000a00)='./file0\x00', 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=1x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r7, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x10) r8 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r8, &(0x7f0000000200)='./file0\x00', 0x86) [ 3201.445921] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3201.605433] 9pnet: p9_fd_create_unix (17810): problem connecting socket: ./file0: -111 [ 3201.642870] 9pnet: p9_fd_create_unix (17810): problem connecting socket: ./file0: -111 18:35:27 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf9", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa23) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:35:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:35:27 executing program 7: syz_open_dev$ptys(0xc, 0x3, 0x1) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280), 0x200040, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000002c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000080)={0xfffc, 0x7, 0x6, 0x6, 0x8, "50ca6273c38cb131"}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = dup(0xffffffffffffffff) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000100)=""/22, 0x16}], 0x1, 0x0, 0x80000001) r3 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r3}, &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00'}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r4, 0x29, 0x4a, &(0x7f0000000100)=0x4b, 0x4) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000001c0)={'ip_vti0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 18:35:27 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000540)=ANY=[@ANYBLOB="2321202e2f66696c6582d1300a0d10190c666f25ce27188a43c265bc98cfff888eb04b995e73fade07af67ebfe463afc47db98144e3476194f95522989fd1007da45d9f2e581580e5ae8d1c1d3f54f9259d356a3a09f6f9afc24f02062726f607656f561bdb5daa00fc03e753c51f0b5aef56c98d530204d61e7c8c512af1a68e5fd564211426a35e9c3d956d82c0fd685f65a81a1d0fc04731857dcbb1c9f211d86000000000000000051ba2256c5525c8dcb4e2258e742d25894205e59b8a378a5c51eff6cb222bfd3612dc4e245dfc1d57196db643e6b6d3ebbb3ca78f870c95de4a343577568968f4e2124d8acdf3f96c66d4ac38556e00ea049996edc18fba93108c6e041b9bc88a3097c7869e2532f9f99413f75c7772e"], 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0xe21, @rand_addr=0x44010101}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f0000000140)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:35:27 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x40}, 0x4000, 0x0, 0xff, 0x0, 0x0, 0x4, 0x4}, 0x0, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r5 = dup2(r4, r3) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) write$binfmt_elf64(r0, &(0x7f0000000340)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0x8, 0x90, 0x1, 0x7fffffff, 0x2, 0x3e, 0xdee, 0x2d0, 0x40, 0x7c, 0xff, 0xffc2, 0x38, 0x2, 0x7, 0x3, 0x40}, [{0x5, 0x9, 0x0, 0x7, 0x4, 0x1, 0xfff, 0x1ff}, {0x6474e551, 0x593d, 0x4, 0x2, 0x36, 0x3, 0xcbc, 0xffffffff}], "dace279cbd75c79c5468d1bb066a2f572ad07ae0d9be3f31ebdd966c0e3c80975f0487234e47afca30e5858987c3e87dcbd9dfbd37460772ae7c6c7bb1834850d55403bc8a79445a329157a3cc2e09360d832bfb0996205ddbc1e0bdae4709009f73523551082c568433d165ceb3017d4d7c1745b2aa42cc1fb6df6fbbf4b4fd11ecc0a47a6bbfef18", ['\x00', '\x00', '\x00', '\x00']}, 0x539) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r5, 0x0, 0x7ffffff9) 18:35:27 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000240)="e8", 0x1}], 0x1) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x4020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000140)='./file0\x00', 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000003, 0x12, r2, 0x0) 18:35:27 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) ioctl$BTRFS_IOC_FS_INFO(0xffffffffffffffff, 0x8400941f, &(0x7f0000000a00)) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:35:27 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)={0x18, 0x39, 0xc21, 0x0, 0x800, {0x1d, 0x0, 0x2}, [@nested={0x4, 0x1}]}, 0x18}, 0x1, 0x0, 0x0, 0x840}, 0x0) [ 3214.957852] 9pnet: p9_fd_create_unix (17825): problem connecting socket: ./file0: -111 [ 3214.978015] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=57 sclass=netlink_route_socket pid=17839 comm=syz-executor.2 [ 3214.998752] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=57 sclass=netlink_route_socket pid=17844 comm=syz-executor.2 18:35:27 executing program 6: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getdents64(0xffffffffffffffff, &(0x7f0000001d00)=""/4085, 0xff5) getdents(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f00000003c0), 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000002c0)={0x0, @multicast2, @dev}, &(0x7f0000000300)=0xc) sendto$packet(0xffffffffffffffff, &(0x7f0000000240)="2508805f804da4c44537580c59d72ad7a9011b752cc88a4817e11ccf8914a811b0a8e43a4977c73ffbd6c2daa8879a7c96ff5952b6b316787d4a4e6d5aa843dca096ad6ab356eef0ae7de85015b62831c2fb8c67eb5c6f50ab5a0d7483fba13d3efe3c8c156e42ae7d02f16c2d53c2899e32127e46f7addb702990843f", 0x7d, 0x0, &(0x7f0000000380)={0x11, 0x16, r1, 0x1, 0x40, 0x6, @local}, 0x14) ioctl$AUTOFS_IOC_PROTOVER(r0, 0x80049363, &(0x7f0000000200)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, 0x0) fcntl$setlease(r2, 0x400, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r5 = dup2(r0, r3) copy_file_range(r5, 0x0, r4, &(0x7f0000000040)=0x3a, 0x8, 0x0) accept4$inet6(r5, &(0x7f0000000400)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c, 0x80800) fspick(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000040)) [ 3215.048877] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 3215.053828] 9pnet: p9_fd_create_unix (17825): problem connecting socket: ./file0: -111 [ 3215.074133] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 18:35:27 executing program 2: rt_sigaction(0x1, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000480)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x3, 0x4, 0x3, 0x1ff, 0x3, 0x3e, 0x401, 0x117, 0x40, 0x2e, 0x7ff, 0x0, 0x38, 0x2, 0xfff, 0xd8a9, 0x7f}, [{0x1, 0x200, 0x0, 0xc, 0x8000, 0x7fff, 0x80, 0x1}, {0x2, 0xffffffff, 0x0, 0x9, 0x5, 0x9, 0x2, 0x5}], "", ['\x00', '\x00', '\x00', '\x00']}, 0x4b0) [ 3215.138104] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:35:27 executing program 7: syz_open_dev$ptys(0xc, 0x3, 0x1) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000280), 0x200040, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000002c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000080)={0xfffc, 0x7, 0x6, 0x6, 0x8, "50ca6273c38cb131"}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) r2 = dup(0xffffffffffffffff) preadv(r1, &(0x7f0000000180)=[{&(0x7f0000000100)=""/22, 0x16}], 0x1, 0x0, 0x80000001) r3 = gettid() timer_create(0x0, &(0x7f0000000240)={0x0, 0xb, 0x4, @tid=r3}, &(0x7f0000000040)) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'bridge_slave_0\x00'}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r4, 0x29, 0x4a, &(0x7f0000000100)=0x4b, 0x4) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}}, 0x1c) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000001c0)={'ip_vti0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 3215.154423] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3215.168965] TCP: request_sock_TCPv6: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. 18:35:27 executing program 2: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0) r1 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) pidfd_getfd(r1, r0, 0x0) 18:35:28 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="020000000081b225bebb1968350000000000400000000000000000000000007c32197606f8ade41e85a76760c63551bcee042a5c90402cd3d68bc73af38582e681a782721fcf44630dc2124ef4bf1092c8254227d8b943bd816341161de5567caa3b7eb5e933240a94c476ee18a5bc74aa3a262ceba9da6f6d1747e41728ae5456fbbeab7433b18c37325d2c3300000000000000000065ce834e1b3917eabc538befadbebf4ced880175c495b2c6c2215b18d67cd65ec451cd8b43f0f213d3ffd0ef684869ac1110b9af9c5496ce355576c27dcb9a3be8b7baf836b3595b07e6a63e199efb48d58edbef68612beba546e5e328cb472a64c9d5f84f1ed0a562e2df6eb760c9e0fad05a0c6082b7f5ef9da19cc82cbd96330e5a6b7cddf4ddb794d5e5dd27f4076d648d1d76236a849f4046b13015e6d945ec0a9ecc15bf85e72e624f949c48bfff4bd956999a19107b0cffdd28a5ce84fe67227b3f6de2cacaeced92e758a0a0cb0e55da2140790d4f21d7176aa9754efbc395176e389f1682f2d83a5fbf9e835a6bfd49af149190f22253a1d61cce9f0344f3045418793b0b8265e0b43df0448fc34ac43caaef110168b64bfc902b24647398e5b4f8b72ce986b4920b8c220b5c89000000000000000000e7c1be01f3cb574803206251e67e690d430778913d6e4e2e2c40e6e524042b5b98384f6b663d5243467f04ccfecc1e049a87c27020ffd4497d53a9f5b63a101d0c892529bcfed3f1b9f9d6175aba09ef67a03c2038ab40182fb643822a179680967335386d918d9fbd9b523de819c96b5a2866d960a051f17cdc6f12a313bb773ac313c900b33c0d9671e130e9566e18fd7ae790f1f02a0f5bc04f2e974eb98639acfbd39844735f7a48aa51704409b14cc964d1803f3f8a281a86d8d21d7604a7b349be8af9bdd3b953282cb6067d6041288acc2446ec69451a26a093e819b57df15f58553bc62729464b5e627f2e57034490e34045689b9a2c4be70181143b3a91860fec1d5d65e58795a741f067c7c97294aaf1cf6d6156637b749a2b58f446cbf45cb0c3ae29b01814104ced90c1f1ff6dca1783f52c389c7dc747303dc3b7180fbf6d90d6acfcafbf6b0e801d78729d4ad335c76c81ca7ba2f2f8d9b17ca8eaeb58ea57f1c2f2dd"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) ioctl$sock_inet_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) getsockname(0xffffffffffffffff, &(0x7f0000000a00)=@xdp, &(0x7f00000002c0)=0x80) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file1\x00', 0x42c80, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:35:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:35:28 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0xc0, 0x40, 0x40, 0x6, 0x0, 0x2, 0x40, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xffff4c1e, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x100, 0x9, 0x1, 0x7, 0x100000000, 0x2, 0x5, 0x0, 0x999f, 0x0, 0x95b2}, 0x0, 0xb, 0xffffffffffffffff, 0x8) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:35:28 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:35:28 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x581142, 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) fspick(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x0) write$binfmt_aout(r1, &(0x7f0000003740)=ANY=[], 0x1920) sendmsg$GTP_CMD_GETPDP(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="09f9f7006bb2d313ff9655f29577d89f88f010ac3b91c47c84f6089d2856208d000e04ee2edbc25f5cc70597b3fd9d71a98b1faa9dd53cf3fbacdd29657e87d6af08cb587ee4e60e08e5c47c797b0a00005a9b716644f46c710db04a3f33487848a5ed13fed8446e2c8400"/116, @ANYRES16=0x0, @ANYBLOB="00022cbd7000ffdbdf25020000000800020000000000"], 0x1c}}, 0x4004) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x4838f, r1, 0x2}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280), 0x40000, 0x0) close(r4) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r6 = dup(r5) getdents64(r6, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r6, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r6, 0xc0189377, &(0x7f0000000180)={{0x1, 0x1, 0x18, r3, {0x3, 0x2}}, './file0/file0\x00'}) r7 = openat(r1, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r7, 0x0, 0x5) 18:35:28 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x100) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) close(r2) r4 = syz_mount_image$nfs(&(0x7f0000000140), &(0x7f0000000340)='./file1\x00', 0x5, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000380)="578bb957336a426cd86bbcca8e5650", 0xf, 0x5}], 0x80000, &(0x7f0000000400)={[{'iso9660\x00'}, {'#! '}, {')'}, {'#! '}, {'^-('}, {'#! '}, {'iso9660\x00'}], [{@obj_user={'obj_user', 0x3d, '#! '}}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@permit_directio}, {@uid_gt={'uid>', r0}}, {@mask={'mask', 0x3d, '^MAY_WRITE'}}, {@euid_lt={'euid<', r0}}, {@euid_lt={'euid<', r0}}]}) openat(r4, &(0x7f00000004c0)='./file0\x00', 0x42041, 0xc) r5 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r5, 0x0, 0x7ffffff9) [ 3215.459566] 9pnet: p9_fd_create_unix (17877): problem connecting socket: ./file0: -111 18:35:28 executing program 7: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/dev_snmp6\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000000)) mkdirat(r0, &(0x7f0000000040)='./file0\x00', 0x0) r1 = openat$cgroup_ro(r0, &(0x7f00000000c0)='blkio.throttle.io_service_bytes\x00', 0x0, 0x0) openat(r1, &(0x7f0000000100)='./file0\x00', 0x400000, 0x164) [ 3215.492118] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 3215.509311] 9pnet: p9_fd_create_unix (17886): problem connecting socket: ./file0: -111 [ 3215.657173] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3215.663942] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:35:40 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file1\x00'}) ioctl$LOOP_CHANGE_FD(r5, 0x4c06, r1) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r4, 0x0, 0x7ffffff9) 18:35:40 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0xdfe) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r3 = dup(r2) getdents64(r3, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r3, 0x0, 0x0) r4 = perf_event_open$cgroup(&(0x7f0000000100)={0x2, 0x80, 0x40, 0x4, 0x3, 0x3f, 0x0, 0x8, 0x64, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xa}, 0x1, 0x6, 0x7, 0x6, 0x30, 0x8, 0xa7, 0x0, 0x7, 0x0, 0x101}, r1, 0xe, r1, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000240)={{0x1, 0x1, 0x18, r4, {0xee00, r5}}, './file0\x00'}) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) lseek(r1, 0x0, 0x3) 18:35:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:35:40 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x5e, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x19) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:35:40 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) dup(r1) sendfile(r0, r1, &(0x7f0000000000)=0x80000000, 0x26f2) ftruncate(0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0xb, 0x7) bind$inet(0xffffffffffffffff, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2a}}, 0x10) shutdown(r2, 0x1) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e22, @loopback}, 0x10) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000400)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e24, 0x3}}, 0x80) connect$inet(0xffffffffffffffff, 0x0, 0x0) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x1c1e02, 0x0) ioctl$CDROMRESET(r3, 0x5329) unshare(0x48020200) 18:35:40 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"]) openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0), 0x80283, 0x0) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:35:40 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) setfsgid(0x0) mount$9p_unix(0x0, &(0x7f0000000240)='./file1\x00', &(0x7f00000002c0), 0x3b175157a44ccfd3, &(0x7f00000003c0)={'trans=unix,', {[{@access_user}, {@privport}, {@dfltgid}], [{@func={'func', 0x3d, 'FILE_CHECK'}}]}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000000000000000000000000000061616161616161616161616161616161616161616161616161616161616161613131313131313131313131313131313131313131313131313131313131313131421531e83ca5a081d332b7db89cd0c3987c204758ae4531d61f4793eecd34ea89131251b657b654ec5e4f051b6c8e343278b71db367bd68e3621833141150c40bab4e5ba5f6dff4473a3624bd59db88628557fca8460fc8add21c5c9fa14f39ebfe632e592c6be09882549d0bf8103fd36b71bde3678e1d98db52eec1b2a05cd99a266a8a03c2edd79"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000300)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x543800, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r2, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000140)}, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_unix(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x6001, &(0x7f0000000280)={'trans=unix,', {[{@fscache}, {@access_any}], [{@dont_appraise}, {@hash}]}}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) dup2(r3, r0) epoll_create1(0x80000) mkdirat(r4, &(0x7f0000000200)='./file0\x00', 0x86) 18:35:40 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3228.145618] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3228.149033] 9pnet: p9_fd_create_unix (17928): problem connecting socket: ./file0: -111 18:35:40 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3228.219731] audit: type=1400 audit(1682966140.940:28): avc: denied { setattr } for pid=17917 comm="syz-executor.2" path="/proc/17917" dev="proc" ino=79698 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dir permissive=1 [ 3228.283016] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3228.300512] 9pnet: p9_fd_create_unix (17928): problem connecting socket: ./file0: -111 18:35:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:35:41 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:35:41 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0xffffffffffffff00) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='#! .e0\n'], 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000440)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e6a48487c34aa79d098c3577db47cb09d6287e589acf5a5e6a02035fab319fba6cefc1e5ab4f1d01b8e83344b445b27c7428db65335ed6747a452530410412411e6bc3344394da43860d0bc30481d63bc90bd327903417192f3f05fcccbcf5fbae0b41105ea3bb6e3a4a6a03d54a48edbf6e994047b517076635789e09f37dc18456cc7fb2ec915d5817ad384af29a500cc90c6a75f21eb70d8ba2bc23ee4260ccccb49ea2b971b7a18f5cd53444a51484011a9da2ec56b9c98586de80d", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:35:41 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) mkdirat(0xffffffffffffffff, &(0x7f0000000a40)='./file1\x00', 0x20) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT(r4, 0x4004f506, &(0x7f00000002c0)) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:35:41 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCGETA(r0, 0x541a, &(0x7f0000000000)) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000040)=0x3) [ 3228.474201] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3228.514042] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3228.536353] 9pnet: p9_fd_create_unix (17957): problem connecting socket: ./file0: -111 18:35:41 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, &(0x7f00000000c0)={0x9, &(0x7f0000000080)=[{0x7, 0x3}, {0x7, 0x7f}, {0x5, 0x80}, {0x3, 0xd6}, {0x100, 0x9}, {0x0, 0x7}, {0x0, 0x1}, {0x6}, {0x400, 0x8}]}) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r2, &(0x7f0000007100)={&(0x7f0000005a40)=@ethernet, 0x80, &(0x7f0000006e40)=[{&(0x7f0000005ac0)="64ec", 0x2}], 0x1}, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000002c0)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$BTRFS_IOC_SNAP_CREATE(r3, 0x50009401, &(0x7f0000000600)={{r1}, "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"}) readv(0xffffffffffffffff, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) ioctl$AUTOFS_IOC_READY(r0, 0x9360, 0x7) r4 = syz_open_procfs(0x0, &(0x7f00000005c0)='environ\x00') r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fgetxattr(r5, &(0x7f0000000180)=ANY=[@ANYBLOB='s\x00'/15], &(0x7f00000001c0)=""/123, 0x7b) r6 = openat(r4, &(0x7f0000000140)='./file0\x00', 0x80, 0x1) acct(&(0x7f0000000040)='./file0\x00') mq_timedreceive(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, 0x989680}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f00000004c0)=ANY=[@ANYBLOB="8dd6ed622bf37b113b78ec33dc0ddbfd7e8845e9412f926a6ab3c1233c77bf4ca96249e891b3d62690c8ebe103d263930339d470331f5191c0b9af80a18311943534a583e4170ae8965d53d47b3f299698e2afa5cbef5d83be5fb924d1f1cc0be6a0f080848083ce41ce6b7c90072138f7c5ad8e567022867cd8cbe3e067324fb03d46f091a6caffbc75e077032a9493b511fd76e333796dc34ce0ed31b1cf26f002570750b1f95270ba692120c9e8ff6c3c4ca41b173b54659f5939eb1d7f1f179b94356d5d5eaf4e76efec6b700ce43245538c2622", @ANYRES32=r6, @ANYBLOB="ba020000ac4d00002e2f66696c653000"]) [ 3228.619058] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3228.632330] 9pnet: p9_fd_create_unix (17957): problem connecting socket: ./file0: -111 [ 3228.646984] raw_sendmsg: syz-executor.6 forgot to set AF_INET. Fix it! [ 3228.694886] Process accounting resumed [ 3228.734113] Process accounting resumed 18:35:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x5, 0x80, 0x1, 0x7f, 0x80, 0x2, 0x0, 0x3f, 0x4000, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_bp={&(0x7f00000000c0), 0xc}, 0x5, 0x8, 0x8, 0x9, 0xf350, 0x8e0, 0xaf0, 0x0, 0xac, 0x0, 0x8}, 0x0, 0xc, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="030000000400000005", 0x9, 0x800}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f00000004c0)=ANY=[]) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='oom_adj\x00') pread64(r0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x40000060, 0x6, &(0x7f0000000580)=[{&(0x7f00000000c0), 0x0, 0x1}, {&(0x7f0000000140)="3262d5499efbbdba3ea211ef8675efeabe55f1a19c001b7969eb50fd33236a1ca8b45766829b00e1ff06b5db9cd8978754a21f1717320dda7c1a029245dbd85d4365f6978ff561b59029243b5b41acddaec06e00b56f151fc594118fb44b9b9a3227a050d8705da05c66762e92cde106f54e246eeae13d4983f850035ca4c820d194e08927ede4257901ccba2023ccbecad6f906b0119e46ded547eea855c747b77ef264dddfcbabad7802704cd95bf14bf17bbe", 0xb4, 0x7}, {&(0x7f0000000380)="b0d03e9d5d8461aa29e030863be92e46c754ddf237a43024b2fc0f05020665a9249b0bb96bc8ba8b0c06ba8562577ee18bec2001806f22e87fa974561eeab219", 0x40, 0x8}, {&(0x7f00000003c0)="b8fc89c246f038dd74b42a70dd6dfc4d9d04093b1314fa941d097f058c60a80b2cee21112f07eae4e4c2202ef1d089ef267616b9835904960d5b63ab536fc783899004a86b751255bd85b988cdde2137465c5dd345520f29004194e759a1c83e00be551ae6", 0x65, 0x3}, {&(0x7f0000000440)="1f65eebd26b3449bae9c90a3d72b0f3d2e547d", 0x13, 0x2}, {&(0x7f0000000480)="6c44c9ad48eaafc62d0ac01e479104c6455de3c0f597b52cebbf2582fdac6e33210e757c2af7738e681882fd6ef83a2bc983e6039403bd6ea36e9f936b32da65c8d4b7f14aacd3c2ff6c4f699c03592e08c6ce558569207635150d219c105c13a4a985f138b580e46cd949fb3848a03ec43bb1b4fa2e845fecb86a4cb864d321a2803ad03c41bee266fd5a905647322f44e05c171c46296f00f3e775ba5ce9b3023b131daa0d492040d99341c7645883e5ad9690d3a1b25d5b295f6ba5341991dfcbcec8372ab96b181e864254f3b25436be44d973af3dff", 0xd8, 0x3}], 0x1000200, &(0x7f0000000640)={[{'/!'}, {'\x9b#\xc0\xd0\\D\x8d\n\xfe\f9+>\xbdj\x17\xe2\x1f\xe3\xe2\xf4;w\x91_,\xf4N\x88\xf7\xfb\\\x94IZ\xaf\xee\x17}6\x02!a\x03\n\t\x1a[`\x1d\xd6n\x01#\xb6\xe4\x13\xb2\"\xad\x18\xac\x97\x81\xd3\xce\xe5;\xb1\x99\xdb\x94%\xa2\xe8\xed\xbfr#(\xa8\xcc\xdc\x9f\x0e\xbd\x14B\x84\xfeq\xdd\xfd\xea\x14M\x0e\xa1\xa2\x17G\x14\x00\x10\x8fp+A\xe5\xb9a\xe33\xd2oAd^lHHd8\xbb_\xca\x84\x95\x88\xb7\x81\xf8u\f5\x10\xf5\xd7Z\xbdp\xe9T\xa8\x7f\xa3h\x1c\xb8\x92\x92\xf7\x9a\xd8\xb5R\xad\x9f\xeeA~\x00\xa0\x8eC\x93\xdf0\x87\x14\xd8BFT\xdd\xc3\xb2\xab\x10\x80\x83l\x8b\x9foD/\x1e`\r\x85\xc67'}, {}, {'audit'}, {'\xdc)'}, {'ext4\x00\x87\xb7\x83\xd2\x17\xf6\xb9\xdf\x9d\xbfq\x94P\xbcL\x86/\x97\xc9/\xc8\x19F#\xa9OD}\xad\xa2E\x7fs\x04\xa7\xc5\x83\xf6\x9c\x1c\xb3\x8a\x9a%\v\xf3o\xd6\x0e\x88 G\xf2,#\xa2O\x14\xa8G\x94\xf0j\x98?\x02\xa2tc\xecY\xbf\xda\xf1\x13\xcb3\xc82\x9d)\xc8\xc6\x92\xa5\xb6\bh[m\xcc\x99\x96\x91@\xb1x\xd1u\n\xb2\xbc\xc8\xdc\x8at\xa8{^^\x18\xd8\x14\x96\x12\xcd\xa4W\xdf\xf6wW\x81)\xd2/\xd4\x80\xeexR(\xebM/\x1b\xbe2;W:\xe9\xec\x97-F\x00\xfc8c^>\'\xda\x03\xf4M\xb6\xc6\xab\xfe\x8dU\x1f\xd0Qg'}]}) 18:35:56 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a0f95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:35:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3243.825329] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 18:35:56 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x0) read(r1, &(0x7f0000000000), 0x1b4000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x0, &(0x7f0000000000)) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x4e21, 0x0, @private2, 0x3}, 0x1c) capget(&(0x7f0000000040)={0x20071026}, &(0x7f00000000c0)={0x7, 0x1, 0x400, 0x7, 0x8, 0x1f}) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) 18:35:56 executing program 2: sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, 0x0) r0 = syz_open_dev$vcsa(0x0, 0xe11, 0x4000) sendmsg$SMC_PNETID_ADD(r0, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x28, 0x0, 0x4, 0x70bd26, 0x25dfdbfe, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'bridge0\x00'}]}, 0x28}, 0x1, 0x0, 0x0, 0x8010}, 0xc004) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000001e00)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}], 0x9, "9959275f867337"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x0, "46dacd8396fe92"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f000000aa40)={0x0, 0x0, "c009b39830e4109622d7a29d0bd42e6d365c8384f665a2104b6faaa5427626b93311e77f0de4211e1217bc355a5246327eb7ba126bf7e4adb45535a4d9757c77f555e42c9254e9f9089be590271f821f5f6b632da2dabf1d6e618629da57a34a33f5e913338e628f32d84f60dbb9f94b70f1828e7d652bb2443c02901738d15cd72d14288f0d47dfe96e49988d0402f96628f97be361723e018daf71ab695fa4726664c00ec9aa53b8c092760da4cd088f03fad6504eceb8949dc35abc6c9f51916777bc38aa3669fb220546dbd1024eb87da205b46ec35180a8fcb898160855b5044023da75f2b1f285c1462a8afa95492a14be3f42052ff535612d226506a0", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000001300)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000007d440)={0x9, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {r7}], 0x0, "46dacd8396fe92"}) [ 3243.864954] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000002e00)={r12, r6, "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", "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"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000003e00)={r9, r13, "ee4b50d9aa10651a10d1c3d49ab17a470aff6cba155c1d24b3757ca8ac0a3635e0ca4e7c120be25fe5803d57887e69f060c1bd3828aed30d95cb397a69a596f3d57033988c353066c0dcc974d5483bc0c2436a21e3cc3d32e17b951a126128321fbc75b824227934a19f0b1a1884bccdbd4cf2f97717da489d8ef5b46b1c4318077f950869880d226935fa9cc5ba9fa4b6d89854953306d3b1bf8910663c18b71969a3e9bf9dfe8eb2902c2d3f27e28750274f50e345e6cd9eae27f651e7dddab60269fd71e2257e33e4d55edd2c44561ce04ff16035a7598f72d935d5239ec928d39bfe7dc149decf43ff58926465c8d6c63bab8c47c472ea2fd32853eaedbf", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000063800)={0x84, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r15}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r14}], 0x2, "7c1793b29af822"}) recvmmsg(0xffffffffffffffff, &(0x7f0000007940)=[{{0x0, 0x0, 0x0}}], 0x500, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r16 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r16, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 18:35:56 executing program 7: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000001800)=[{{&(0x7f00000000c0)=@l2tp6={0xa, 0x0, 0x1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x6d2e2350, 0x4}, 0x80, &(0x7f0000000000)=[{&(0x7f00000003c0)="9bddb4545cd76fba44a19856dd2fff7dfdbc3d58dc7d4ec1e0c6cb6636e0772927807a135253590c6727c9d6a5b52f9439476cda9a7f9ae3c133d4a1f8dcd74573f4e6ae6f42fc3566f114a82c9e79daa760e3b69a0f04427f8207c797c33703a019a83ab3833f51667889b71d4eedd53c6db99a240edd2cf42bb459575cee9974bcd7b1a0830917", 0x88}, {&(0x7f0000000480)="2bb3c001269484435236def45bfee1ca2c72c21a516734f2d9cfebf843d9ba672beffcd31fbe48d78ede7a41f8a14c98937e34cd35cc27f4fa903f95b16bde7b87aa55d1fbe1071de31cc3495633884ed13285ac912c690eb685815cf59db2b6b1a12343d782f86f618dc4450e0d2f08b25788d598f86d3d0ee81d1a1bc8b8eda4a6d0ddf4e32665d88062a06d7ae712a760362c8f30bee57b81ec4f7d607d4bbacace0056b694d66ca2", 0xaa}], 0x2}}, {{&(0x7f0000000180)=@hci={0x1f, 0x1, 0x3}, 0x80, &(0x7f0000001600)=[{&(0x7f0000000240)="68b39f033bdfdd109001f127d191e515c0ae8bccae1c08866dd6c90b349d6781f847f3f78f49b5a5f3150aa40d8784046ef868636ebf1534e79f281101df7a6ef45fb1b823f2407be96b1e0301d9f6e61ec42a79d807cd5ba1a44b42d9f99ae73d17eb54ba4d240ad0e0ca42785249c611419055d896fd8ff9e09910c47da0", 0x7f}, {&(0x7f0000000340)="cc10c713128d4a6b1e51c0e76d0ec3792002bcbaa17e040e9c732f30e5194f1baa868c389265228c6c57714ae7ab6dd6dbfc54c4b490c6171ad5248a", 0x3c}, {&(0x7f0000000540)="bab07358b26abe2779", 0x9}, {&(0x7f0000000580)="9245503ec7662dfe449b1e3801caddec1d432c06da32eb77da756540c573446b1100010a5c0ed9be60ffb5a75d6f6fe2f68ff46ed5820631c9ce7067a72da836d1c95e7cdfbd279f19", 0x49}, {&(0x7f0000000600)="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", 0x1000}], 0x5, &(0x7f0000001680)=[{0xc0, 0x102, 0x401, "3f64d42c2218afaee7b35c813ec2212c246986d6acf6764c2e49ae3bb22b7fd20494ec6d3e905801796c9830b69aff482d68acfaa8e147b153aa16c269ca91be57f959b6cd470a30e437fd1976c1caee029c06bb7690ec023ef722a23bc1a660813d5b8014d3190215572ee7650f304dc5045c6a958ac6bae63ab3276d232584956a7d59a4ab5667e791c347d6ee146612b990425d16b2629e73fc9b82c31e28469331eaa7a3163183dc9dcbb4"}, {0x90, 0x11, 0x2, "bc618b0e4c567eb60a493a4fc1c431cbc762f5a5cf8abe0c5b03effd9a80f8e611cc09fe1afe0c234d8c56b6d636c799ebc6ee844523f37c195963afa83b50c53a9285196bf127d03ea6bb0c579b7fcb0655f686c7a134d7408034ec1e99701f73c77d2bf70b193a93577c8d57a656c787c392e428a6780ffd57387f0c9d"}], 0x150}}], 0x2, 0x40050) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x2000) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, 0x0, 0x0) r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x96}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x82, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000380)}, 0x200, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) fadvise64(r1, 0x0, 0x0, 0x4) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f0000000040)=[0xffffffffffffffff], 0x1) 18:35:56 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:35:56 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, &(0x7f0000000140)=0x6, 0x240000) r1 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r2, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r5 = dup2(r4, r3) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), r3) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r6, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r7, 0x800, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x8}]}, 0x1c}, 0x1, 0x0, 0x0, 0x17ae497f7e544a9c}, 0x4) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) fstat(r6, &(0x7f0000000340)) sendfile(r6, r5, 0x0, 0x7ffffff9) 18:35:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:35:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3243.974031] cgroup2: Unknown parameter ' >' [ 3243.976843] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:35:56 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x40, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_IE={0x11, 0x2a, [@random={0xdd, 0xb, 'abcdefghijk'}]}, @NL80211_ATTR_SCAN_SSIDS={0x10, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ap_ssid}]}]}, 0x40}}, 0x0) sendmsg$NL80211_CMD_SET_CQM(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)={0x11c, r1, 0x4, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x4, 0x66}}}}, [@NL80211_ATTR_CQM={0x20, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x800}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x8}, @NL80211_ATTR_CQM_RSSI_THOLD={0xc, 0x1, [0x401, 0x3]}]}, @NL80211_ATTR_CQM={0x10, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0x9}, @NL80211_ATTR_CQM_RSSI_THOLD={0x4}]}, @NL80211_ATTR_CQM={0xc, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x332}]}, @NL80211_ATTR_CQM={0xc, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x2f9}]}, @NL80211_ATTR_CQM={0x40, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x46}, @NL80211_ATTR_CQM_RSSI_THOLD={0xc, 0x1, [0x8001, 0x6]}, @NL80211_ATTR_CQM_RSSI_THOLD={0x18, 0x1, [0x0, 0x401, 0x8, 0x0, 0x8]}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x10000}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x14}]}, @NL80211_ATTR_CQM={0x34, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x240}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0xfffffffa}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x4}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x2}, @NL80211_ATTR_CQM_TXE_PKTS={0x8}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x10001}]}, @NL80211_ATTR_CQM={0x1c, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x9}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x31e}, @NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0xb166}]}, @NL80211_ATTR_CQM={0x1c, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x5}, @NL80211_ATTR_CQM_RSSI_THOLD={0x8, 0x1, [0x9]}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x7}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x800}, 0x0) syz_80211_inject_frame(&(0x7f0000000300)=@device_b, &(0x7f00000004c0)=ANY=[@ANYBLOB="8000000008021100000108021100000008021100000000000000000000000000640001000006020202020202010882848b960c12182403216277e0a0c2246f4b301d95b9b06541005e84652fd39bc2f309da902f7726791f04f6cde21c1a45ee025c715839e1ac55198ab685bde24bbb22f74ebe3b572df81b5e999aca5eca8b0677136515fd650f062e205a87ace732021cb8697ab1659c4ebe703a20a8b2dd1a484ded20cf5aa51cbfa10dda"], 0x36) nanosleep(&(0x7f0000000080)={0x0, 0x4c4b40}, &(0x7f00000000c0)) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r4 = dup(r3) getdents64(r4, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r4, 0x0, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmmsg(0xffffffffffffffff, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="836acc9659000000100000f8755c2d16b8d1b2a113f86dc76fc7062b2d130afb2c4f576048b47c7a9d7f6bf9c6f01323aa8451763956c9f20a127a34abccedf4dee5250b7c045581c53ab5a8a96fb80400eaf60000000000000000000000000000ce3e701e8d9a74b0a00da193b57f36aad016f7dc4b1d29e118062e", @ANYRES32=r7], 0x10}}], 0x2, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x24, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x4) syz_80211_inject_frame(&(0x7f0000000300)=@device_b, &(0x7f0000000340)=@mgmt_frame=@probe_response={@wo_ht={{}, {}, @device_b, @device_a, @from_mac}, 0x0, @default, 0x1, @val={0x0, 0x6, @default_ap_ssid}, @val={0x1, 0x8, [{0x2, 0x1}, {0x4, 0x1}, {0xb, 0x1}, {0x16, 0x1}, {0xc}, {0x12}, {0x18}, {0x24}]}, @void, @void, @void, @void, @void, @void}, 0x36) [ 3244.082530] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:35:56 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:35:56 executing program 2: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, "77004a6efdff00"}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) ioctl$TUNSETLINK(r0, 0x400454cd, 0x7) write$tun(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x100) r1 = socket$inet(0x2, 0xa, 0x0) dup3(r1, r0, 0x0) [ 3244.135081] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 18:35:56 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000dc0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f00000003c0)=0xffffffffffffff52) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) r4 = syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000a00)='./file0/file0\x00', 0x6, 0x4, &(0x7f0000000c80)=[{&(0x7f0000000a40)="106a2b98da7478bdfb07a8d341b96b1587efa59cc80d3b8457eccde918f48a586835a3f5ddab581a0ec0dd88680be5e2acae148ba24d86cdde24e96e2d75c1862c920c352ac53edceb1e48d552b8f59ed7ad6da663b9e28b0dfffe", 0x5b, 0x122b}, {&(0x7f0000000ac0)="306f2e5478379d47423a44943614ee1e76b98b1dd84024c2f961d4ab73b48920b898475bb60c1fb0a6290d24411273fa3fb849d7b608ca2a2f9dff06ed371ce9e7563b6fe36968ef0361c26b27dbb5ea2abb291e7fd92612a4fcda8ddb05f3df92f186cfb86f16115a9f54aaf2d88090c750f2106117", 0x76}, {&(0x7f0000000b40)="3f707f7c0bda6dd9465de1c1e0e91cf814c26e959abddfa44c383a5f7664e5412643fbe14b8a1926ecca27ad069fb3baa361fa400b", 0x35, 0x5}, {&(0x7f0000000b80)="bdb6f984c54ea5882489cbb3bc834b85b57b294e412173643e34fc05a9e47b5608e5ca2fef1878369f18931f099fc5320808b594de5704af2e49faadb8cbabdfbf6dc1709326dd3ba523643121cc9bd6101efaebca5d3049fe0400e235532e56ad71b538fb74e622d974fa46405aa201df02c6b4e76c8f9acae665e08e3bc33fb8ec07764ebc325254dc774525e589cf8cd5f42c93fa34d9fdcea15553585bc95702de02f82596b7063e35fc9c8c3579514180ca1395bc389e20dbbac993303e0a959ef1e0063d35f8f0124d784f6bd1baaae140eb4b3c82ae0d5b85ccf0b6e3764abf67d7", 0xe5, 0x7}], 0x80010, &(0x7f0000000d00)={[{@nodots}, {@fat=@quiet}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@dots}, {@nodots}, {@fat=@allow_utime={'allow_utime', 0x3d, 0x180}}, {@nodots}], [{@euid_eq={'euid', 0x3d, r2}}]}) openat(r4, &(0x7f0000000d80)='./file0/file0\x00', 0x20000, 0x4) openat(r3, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 3244.205027] EXT4-fs (loop6): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3244.214779] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 18:35:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3244.240963] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3244.288630] 9pnet: p9_fd_create_unix (18033): problem connecting socket: ./file0: -111 [ 3244.329564] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 3244.342355] 9pnet: p9_fd_create_unix (18045): problem connecting socket: ./file0: -111 [ 3244.411717] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3244.537544] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 18:36:11 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:36:11 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x24, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x40, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_IE={0x11, 0x2a, [@random={0xdd, 0xb, 'abcdefghijk'}]}, @NL80211_ATTR_SCAN_SSIDS={0x10, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ap_ssid}]}]}, 0x40}}, 0x0) sendmsg$NL80211_CMD_SET_CQM(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000380)={0x11c, r1, 0x4, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r2}, @val={0xc, 0x99, {0x4, 0x66}}}}, [@NL80211_ATTR_CQM={0x20, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x800}, @NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x8}, @NL80211_ATTR_CQM_RSSI_THOLD={0xc, 0x1, [0x401, 0x3]}]}, @NL80211_ATTR_CQM={0x10, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0x9}, @NL80211_ATTR_CQM_RSSI_THOLD={0x4}]}, @NL80211_ATTR_CQM={0xc, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x332}]}, @NL80211_ATTR_CQM={0xc, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x2f9}]}, @NL80211_ATTR_CQM={0x40, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x46}, @NL80211_ATTR_CQM_RSSI_THOLD={0xc, 0x1, [0x8001, 0x6]}, @NL80211_ATTR_CQM_RSSI_THOLD={0x18, 0x1, [0x0, 0x401, 0x8, 0x0, 0x8]}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0x10000}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x14}]}, @NL80211_ATTR_CQM={0x34, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x240}, @NL80211_ATTR_CQM_RSSI_HYST={0x8, 0x2, 0xfffffffa}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x4}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x2}, @NL80211_ATTR_CQM_TXE_PKTS={0x8}, @NL80211_ATTR_CQM_RSSI_LEVEL={0x8, 0x9, 0x10001}]}, @NL80211_ATTR_CQM={0x1c, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_RSSI_THRESHOLD_EVENT={0x8, 0x3, 0x9}, @NL80211_ATTR_CQM_TXE_INTVL={0x8, 0x7, 0x31e}, @NL80211_ATTR_CQM_TXE_PKTS={0x8, 0x6, 0xb166}]}, @NL80211_ATTR_CQM={0x1c, 0x5e, 0x0, 0x1, [@NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x5}, @NL80211_ATTR_CQM_RSSI_THOLD={0x8, 0x1, [0x9]}, @NL80211_ATTR_CQM_TXE_RATE={0x8, 0x5, 0x7}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x800}, 0x0) syz_80211_inject_frame(&(0x7f0000000300)=@device_b, &(0x7f00000004c0)=ANY=[@ANYBLOB="8000000008021100000108021100000008021100000000000000000000000000640001000006020202020202010882848b960c12182403216277e0a0c2246f4b301d95b9b06541005e84652fd39bc2f309da902f7726791f04f6cde21c1a45ee025c715839e1ac55198ab685bde24bbb22f74ebe3b572df81b5e999aca5eca8b0677136515fd650f062e205a87ace732021cb8697ab1659c4ebe703a20a8b2dd1a484ded20cf5aa51cbfa10dda"], 0x36) nanosleep(&(0x7f0000000080)={0x0, 0x4c4b40}, &(0x7f00000000c0)) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r4 = dup(r3) getdents64(r4, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r4, 0x0, 0x0) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmmsg(0xffffffffffffffff, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="836acc9659000000100000f8755c2d16b8d1b2a113f86dc76fc7062b2d130afb2c4f576048b47c7a9d7f6bf9c6f01323aa8451763956c9f20a127a34abccedf4dee5250b7c045581c53ab5a8a96fb80400eaf60000000000000000000000000000ce3e701e8d9a74b0a00da193b57f36aad016f7dc4b1d29e118062e", @ANYRES32=r7], 0x10}}], 0x2, 0x0) sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x24, r5, 0x20, 0x70bd2a, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_IFTYPE={0x8, 0x5, 0x7}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x4) syz_80211_inject_frame(&(0x7f0000000300)=@device_b, &(0x7f0000000340)=@mgmt_frame=@probe_response={@wo_ht={{}, {}, @device_b, @device_a, @from_mac}, 0x0, @default, 0x1, @val={0x0, 0x6, @default_ap_ssid}, @val={0x1, 0x8, [{0x2, 0x1}, {0x4, 0x1}, {0xb, 0x1}, {0x16, 0x1}, {0xc}, {0x12}, {0x18}, {0x24}]}, @void, @void, @void, @void, @void, @void}, 0x36) 18:36:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10001}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x900, 0xca) setsockopt$inet6_int(r0, 0x29, 0x0, &(0x7f0000000100)=0x101, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$unix(0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001a80)={&(0x7f0000000300), 0x6e, 0x0, 0x0, 0x0, 0x120}, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @empty, 0x1}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x80464c453f) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$AUTOFS_IOC_PROTOVER(r4, 0x80049363, &(0x7f0000000000)) fsync(r4) dup2(r4, r2) 18:36:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:36:11 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:36:11 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000000340), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x4, 0x4007, @fd_index=0x1, 0x30c63cbb}, 0xd0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:36:11 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(r2, &(0x7f0000000100)='./file0\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:36:11 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x714, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:36:11 executing program 2: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000000)={0x1f, 0xffffffffffffffff, 0x3}, 0x65) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) fcntl$dupfd(r0, 0x0, r1) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0), r2) write$bt_hci(r0, &(0x7f0000002d00)=ANY=[@ANYRES64=r3], 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000300)="a2", 0x1}], 0xc0, &(0x7f0000000600)=[@cred={{0x1c}}], 0x20}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r4, 0xc038943b, &(0x7f0000000080)={0x8, 0x30, '\x00', 0x1, &(0x7f0000000040)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r6 = dup(r5) getdents64(r6, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r6, 0x0, 0x0) fsetxattr$trusted_overlay_redirect(r6, &(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x8, 0x2) [ 3258.876122] 9pnet: p9_fd_create_unix (18072): problem connecting socket: ./file0: -111 [ 3258.887139] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 18:36:11 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000080)={0x0, 0xfdfdffff, 0x102, 0x0, '\x00', [{}, {0x800, 0x0, 0x400000000000000}], ['\x00']}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) unshare(0x48020200) r2 = accept$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @private}, &(0x7f0000000200)=0x10) write$binfmt_elf64(r2, &(0x7f00000002c0)={{0x7f, 0x45, 0x4c, 0x46, 0x37, 0x4, 0x2, 0x6, 0x4, 0x2, 0x5, 0xdb, 0x2ea, 0x40, 0x1b6, 0x6, 0x100, 0x38, 0x2, 0x1, 0x0, 0x7}, [{0x2, 0x1, 0x200, 0x7, 0xff, 0xfffffffffffffff8, 0x2, 0x798d}, {0x1, 0x9, 0x5, 0x200, 0x5, 0x1, 0x1, 0x2}], "89d89cf61234d3ca65214fda5329b4743fb79d33406142d217d97746f93fde23db59391fe83eef3a4f61bc2cb77524654fe0b76a3266388b208c5ec180a776d32989e6697e94ffc79ec71cf9f97df06815d5b95c0da11e5d3576434838f902a37005a69574955d9f833bc7ff075d3f23ea50c66126698582c0e7de8ff60dbd109dfbc87f098a4151f667a1133470264b08cea43fae62779e508a6de2a7ae2984f679f35c373358867f437b10fe90fa51e4c619b438c2", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x866) [ 3258.989232] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 3259.000942] 9pnet: p9_fd_create_unix (18088): problem connecting socket: ./file0: -111 [ 3259.003043] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3259.006754] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3259.010561] mac80211_hwsim: wmediumd released netlink socket, switching to perfect channel medium 18:36:11 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x46) write$binfmt_script(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="2321202e2f4f695265bd469fe6f030f8"], 0xb) fallocate(r0, 0x3, 0x0, 0x18000) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r3 = dup2(r2, r1) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x1, &(0x7f0000000340)=[{&(0x7f0000000180)="7f5af7493ae49eed48a5fe4a2c6289d51785c77a076ddf385df3238800000000726b47a015556f767bc6e316", 0x2c, 0xff}], 0x10018c6, &(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYBLOB="b9073eda8c40823a751a72ac0bebd930f3ede1c7ff5d6691ef43f497c66bee4ecd581f288f707bd235e7c2cf18a17542b62ba88f1121d775e20ad0942c1485abefe4d28928ab80ce77c9f96f9abe8268e632128b5f232684d68331304dc02c19f98dd071fde5d3f330c5ed82e3e1826c427777f55e67e490bdb0a74cea3d3f5606493d8f5e1108066c80d7710714c2e06709"]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) 18:36:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:36:11 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:36:11 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e74e578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:36:11 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x3f, 0x7fffffff}]}) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) close_range(r0, r0, 0x0) write(r0, 0x0, 0x0) dup2(r0, r0) 18:36:11 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) [ 3259.251722] 9pnet: p9_fd_create_unix (18104): problem connecting socket: ./file0: -111 18:36:11 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='#&xfile0\n'], 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000140)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) [ 3259.277341] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' 18:36:12 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3259.303803] 9pnet: p9_fd_create_unix (18107): problem connecting socket: ./file0: -111 [ 3272.429704] 9pnet: p9_fd_create_unix (18123): problem connecting socket: ./file0: -111 [ 3272.446494] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' 18:36:25 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:36:25 executing program 4: perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x1) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2321202e2f66b9ece1ef7b42ef696c65300a"], 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:36:25 executing program 2: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_BINARY(0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000000)={0x0, 0x4}) 18:36:25 executing program 6: r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = dup(r0) getdents64(r1, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r1, 0x0, 0x0) ioctl$FIGETBSZ(r1, 0x2, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef", 0x3a, 0x400}], 0x8010, &(0x7f0000000080)=ANY=[]) 18:36:25 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:36:25 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) r5 = dup(0xffffffffffffffff) getdents64(r5, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x7, 0x80, 0x4b, 0x40, 0x0, 0x7f, 0x0, 0x4, 0x4004, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x2, @perf_config_ext={0xff, 0x3}, 0x4, 0x1, 0x5e, 0x0, 0x7, 0x8001, 0x3, 0x0, 0x807, 0x0, 0x3}, 0x0, 0xb, r5, 0x0) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r4, 0x0, 0x7ffffff9) 18:36:25 executing program 7: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000300), 0x90101, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000340), 0xd}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote, r3}, 0x14) setsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000000)={@local, @multicast1}, 0xc) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000700)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)={[{@subsystem='freezer'}]}) preadv(0xffffffffffffffff, &(0x7f00000002c0)=[{0x0}], 0x1, 0x61bf, 0x2) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r4 = fsmount(r0, 0x1, 0x71) openat(r4, &(0x7f0000000680)='./file0\x00', 0x1, 0x100) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r6 = dup(r5) getdents64(r6, &(0x7f0000001d00)=""/4085, 0xff5) sendmsg$nl_generic(r6, &(0x7f0000000880)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000840)={&(0x7f0000006300)={0x22d0, 0x2, 0x2, 0x70bd2d, 0x25dfdbfb, {0xa}, [@typed={0xfffd, 0x31, 0x0, 0x0, @uid}, @generic="64d186a42745ffd27883624a860309d996e04f8c8ff374f9a660d44e6df26ee3d9c2087b6c66ca2e0626971c", @nested={0xc, 0x1e, 0x0, 0x1, [@typed={0x8, 0x7e, 0x0, 0x0, @uid=0xffffffffffffffff}]}, @generic="a52bb7a82ed58abed310bd83fc15f6a1f609b0d233c3264f5b55a7576971448c1a6c3c0b57ab446aff58c9a1d2971cdd4a6212f220ffa2eeeaa258b14d32000745c33bfceaea9d61bc8ba4d980e845497cff90", @generic="fae07cda19081ee59197cc0e043c8deef115029bdc97bb46d5c97971f97dbd3adde01c7893f43e83472513019adf3bb84ead65e7bf515d854f8d79d495de51d8b6db30bec05faa482ad30c569f78c87cb1e6038b6b3a7e880eb60aa2dc3f931cf1bde942c2482dd97d23a2aff275f2eb37831ee7788c8fb2daf0d438bba1f84b38fd7a0765601991f7c2cfa9ab", @nested={0x111c, 0x37, 0x0, 0x1, [@generic="a176a9979c40695dce31f08c4f73b30e76d4fadf5c713d410080086bb1a9533f0a1960c474d6ae8b48737e8820897623eac6d53d14a11a2bed8af3d54d12ecc0b98142f99ba02fc05492063e7ca8b8b7bfeaf497e06986f4be92e965d7967ff6f69a0801aa58cbe73f839bff3b2a1351483fe6d4a6a09ea4cf429e0a493cc4480fc988c7bb08ef2ac0f9facedb5fa2a075a033125e12ec433ff38d2ee2d46aabbe1d4618d279e0803a22b1fdb2a3774ea0175c1d8f500b754232bee41863a3ab16d7cd8b0c3570495c26d4127fc1bf43fce5e1eede0c8faf4b7baadd4d52d4975f39e199cfd116", @typed={0x8, 0x33, 0x0, 0x0, @u32=0x7ff}, @generic="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", @typed={0x8, 0x91, 0x0, 0x0, @ipv4=@loopback}, @generic="f594e3b86220e42f97ad9ea8f19d5e950e83d0e2b7b84efc9305058e281644333d"]}, @nested={0xc, 0x58, 0x0, 0x1, [@typed={0x8, 0x1a, 0x0, 0x0, @pid=0xffffffffffffffff}]}, @typed={0x14, 0x32, 0x0, 0x0, @ipv6=@empty}, @nested={0x101c, 0x47, 0x0, 0x1, [@typed={0x1004, 0x87, 0x0, 0x0, @binary="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"}, @typed={0x5, 0x59, 0x0, 0x0, @str='\x00'}, @typed={0x4, 0x2d}, @typed={0x8, 0x1e, 0x0, 0x0, @fd}, @typed={0x0, 0x47}]}, @generic="1d3ec0dd141918459f934d7d59319b716b5f1682f1841a7a0409fdf485f3938d25d9a0b09e850f3c6fd5066882d66ab1b09b3140403935b0a9d91aa0de147c6f367e24e2"]}, 0x22d0}, 0x1, 0x0, 0x0, 0x800}, 0x4) mount(&(0x7f00000000c0)=@filename='./file0\x00', &(0x7f0000000180)='./file1\x00', &(0x7f0000000200)='autofs\x00', 0x362801, &(0x7f0000000240)='.\x00') stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000a40)=ANY=[@ANYRES32, @ANYBLOB='\b\x00;\x00', @ANYRES32=r7, @ANYBLOB="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"], 0x1e8}}, 0x4008040) 18:36:25 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) mount$bind(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000a00)='./file0\x00', &(0x7f0000000a40), 0xc000, 0x0) [ 3272.469536] 9pnet: p9_fd_create_unix (18125): problem connecting socket: ./file0: -111 18:36:25 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r2, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xffffffffffffff9c) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 3272.616792] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3272.618646] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3272.630885] 9pnet: p9_fd_create_unix (18153): problem connecting socket: ./file0: -111 18:36:25 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7f}, 0x48050, 0x0, 0x0, 0x0, 0x80000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000400)={[{@jqfmt_vfsv0}], [{@obj_type}]}) 18:36:25 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:36:25 executing program 2: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BTRFS_IOC_DEV_INFO(0xffffffffffffffff, 0xd000941e, &(0x7f0000000500)={0x0, "e1281fdfa31618d48bbf4fb072788677"}) sendmsg$AUDIT_MAKE_EQUIV(r0, 0x0, 0x450745c438580058) r1 = openat$cgroup_ro(r0, &(0x7f0000000040)='memory.events\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wg2\x00'}) r2 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f00000002c0)='devices.allow\x00', 0x2, 0x0) fsetxattr$security_capability(r2, &(0x7f0000000300), &(0x7f0000000340)=@v2={0x2000000, [{0x1, 0x5}, {0x6e1, 0x1}]}, 0x14, 0x3) sendfile(0xffffffffffffffff, r0, 0x0, 0x694) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r0, 0x40049366, &(0x7f0000000080)=0x2) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="08000b040000000014000200fc001c0000002300e1ffff7f0000bebc"], 0x64}, 0x1, 0x0, 0x0, 0x4000004}, 0x20040941) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f00000003c0)={0xa4, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@nested={0x8e, 0x76, 0x0, 0x1, [@typed={0x14, 0x14, 0x0, 0x0, @ipv6=@private0={0xfc, 0x0, '\x00', 0xfe}}, @generic="ddaaade17280337baec6a998aa42496dc15f0a77c5080167d94193906dd2c1fc2f342d2df8c92768eb8e7d8ac9fa81e48d2d34fa57a73c5b95bc20772180b1ae436f1b720c64797e24dfea8e9409f63ae3c531fceffbab4c85acbe26db351ff20fef4b5846dc249737fe712ea8e24634fb914cb2bd5e"]}]}, 0xa4}}, 0x0) syz_io_uring_setup(0x68dd, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) r6 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000040)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r6, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0, 0x40000021}, 0x0) syz_io_uring_setup(0x6e1f, &(0x7f0000000140)={0x0, 0xccc2, 0x1, 0x2, 0x3db, 0x0, r1}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f00000000c0), &(0x7f00000001c0)=0x0) r8 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r8, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) syz_io_uring_submit(r4, r7, &(0x7f0000000380)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x5, 0x0, r8, 0x0, 0x0, 0x0, 0x42, 0x1, {0x1}}, 0x1) [ 3272.754691] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' 18:36:25 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$inet(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x404c008) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000040)=0x9, 0x4) r2 = dup(r1) getdents64(r2, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r2, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e24, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}, 0xffffff68}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000001940)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=[@hopopts_2292={{0x18}}, @hopopts_2292={{0x18}}], 0x30}}], 0x2, 0x0) 18:36:25 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:36:25 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3272.788643] EXT4-fs (loop6): VFS: Can't find ext4 filesystem [ 3272.797474] 9pnet: p9_fd_create_unix (18163): problem connecting socket: ./file0: -111 18:36:39 executing program 0: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r3 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r3, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(r0, 0x82307202, &(0x7f0000001700)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r6 = dup2(r5, r4) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r7, r6, 0x0, 0x7ffffff9) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000340)='./file1\x00', 0xb15, 0x6, &(0x7f00000015c0)=[{&(0x7f0000000380)="84eecc2eae2dcc9e08f82bbafd0c", 0xe, 0x100000001}, {&(0x7f00000003c0)="d5c168a91eb7d5bb0c5843cd75b0556e3cf90aa124d89f138a4aa8627acf85", 0x1f, 0x4d3ae78a}, {&(0x7f0000000400)="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", 0x1000, 0xf3}, {&(0x7f0000001400)="643dc9a39d5b610bbf3a8b6a050b2ab3bbe5ee26458c3c3d26e5c356ded39fb9eb55ddb42aa7a5b1e460f55f1c621197e3c4472fba3195d83c7382a762b92d64547b68c911b658a9582b52da1409", 0x4e, 0x401}, {&(0x7f0000001480)="21811117571b421085174eebc1d3a6045ffc16638e25b7139d91cb06d10779c62a4f18c9fb456114965ca7ceff029d3809de3372fae6ab953c2731535770aca33868c32c79fbb0c57dd773552f7a2eb96790d3e835ba26773e4f17f6e723f35f8f0b0dd988a221102d4da95ffb7af117e47b4cfd2e96a80d0d53350bd61ed8101cc91e5fba", 0x85, 0x80000001}, {&(0x7f0000001540)="188c5ee33e74e2d5cfb3d3a75ca79ce9b65c243793e5e8bc40736824b41627f9a4d037dd824613cd067513ed07256185cea73d0d4b5b50b557633e49ed7fb006da545d0a6db7d898afb8d8997788b2a22e25fd", 0x53, 0x7fff}], 0x2101004, &(0x7f0000001680)={[{@uni_xlate}], [{@seclabel}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@uid_gt={'uid>', r2}}]}) getdents(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001980)={0x3, 0x80, 0x3c, 0x7, 0x33, 0x3f, 0x0, 0xe8, 0x85080, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_bp={&(0x7f0000001940), 0x4}, 0x4048, 0x7, 0x0, 0xd, 0x3, 0x5, 0x60a, 0x0, 0x3, 0x0, 0xb8f}, 0x0, 0xd, 0xffffffffffffffff, 0x1) 18:36:39 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000700)=ANY=[@ANYRES16]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x103, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) creat(&(0x7f00000002c0)='./file1\x00', 0x5) 18:36:39 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0xe5, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:36:39 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:36:39 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:36:39 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000340)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="05000000000000000000aa1e28cf5d095358", @ANYRES32=r2, @ANYBLOB="080026007b09000008009f0004000000"], 0x2c}}, 0x0) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x891b, &(0x7f0000000000)={'erspan0\x00'}) 18:36:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) clone3(&(0x7f00000008c0)={0x1840100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = dup(r0) getdents64(r1, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r1, 0x0, 0x0) readv(r1, &(0x7f00000005c0)=[{&(0x7f0000000180)=""/151, 0x97}, {&(0x7f0000000240)=""/159, 0x9f}, {&(0x7f0000000040)=""/53, 0x35}, {&(0x7f0000000300)=""/97, 0x61}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/4096, 0x1000}, {&(0x7f0000000380)=""/42, 0x2a}, {&(0x7f0000000400)=""/180, 0xb4}, {&(0x7f00000004c0)=""/139, 0x8b}, {&(0x7f0000000580)=""/52, 0x34}], 0xa) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) fsconfig$FSCONFIG_SET_PATH(0xffffffffffffffff, 0x3, 0x0, &(0x7f00000000c0)='./file1\x00', 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000140), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='tra\"<=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',\x00']) 18:36:39 executing program 6: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x4) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000003c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r1, &(0x7f0000000240)) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000000c0)=ANY=[@ANYBLOB="19000000160011cd000100"/20], 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r5 = dup2(r4, r3) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) pwrite64(0xffffffffffffffff, &(0x7f00000002c0)="f3362b2aa5b218ed5504c9695a55f8e7624ec6156da6ef0f307dd4e4dc63e5c39c790b402f41a17ce2f0db796e2b337b23013e84be99eba563c2527504ba5ef70aa0d012253e5146a87117ccdaec39634a01dc001b20cc64ab2a925c8559bedbecdde1c9d7bd9371ae751fa3cd751e163c98a0346a9c0351a602e0f30fff96a640bb98bfbe67b2cc8c9ac28350d84d7436e953378d096b6126778433d1603e3f14da1868c8d902cf6298bef583c799295ee87064efad5caebb88b932cb395d37acdbf1d42367feb9626d9011e3e1af79359791791877adf5be8fbba283637cab8fa51c02df", 0xe5, 0x7fffffff) sendfile(r6, r5, 0x0, 0x7ffffff9) [ 3287.145561] 9pnet: p9_fd_create_unix (18196): problem connecting socket: ./file0: -111 [ 3287.215244] 9pnet: p9_fd_create_unix (18212): problem connecting socket: ./file0: -111 [ 3287.229695] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:36:40 executing program 2: getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=ANY=[@ANYBLOB="ff0065727400000000000000"], &(0x7f0000000340)=""/106, 0x6a) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0xbe66f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x2030}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) io_uring_enter(r0, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x785a59ed]}, 0x8) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x2f2}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200), &(0x7f0000000140)) io_uring_enter(r1, 0x3e77, 0x3f74, 0x3, &(0x7f0000000180)={[0x7ff]}, 0x8) r2 = signalfd4(r1, 0x0, 0x0, 0x100800) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) accept4$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000240)=0x14, 0x1c0800) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1001, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) io_uring_enter(0xffffffffffffffff, 0x9e3, 0x761c, 0x0, &(0x7f0000000000)={[0x8]}, 0x8) recvmmsg(r3, &(0x7f0000000000), 0x5ac, 0x0, 0x0) 18:36:40 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000001c0)={0x1d, 0x1c, 0x0, 0x12, 0x4, 0x8f6, 0x3}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x40000001, 0x0, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3000011, r1) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0xa, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x5, 0xffffffffffffffff) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) getsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) pkey_mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x3000004, 0xffffffffffffffff) ioctl$sock_inet_SIOCSIFBRDADDR(r0, 0x891a, &(0x7f0000000180)={'netdevsim0\x00'}) [ 3287.382960] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:36:40 executing program 5: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r2 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000ac0)=ANY=[@ANYBLOB="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"]) unlinkat(r1, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) openat$cgroup_ro(r2, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) r5 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r6 = dup(r5) openat(r6, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1004000, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r4, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcon|ext=root,\x00']) r7 = openat(r0, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r7, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r8, &(0x7f0000000200)='./file0\x00', 0x86) [ 3287.411989] 9pnet: p9_fd_create_unix (18233): problem connecting socket: ./file0: -111 18:36:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:36:40 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0xfd, 0x0, 0x0, 0x0, 0x5e, 0x80004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0x178b2e9b}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000400)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="2321202e2f66690004000028bf81434828095a52c2076755a2b7fddd645c4119178c9fd7cf826400792cfac291d3f65134"], 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000340)=ANY=[@ANYBLOB="8475a83cc0bb081a3554809650d050db0b56149a2bf3320fde285bbc8a965dbca397ea7fed7d4017899ed4e94a468ad9569364265956c762fb77205b344995ab6202c8713a7fba4d623f2cda641afb5837895558590ebd30de38b042a529070d5f6459600e0492c122e2b8a5f3c262b2d4c077a4baf7cd7d7ec0f533ae1bb244a99445cf6e81227fd9a88f4354a512c2956fe91d359da8b82dc6c2191d4e8a9411abd0de6f8c41c4", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:36:40 executing program 7: ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xfffffcee}}, './file0\x00'}) r1 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r2 = dup(r1) getdents64(r2, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r2, 0x89f3, &(0x7f00000000c0)={'gretap0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB='syztnl2\x00\x00\x00\x00\x00\x00\x00\"U', @ANYRES32=0xffffffffffffffff, @ANYBLOB="0080000700000008000000094d5700340065000003299078e000000100000000862000000002020e737460d577c783fc4991871c0604feaf02084a796abb0232"]}) r4 = openat2(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x400040, 0x50, 0x12}, 0x18) r5 = syz_io_uring_setup(0x653f, &(0x7f0000000240)={0x0, 0xeec1, 0x4, 0x0, 0x294, 0x0, r4}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f00000002c0)=0x0, &(0x7f0000000300)=0x0) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) r9 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x3000004, 0x810, r5, 0x0) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) getdents(0xffffffffffffffff, 0x0, 0x0) syz_io_uring_setup(0x591a, &(0x7f00000003c0)={0x0, 0x2bbd, 0x20, 0x2, 0x119}, &(0x7f0000800000/0x800000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000440), &(0x7f0000000480)) syz_io_uring_submit(r9, r7, &(0x7f0000000380)=@IORING_OP_ASYNC_CANCEL={0xe, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, {0x0, r10}}, 0x8) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x3, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r8}}, 0x1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r8}}, 0x7f) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_FALLOCATE={0x11, 0x0, 0x0, @fd_index=0xa, 0x5, 0x0, 0x1f, 0x0, 0x0, {0x0, r8}}, 0xfffffffa) syz_io_uring_submit(r6, 0x0, &(0x7f0000000340)=@IORING_OP_READ_FIXED={0x4, 0x1, 0x4007, @fd_index=0x2, 0x10001, 0xd35, 0x7fff, 0x0, 0x0, {0x3, r8}}, 0x7fff) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000180)={'gretap0\x00', &(0x7f0000000100)={'syztnl0\x00', r3, 0x8, 0x700, 0x2, 0x4a18, {{0xd, 0x4, 0x0, 0x24, 0x34, 0x67, 0x0, 0xff, 0x4, 0x0, @multicast2, @local, {[@cipso={0x86, 0x15, 0x0, [{0x2, 0xf, "1deb2dc6aaae22eb076952eebd"}]}, @lsrr={0x83, 0xb, 0x93, [@rand_addr=0x64010100, @initdev={0xac, 0x1e, 0x1, 0x0}]}]}}}}}) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x404, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000110}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 3287.554938] 9pnet: p9_fd_create_unix (18240): problem connecting socket: ./file0: -111 [ 3287.571697] EXT4-fs (loop6): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:36:40 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) openat(r0, &(0x7f0000000140)='./file1\x00', 0x12040, 0x16) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0xa, &(0x7f0000001a00)=[{&(0x7f0000000480)="e08e27c46a9f156a6bafe4e331c47ab04133a250d2c6122121f6b5f8315e8f51d2dea9a2d267e61cc2eba03dfe87aa7a53c8ee655dd94d5561a0ba444af0e11f9119b8b61ad570000a19bc1187d781223e73f9612a3d50800f23c9686ccd88523957a0d0f90f1d6eccd26d9200d4cd3b81250ca299a6cba7624826174125624d446aa3abb01ce6f23dc28efded3ea78044b4a0eecf9641b9", 0x98, 0xffffffffffffffff}, {&(0x7f0000000540)="f0b52b0057227e5b23f43a3da5b8a88e66310d1a4ccb332a211c02b25a00913c3547c155aff079be5df78e52c8798f7a", 0x30}, {&(0x7f0000000580)="faa19e3ade91655db78917aa14e13eb4f03bc4894fe9ecce2c616149bb862b31c9b95aec93ce70be286c048c3fbc807f55abf7df0bd3ab06d94e5ca8feb38b6c4f1705879889c5acc5fbfcc817723b57f7ff3582eda5f255fb743bea4b82e91ce2cd3dfa4d946299e4", 0x69, 0x1}, {&(0x7f0000000600)="4a877d4249383c0924ba17a89b1e3aa685a1b3c63319840b24ed0e81817fbef71f54c360dc8e858a1e2b38a8274f9b54dc46c9730eeb81d64c389b0c3de2b48434d73970515bd1e0abdc63966ea17ce076cecc6fd3868f0e3b63c2624ffa0e53bd91f6fd05f5f9b310ba5fba2fd165c1563bdcfb310a3e4fc2de8bef0f30811db9a16ecb400880028406c9621ef5bd862845538f07597d11c3370e747bd539aba95ff3594e31830942", 0xa9, 0x4186}, {&(0x7f00000006c0)="cec8e921df19de472c79e1dfc6d84e3b747571c64536a64a69b07f6c1f83d415321f8ec64f30c227a11c66add2887799dffc06b37e0a96448f1fb466566530bb9c8294892514816a470c48aa39556bf4642d11d4300dd8bef31ac4db9df6934a76ee49d5eab3e2db133b34a511348696f8f893344d57905f534891df191609bc913b1dd65dfdd5db7a8f35b817c7e607719696fc291426", 0x97, 0x4}, {&(0x7f0000000780)="927dba423df071c49519b143117dea8f8bddf7ab07b14cae5d248d8d4a8f62e05b5f69d37d4bec675a30b33eefd48e28a96efc05d879d0e8eb2e89b5fc298002c8850d666bcd47eeaa75123bdbb0c4ead4517d4601fd5577d7fc431117f3b729a7a767fbf3b3faf7efdf2549a903de273a5a3d867177871126f893f7ac0b00e3da00967506aefb8cf8fbf959293ec9171227deabaf09a78fbf6773eb85614e70c2552b455abe3c96b4aa26cdd4a5a11aef80a48951c1ea875e3df0733d11649442ffc2d5ec39403499187a749a1a8694d69e1e22f5", 0xd5, 0xffffffffffffff80}, {&(0x7f0000000880)="17bc1f20bda459304a20a7d18fa089df4e99f6618391194a99e7205d64ab188554c2349bd42f7a97f78ff0c265bf7a916417dbb6f64c61ab896d3038ece9a8f433eca1973ec62b9f5b2fdfa34b846ae3264037edee5e9c772510827f4f93cb1a579cb75a7edc24b26bf529113e3a3100b9721ae1df4716aaaa8519178f1c517f905aa8d70c543c6018da27f65264d485ae26ad9c60ae036e59b11eb08b0b003fba236b657bd5345613013629151566ac6eaf1b0916788ab4c5ef16f0", 0xbc, 0x9}, {&(0x7f0000000940)="815bbd7240b5033a3cad972fc042ca1186ae4e9c821b65dcd5ce", 0x1a, 0x80000001}, {&(0x7f0000000980)="8daa31dbc8cf8ab6d25204e9b2cfb774349c326fe67e02c8fae0ba9e5baa08beade84553e66efefdf54c7a0c33b19b1c26712364c78eafc786f6f6ee0f0a3579f60cb62dcc032f2c", 0x48, 0x4ed}, {&(0x7f0000000a00)="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", 0x1000, 0xfff}], 0x10218c6, &(0x7f0000001b00)=ANY=[@ANYRESDEC]) r5 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r5, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) getsockopt$inet_IP_XFRM_POLICY(r5, 0x0, 0x11, &(0x7f0000000340)={{{@in=@multicast1, @in=@dev}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000440)=0xe8) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r4, 0x0, 0x7ffffff9) 18:36:40 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:36:40 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:36:40 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2321202e2f66696c65300a93d6d22015fe72251d58054205e3623007aa123efb057d3a506a7986f16ff98174928ab32da5e9c7a9f56b58a3b4c72a0f2c23d4de660387a6327ef719d468cbb1c786ddf767185999a6bf8077f604e155beaf61c10faf8bba557fb018"], 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f00000003c0)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981efb073b40c15e683478d311908d8e5597d3c30579fc13507cd8394c5b6b906a8b1cb9007d8de5d96ce24f013bc9a480898378c3aa1775eaca905b9161884a98779398c8c788bef86f8a5031956c07af3b632913fa4f005493d92f767b5861aeaa", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:36:40 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) keyctl$set_timeout(0xf, r1, 0x0) r2 = getegid() setgid(r2) keyctl$chown(0x4, r1, 0xee01, r2) pwrite64(r0, 0x0, 0x0, 0xd1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6e6f6d626c6b5f696f5f7375636d697c2ce572c5d233e8b24f56fb4159448eed890409b7e8d933ba91e2cdc6c312"]) [ 3287.710781] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:36:40 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000700)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) openat(r1, &(0x7f00000006c0)='./file1\x00', 0x0, 0x42) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB="2c727f6f74636f6e746578743d3f0000002c00"]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) open(&(0x7f00000002c0)='./file1\x00', 0x20000, 0x81) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:36:40 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f0000000080), 0x0, 0x0) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$invalidate(0x15, r1) keyctl$set_timeout(0xf, r1, 0x0) r2 = getegid() setgid(r2) keyctl$chown(0x4, r1, 0xee01, r2) pwrite64(r0, 0x0, 0x0, 0xd1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xfffffffffffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f0000", 0x16, 0x2100}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="6e6f6d626c6b5f696f5f7375636d697c2ce572c5d233e8b24f56fb4159448eed890409b7e8d933ba91e2cdc6c312"]) 18:36:40 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3287.823522] EXT4-fs (loop7): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3287.826999] 9pnet: p9_fd_create_unix (18272): problem connecting socket: ./file0: -111 [ 3287.880093] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3287.936429] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3288.015746] cgroup2: Unknown parameter 'ÖZº ïg < 8«@/¶C‚*–€–s58m‘Ÿ½›R' [ 3288.041582] 9pnet: p9_fd_create_unix (18272): problem connecting socket: ./file0: -111 18:36:54 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x6) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:36:54 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000001bc0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="667265656665722c78617474b534243f0700de720600"]) 18:36:54 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file2\x00', 0x106) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r2, 0xffffffffffffffff, 0x0, 0x7ffffff9) 18:36:54 executing program 2: ioctl$MON_IOCX_GET(0xffffffffffffffff, 0x40189206, &(0x7f00000000c0)={&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000040)=""/71, 0x47}) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000001200)=ANY=[@ANYBLOB="580100001a0001000000000000000000000000000000000000000000000000000000000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0xee01, @ANYBLOB="ac1414aa00000000000000000000000000000000330000000000000000000000000000000000000000000000000000000000000000000000b6660000000000000000000000000000000000000000000000000000000000000000008d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a00000092000000000000004c14007368613235360000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000001c001700"/272], 0x158}}, 0x0) 18:36:54 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3302.133866] cgroup: Unknown subsys name 'freefer' 18:36:54 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x74) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB]) 18:36:54 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:36:54 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000a00)='./file1\x00', 0x0, 0x1, &(0x7f0000000b00)=[{&(0x7f0000000a40)="250d0dfdec9b5a9f1edb1b63a085d8f7896e7614e4ad40c0b89ac29644187d2dd1642b225a494675f98b389de04f4e7fcb930ea4cda934f077d961355f0cdffc09fd99b0525addeb40563af43fc0fa901e5182bc7f5c1907ab58ab9052cb53148d6c87610a3436ea3c98ea6c173175c1b558ee236692ad98e02a2f999b3ec5830139d7cd2bf71ed1d0b440190aefb39b002859", 0x93, 0x401}], 0x1080004, &(0x7f0000000b40)={[{@dots}, {@dots}, {@dots}, {@fat=@sys_immutable}, {@dots}, {@dots}], [{@euid_gt={'euid>', 0xee01}}, {@hash}, {@fsuuid={'fsuuid', 0x3d, {[0x63, 0x0, 0x65, 0x62, 0x37, 0x31, 0x36, 0x64], 0x2d, [0x34, 0x30, 0x32, 0x31], 0x2d, [0x30, 0x0, 0x66, 0x62], 0x2d, [0x64, 0x64, 0x5c, 0x31], 0x2d, [0x33, 0x61, 0x38, 0x43, 0x38, 0x65, 0x32, 0x35]}}}, {@dont_measure}]}) mkdirat(r2, &(0x7f0000000bc0)='./file0\x00', 0x8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r5 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r5, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r4, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r6, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r7, &(0x7f0000000200)='./file0\x00', 0x86) [ 3302.152470] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.2'. [ 3302.254821] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3302.265001] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 3302.295989] 9pnet: p9_fd_create_unix (18323): problem connecting socket: ./file0: -111 [ 3302.372469] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 3302.373985] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3302.389424] 9pnet: p9_fd_create_unix (18326): problem connecting socket: ./file0: -111 18:37:10 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000400)=ANY=[@ANYRESDEC=r0, @ANYBLOB="05c88c8147854c576ef20ba54ed245856ba21fff6a5c9209ac46adebc621035e32b307c2bf123c903a9bb1bee7b82f089e66953c02a4e03199d70a5a2a3aac85115d38300bbf03ea2b131a2e87d3747ee5203b3415a5db5ac06c022869ea9b4b85760c74481e251b5ddb3c93ac6a70232cadfe72a6714f478c41a2c7a5f6c0", @ANYRES64, @ANYRES16=r2], 0xb) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000340)={'security\x00', 0x0, [0x5, 0x4, 0x0, 0x6, 0x9]}, &(0x7f0000000140)=0x54) fallocate(r2, 0x3, 0x0, 0x18000) bind$inet(r2, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r5 = dup2(r4, r3) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r6, r5, 0x0, 0x7ffffff9) 18:37:10 executing program 2: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x6) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:37:10 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000ec0)=ANY=[@ANYRES32=r1]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f00000002c0)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) getdents(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x24e000, 0x100) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) 18:37:10 executing program 6: r0 = mq_open(&(0x7f0000000100)=']\x00', 0x81, 0xbf, &(0x7f0000000140)={0x200, 0x7, 0x4, 0x9}) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000180)={r0, 0x8, 0x8001, 0x1}) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, r1) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@l2={0x1f, 0x0, @none}, &(0x7f0000000080)=0xfffffffffffffe9b) io_cancel(0x0, &(0x7f00000000c0)={0x0, 0x4, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0, 0x1}, 0x0) r2 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r3 = dup(r2) getdents64(r3, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r3, 0x0, 0x0) r4 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r4, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r3, 0xc018937e, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r4, @out_args}, './file0\x00'}) 18:37:10 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) socketpair(0x0, 0x800, 0x7fffffff, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_GETFSMAP(r6, 0xc0c0583b, &(0x7f0000000340)={0x0, 0x0, 0x5, 0x0, '\x00', [{0x8, 0x5, 0x1, 0xc, 0x5, 0x7}, {0x6, 0x101, 0xffffffffffff697a, 0x6, 0x8, 0x400000000}], ['\x00', '\x00', '\x00', '\x00', '\x00']}) 18:37:10 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:37:10 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x6, 0x80, 0xd3, 0xe0, 0x0, 0xe5, 0x0, 0x5, 0x0, 0xa, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8e, 0x0, @perf_bp={&(0x7f00000000c0), 0x9}, 0x42010, 0x7, 0x2, 0x5, 0x6, 0x80, 0x1, 0x0, 0x4, 0x0, 0x100}, 0x0, 0x1, 0xffffffffffffffff, 0x1) r2 = dup3(r1, r0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000000)) syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x0) dup(0xffffffffffffffff) ioctl$KDGETLED(r2, 0x4b31, &(0x7f0000000040)) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r3, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x4e24, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00', 0x1ff}) write(r3, &(0x7f00000001c0)="da9bceb68c61dee4da1d72c49ee25123274c0e85d7aa5833f41f00fb0701c152cdc9c7f4d3399d21e3c12899aaa70a56f5aaf5eda02d6cd33a366a9af8d75ed4da4cc48e953c88e26758bbea0a4576725245c2127359a71c58a725d11e6e03c8c458344339648cee52a55b17a95cc610a38ed25f48a683cbf2694bc46b104485a93777023f3c572a5cd278ae03feb1ba1fdc1cb942e403d045920ec7c56a1190efb0560256fb3c8e3e9ea06deedf579abbae540674d9503a", 0xb8) ioctl$AUTOFS_IOC_CATATONIC(0xffffffffffffffff, 0x9362, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000080)={0x29, 0x0, 0x15, 0x0, 0x0, 0x2, 0x0, 0xf2, 0x1}) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x40000, 0x0) ioctl$TIOCL_SETSEL(r4, 0x541c, &(0x7f0000000180)={0x2, {0x2, 0x4, 0x7eb, 0x100, 0x80, 0x3}}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0xf154c79f1722d852, 0xffffffffffffffff, 0x10000000) ftruncate(0xffffffffffffffff, 0x0) 18:37:10 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) [ 3317.522851] 9pnet: p9_fd_create_unix (18341): problem connecting socket: ./file0: -111 18:37:10 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/notes', 0x0, 0x0) clone3(&(0x7f0000000400)={0x48600, &(0x7f00000000c0)=0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000140), {0x41}, &(0x7f0000000240)=""/232, 0xe8, &(0x7f0000000340)=""/139, &(0x7f0000000180)=[0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], 0x5, {r0}}, 0x58) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000480)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) close_range(r1, r2, 0x0) fsetxattr$security_selinux(r0, &(0x7f00000001c0), &(0x7f0000000200)='system_u:object_r:scanner_device_t:s0\x00', 0x26, 0x0) [ 3317.624052] 9pnet: p9_fd_create_unix (18355): problem connecting socket: ./file0: -111 [ 3317.733945] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3317.746050] audit: type=1400 audit(1682966230.466:29): avc: denied { relabelto } for pid=18367 comm="syz-executor.6" name="notes" dev="sysfs" ino=99 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scanner_device_t:s0 tclass=file permissive=1 [ 3317.749593] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3317.752047] audit: type=1400 audit(1682966230.467:30): avc: denied { associate } for pid=18367 comm="syz-executor.6" name="notes" dev="sysfs" ino=99 scontext=system_u:object_r:scanner_device_t:s0 tcontext=system_u:object_r:sysfs_t:s0 tclass=filesystem permissive=1 18:37:10 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000a00)='./file1\x00', 0x4, 0x1, &(0x7f0000000b00)=[{&(0x7f0000000a40)="59014ded46801d0fecebb4ed17d51f820f2e7b3c0989e12b67b1940e3d90b147e4a4166f908251e1b92b3ac3a78fdc14cf0dc55ef40bd0c30323bbbed00046829d97b5a7edff7095cc0f713154f560ab373129c4cb1734c15775e0fcbf4af789544bd3301a17576e0aad49c043b5eb0f95196f400e4df2fa9fd3a1b8a3f40cf94464ccece32380d487a3eec5709b769428c40aefb2924f1e22b40159af0ce462d56cc49c9ad1f61d7a5646dbe77dca067a42ae75051d64722c11", 0xba, 0x2}], 0x2018, &(0x7f0000000b40)={[{@shortname_win95}], [{@subj_type={'subj_type', 0x3d, 'ip6gretap0\x00'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0xebd8ac5a9f6d930a, 0x35, 0x36, 0x62, 0x61, 0x39, 0x32, 0x37], 0x2d, [0x55, 0x0, 0x32, 0x36], 0x2d, [0x4de9ec0bb2f8c132, 0x32, 0x66], 0x2d, [0x31, 0x33, 0x32, 0x34], 0x2d, [0x35, 0x36, 0x66, 0x30, 0x65, 0x39, 0x37, 0x39]}}}]}) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) r2 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r2, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r3, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) r4 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) [ 3317.801479] audit: type=1400 audit(1682966230.519:31): avc: denied { read } for pid=18367 comm="syz-executor.6" name="notes" dev="sysfs" ino=99 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scanner_device_t:s0 tclass=file permissive=1 [ 3317.817663] audit: type=1400 audit(1682966230.520:32): avc: denied { open } for pid=18367 comm="syz-executor.6" path="/sys/kernel/notes" dev="sysfs" ino=99 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:scanner_device_t:s0 tclass=file permissive=1 18:37:10 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0xcc, 0x9, 0x75, 0x9, 0x0, 0x800, 0x2a004, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0x4, 0xfff}, 0x10100, 0x5, 0x0, 0x7, 0x8, 0xffffffff, 0x52, 0x0, 0x400, 0x0, 0x3}, 0x0, 0x2, r1, 0xa) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x9, 0x2, 0x8, 0x81, 0x0, 0xffffffff00000000, 0x43400, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x4a, 0x0, @perf_config_ext={0x0, 0x8e38}, 0x40800, 0xfffffffffffffffa, 0xee11, 0x0, 0x1f, 0x8, 0x1000, 0x0, 0x6, 0x0, 0x6}, 0xffffffffffffffff, 0x5, r1, 0x8) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x4004, 0x4, 0x0, 0x0, 0x0, 0x174}, 0x0, 0xffffffffffffffff, r0, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) [ 3317.868079] 9pnet: p9_fd_create_unix (18375): problem connecting socket: ./file0: -111 18:37:10 executing program 6: sendmsg$GTP_CMD_NEWPDP(0xffffffffffffffff, &(0x7f0000003040)={0x0, 0x0, 0x0}, 0x8000) socketpair(0xd, 0x0, 0x0, &(0x7f00000033c0)={0xffffffffffffffff}) sendmsg$NL80211_CMD_CHANGE_NAN_CONFIG(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x60, 0x0, 0x300, 0x70bd2b, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x4, 0x21}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0xff}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x1}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x81}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x8}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x6}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x4}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x6}, @NL80211_ATTR_BANDS={0x8, 0xef, 0xa}]}, 0x60}, 0x1, 0x0, 0x0, 0x4040000}, 0x41) [ 3317.933989] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' 18:37:10 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:37:10 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3317.981072] 9pnet: p9_fd_create_unix (18381): problem connecting socket: ./file0: -111 18:37:10 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000a00)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB="2c726f6f7c636f4c746578743d726f6f752c005dd940d4992b2fb8c2602fd36d674409fd169444425db4c5b313c4e7456e29da3fe1bf2d82a0b634a434db44b04ec161e51f1f1500dfb0277c776353958388cd563dfbfda6719067174a64f60ef8952f8d51c62bcfbbd4436ae17ef6cda32228b4f5ac288040c1d3ffffe5bc01d8f6d46b83bcaab50bdb295847d31328bc6646f7"]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 3318.188503] 9pnet: p9_fd_create_unix (18396): problem connecting socket: ./file0: -111 [ 3318.238597] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3318.258976] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 3318.266723] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3318.278611] 9pnet: p9_fd_create_unix (18402): problem connecting socket: ./file0: -111 18:37:24 executing program 4: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000c0bb0850db0b561442e895cb4ff840981ec9b0d8ae665faaab48541e68f4efae7e1e9f6f8e148a97fcd6d44fed07b96d54b96410f426b7ef09726fb36834b2edacab50ffac82fe701c15441b07e22e5a0f9862ec54e1200077218a272c6907f73a9b8c33867f85bc9f9e51be8b4f1e9cd9bb595ba92d367d393a62d54dea8116da738075398adb9b0c9ca2195e28ac8b0a02dd0a1033fe75342c38950d702aec79931a7b9d1d343143084574f04d1a94c6580b4d31d0be8245841c64a522330eb7cf284cd8e3409489be962567c7681f8c7ce96a8463498f158bc7dd20a1842b6ea2e741681a6322f1e06bad108e69f9949704", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:37:24 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:37:24 executing program 7: r0 = syz_open_dev$vcsn(&(0x7f0000000a40), 0x0, 0x4280) ioctl$int_in(r0, 0x5452, &(0x7f0000000000)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000600)) renameat2(0xffffffffffffffff, &(0x7f0000000540)='./file1\x00', 0xffffffffffffffff, 0x0, 0x3) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x2400, 0x0) ioctl$LOOP_CTL_ADD(r1, 0x4c80, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 18:37:24 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setpipe(r1, 0x407, 0x93) close_range(r0, 0xffffffffffffffff, 0x0) 18:37:24 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @empty}, {0x2, 0x0, @loopback}, {0x2, 0x0, @empty}, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)='sit0\x00'}) fstat(r0, &(0x7f0000000340)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r2 = openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x26c840, 0xe7) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) r6 = socket$inet6_icmp(0xa, 0x2, 0x3a) ioctl$AUTOFS_IOC_EXPIRE_MULTI(r6, 0x40049366, &(0x7f0000000140)=0x1) 18:37:24 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:37:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file1\x00', 0x6, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) r3 = getpgid(0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000a00)={0x0, 0x0}) clone3(&(0x7f0000000a80)={0x2900, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000240), {0xb}, &(0x7f0000000500)=""/142, 0x8e, &(0x7f00000005c0)=""/9, &(0x7f0000000a40)=[0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0, r3, r4], 0x8, {r2}}, 0x58) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r5 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r5, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) r6 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x204140, 0x27) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r6, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r7, &(0x7f0000000200)='./file0\x00', 0x86) 18:37:24 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:37:24 executing program 2: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x0, &(0x7f0000000140)={[{@shortname_mixed}]}) r1 = dup2(r0, r0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r1, 0xc018937e, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, @out_args}, './file0/file0\x00'}) [ 3332.093157] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3332.100192] EXT4-fs (loop6): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:37:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x40, 0x28) r1 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000daf4655f000000000000000001000000000000000b0000000004000008000000d2c200001203", 0x66, 0x400}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='jqfmt=vfsv1']) r2 = dup3(r1, r0, 0x80000) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0xd4, 0x1, 0x8, 0x0, 0x764, 0x2020, 0x4, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, @perf_config_ext={0x2, 0x6}, 0x0, 0x10000, 0x6, 0x4, 0x2b, 0xb, 0x8, 0x0, 0x6, 0x0, 0x4}, 0x0, 0xb, r2, 0x4) 18:37:24 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) syz_mount_image$vfat(&(0x7f00000002c0), &(0x7f0000000a00)='./file1\x00', 0x9, 0x0, &(0x7f0000000a40), 0x100040, &(0x7f0000000a80)={[{@nonumtail}, {@shortname_win95}, {@uni_xlateno}, {@shortname_win95}, {@shortname_lower}, {@nonumtail}, {@uni_xlateno}, {@uni_xlate}], [{@smackfshat={'smackfshat', 0x3d, '}\\{'}}, {@subj_user}, {@subj_type={'subj_type', 0x3d, '\'*\x9d@\x16\\$[\'$'}}, {@obj_type={'obj_type', 0x3d, 'ip6gretap0\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0xffff}}, {@dont_hash}, {@obj_role={'obj_role', 0x3d, 'blkio.bfq.dequeue\x00'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000a40)='./file0/file0\x00', 0x420000, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r4 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r4, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000500)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r3, @ANYBLOB="2c70726976706f72742c6c6f6f73652c616e616d653d9d7f2c6d6d61702c6163636573733d636c69656e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r5, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) mkdirat(r6, &(0x7f0000000200)='./file0\x00', 0x86) [ 3332.150903] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:37:24 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x6, 0x2e) ftruncate(0xffffffffffffffff, 0x1000003) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[@ANYBLOB="200000001e00213d3fb1bccb8bf7b93907"], 0x20}}, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x3, 0xc9, 0x7f, 0x3b, 0x0, 0x0, 0x1, 0x4, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x2}, 0x4, 0x0, 0x1, 0x7, 0x5, 0x3, 0x4a4, 0x0, 0x6, 0x0, 0xdc1}, 0x0, 0xd, r1, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r2, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) openat$vcs(0xffffffffffffff9c, &(0x7f0000000340), 0x400000, 0x0) fstat(r2, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r5 = dup(r4) getdents64(r5, &(0x7f0000001d00)=""/4085, 0xff5) getdents(r5, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001640)={&(0x7f0000000400)={0x1230, 0x25, 0x600, 0x70bd25, 0x25dfdbfe, {0x9}, [@generic="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", @nested={0xc, 0x4d, 0x0, 0x1, [@typed={0x8, 0x76, 0x0, 0x0, @uid=r3}]}, @generic="0ed4052494473d0625001ba3e8c1120391c769c0c0247598472013852657b8ce63e4b95df806ddd7f7c08e72aa2195144ccf9dc1f0c0a6cf95ec2647922ef5b225ecd9b8428442869f0fffc095823b4e5aa324ca8890a7606ca2dae86ac59fa64a90b51fdb5fc40bb02cbc996331fea068b119baacb28f1adef0d05f2ce60bd2fd8a228213d4b057440d72a1e430c0323742d69938823253bb372924f7b36125de5f7260c0fcdec7d2e3706571430d64aad9f76cb0783c7a5c9b0145b6c31836ffec01775e254521e5b397dc03d819c6a1e14deb426e84b2d660da57ed4f5d0e3b5588a081dc08093d", @typed={0xc, 0x34, 0x0, 0x0, @u64=0x4}, @nested={0x117, 0x8a, 0x0, 0x1, [@typed={0x8, 0x60, 0x0, 0x0, @fd=r5}, @typed={0x8, 0xa, 0x0, 0x0, @ipv4=@multicast2}, @typed={0xd, 0x64, 0x0, 0x0, @str='/dev/vcs\x00'}, @generic="15aa78739361f894bb41aac1ab9dc05c85ea4a69cbceda6de1b4e29c4932916014cf53e6a69950afd55fde59d1537c1479e9143a3dcf9c96969d4c5c2bbb9ae6007add233cc2be4c30af7eb9ea8e20360b0b13b2722cb24db1bdfe9cfc2821446707ee7acbd9616f5de96996c4a9570aeae5f97c7baf24d6ea825180c933378f15e8aa61ec9899249aafb5bcbad0f3e000b865cb35a31ad54aabda9e9311474fb32284a74337d62400a5448055477609c7eb0cd2f3a8de57ce5c9d2323b353489fdb6c81213bc33a5d47a562b290365273fd5445032892b1710295e35f037065d3dd321523bbf1a5ee4ddd189416628b65a2c8"]}]}, 0x1230}, 0x1, 0x0, 0x0, 0x4000}, 0x64000) recvfrom(r2, &(0x7f0000000040)=""/217, 0xd9, 0x40012000, &(0x7f0000000180)=@rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x3}, 0x80) connect$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x4e21, @multicast2}, 0x10) unshare(0x48020200) 18:37:24 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'syz_tun\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="26000000000000000000000000000000000000000000000000000000000000000000000000000000000000009b6aa93c69d4e18510868e2ccf90df2a111419fe8c59edbb61f4901a9b2cd3cf49ce041ee65cd30c3dc888a9bf0976f81abe78e79cd3b3691cca50f4151e0d9ad4e9a51ba7f5aa673741cadb7dc0c9712944140945bce9f62df2b60701e81418e3bdfb8cec3a7b1366010d86652ef8702251201012968e48f1110103f47311690c6fcd443fbca518f53e81845a83a4491bad9d63221425a834f5fe2e81c17cf04cecc49b1dbb21b1ea462011f7ffe32eac69c36562aed248c36ea95d61"]}) 18:37:24 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:37:24 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:37:24 executing program 7: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x1f, "77004a6efdff002200000200cdab000245b00f", 0x1}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = socket$inet(0x2, 0xa, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) lseek(r2, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) ioctl$VT_GETMODE(0xffffffffffffffff, 0x5601, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0xe1, 0x0, 0xfd, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x840, 0x0, 0x0, 0x0, 0x100, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r1, r0, 0x0) [ 3332.321454] 9pnet: p9_fd_create_unix (18453): problem connecting socket: ./file0: -111 [ 3332.348949] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 3332.364858] 9pnet: p9_fd_create_unix (18470): problem connecting socket: ./file0: -111 [ 3332.466801] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:37:40 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x900020, &(0x7f0000000900)=ANY=[]) mkdirat(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"]) unlinkat(r0, &(0x7f00000004c0)='./file0\x00', 0x200) symlink(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)='./file0/file0\x00') openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0x40) getsockopt$inet_IP_XFRM_POLICY(r1, 0x0, 0x11, &(0x7f00000003c0)={{{@in6=@initdev, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@loopback}}, &(0x7f0000000280)=0xe8) r3 = openat$cgroup_ro(r1, &(0x7f0000000300)='blkio.bfq.dequeue\x00', 0x0, 0x0) openat(r3, &(0x7f0000000600)='./file0\x00', 0x4a6a02, 0x180) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', &(0x7f0000000240), 0x1000002, &(0x7f0000000a00)=ANY=[@ANYBLOB='trans=unix,access=user,debug=0x0000000000000006,dfltuid=', @ANYRESHEX=r2, @ANYBLOB="2c70726976706f72742c6c6f6f653d9d7f2c6d6d61702c6163636573733d636c56a8f869646e742c646f6e745f6d6561737572652c646f6e745f61707072616973652c616f6e746578743d73797361646d5f752c666f00020000000000008086bab01b690de4b988f8f232bed3e2795e9b9f3d614941071ee26b8de88d64647a64ddc0c2bc6595a613c0549fa429d164efb1b627db0194568ca68a83a8fa51b04fa5fc5ad2b2898392aa6a036d61a8593a0473a9ceffdc30d8330c9bd0a2d682e293f2757af8bb659e76717abaf8897ae5c1f03b5714bb3f4b75913ee85054b7a334f0bc15905097f08f1420a332f291e26574199b665fd6c178dacda3b6b3a1a328e35bb94e78de29d84e5d50e8a1e3a0bb485840305ac0f8f550aed8ac101addb5503c5466a754f0eb49680920d7571fb6b4507dbf736fa5bed6169de243d7e26e18fff339281340a19f094dd7a59558a21fbde4c263316280fe84ad040627de", @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=root,\x00']) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(r4, 0x8983, &(0x7f00000001c0)={0x6, 'ip6gretap0\x00', {0xe6}, 0x200}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = open(&(0x7f0000000180)='./file0\x00', 0x240880, 0x0) r6 = syz_mount_image$nfs(&(0x7f00000002c0), &(0x7f0000000500)='./file1\x00', 0x8, 0x9, &(0x7f00000010c0)=[{&(0x7f0000000540)="cc363bd47d3bfc4c52d157177c066b5eecb42d1315c7f5e94a46", 0x1a, 0x5}, {&(0x7f0000000580)="5032fa606aeb759ce15dd6eeb94052728096388e6f93b07388ba402556df41883580d2f1c5438047ddd23686e84060a0fe80faf8c88465236dc322", 0x3b, 0x9}, {&(0x7f0000000c00)="807202535ecb1504cb87178c6941853831d6832d133f1b8aac461aca5b285de74d03f11363e2eb0a2168c699a3b36a525989a8e22d519d9d2f50b8f674e76287f783a2a9d70d5a20c6e6a11266cc605510ea4ee00adcec13bee42297f8462e66f4d233ee1135d5d9d25378f50f7f0a68e1ede77879ad2da87f66bb513bdf075af0c87d413d39bed32702911841476f55baf3a36c5280bd37135f4e81067a01f6dc71e179ccfaba7bc7cd345cdf8bf07f10057f1653f4", 0xb6, 0x100000000}, {&(0x7f0000000cc0)="78d3891a42c36ad10144dadb6b9ea9c349252d1e3ecdeefa7cfc1450028259906301c577fcf814eeec9800e81244d62e484127906a6c51abcd84ecadc442f5f78a26847c707fb7d3bd681e85c8a49ed6ac60eb756fb4072550093e31e68b45715d6c3d7253cfe9c2fe75e338fbc2168dfc5dbf7eab0ced5cd1cb12a41dae5ff2b5c8eac79033820941d2200dce86c57f53170ba345dcc99f3c863bff3c78c5a32119744a3ec17c78d4b42429b879b25478d2ae89d7e677105251ac21", 0xbc, 0x5}, {&(0x7f0000000d80)="49a1c7f28b5780cec30c3adcc2a8153820bd7298fab7c978b069c552624d0a0a30f8d3fad4ae225cc758a2ddd221ad91c15f393f6a60399de4d13f2262d3ed290473507c088ba11fcffd650f38141af247ff05269b3381435f8970a4d1a287729d8126c4895556f85cf6f06105b1ae06534dd62218ee30297202df7b1103c67c24ddbc3ea9c3498a580cb0f7220b9fee7a66bbc54b922fc7d87504f5d0d10ccbd7eb0c9564fb3fc27f83580cdca9ecdbd122c657a40224ccc37983f89760ee2302fef2e9c0", 0xc5, 0x88}, {&(0x7f0000001e00)="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", 0x1000}, {&(0x7f0000000e80)="a28b2ab04c48f55dee2738f956363d9a6b50c7995d621cb4278b3ed5aa2257898d4b25c9a4dee2d2bfb2b953522cb300ee0fb0f2b5c7b431be7352f9ded093620cd7e6078580a5f78f620e913205aff499fb44bb2cf9fcfb0a099079d8ca8ff0d9a43ce8f8468d9fe7e12968e3309283de82cba3ed4fc56e6f5810cd9865baa394dd6b70d4b2963e7dadd63b126370553ad304e1ba1edce72dacd7706870bd", 0x9f, 0x8}, {&(0x7f0000000f40)="cbb67e37a40bf3517c33cabe5d50320e6ae13097151f46b629a5e6164b65c0c3d6dcff28da0111ad9021fe0a1eb4ef185c3c421edd20dec975ba43843c83aea6580d8502c8dc6cc9034773cac9aec59e7de0a39cafb5a232", 0x58, 0x6}, {&(0x7f0000000fc0)="2a5fd588577cff209a84cad7ede97c2f87faa6f013484c36c8a9a72b0737cd6654b59764a3f39f4f3ae1715c37b93a3c24c5a7b39391c2bc80e2ddac0c3c9bece55511d6925fc9c66cff01fc7fe58b97e6110252b2d6e6da671bda8a763fb66954044e94049cdcea8d6c43e71777c5c79ed743b821dfa2feb72ac0f3db2db2113e9df23ada58e2cf16c7750a30cc81f1a006fb3b88923aba59356598091b81d1dd1d13689402f10988a5b3010bd19d9a397a348825620b7d29313e2d6970657c07b17aa73c35367ded", 0xc9, 0x2}], 0x0, &(0x7f00000005c0)={[{'9p\x00'}], [{@subj_type={'subj_type', 0x3d, 'blkio.bfq.dequeue\x00'}}]}) openat(r6, &(0x7f00000011c0)='./file0\x00', 0x24400, 0x8) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x86) 18:37:40 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:37:40 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0xb) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) openat(r1, &(0x7f0000000140)='./file0\x00', 0x800, 0x20c) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:37:40 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:37:40 executing program 2: r0 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r0, 0x0) init_module(&(0x7f00000000c0)='\x00<)\xb6\xea\xe3\x03\xda\xfe\xa2\xa1A3\x1a\x88Lr\x9df\x15\x8f\x84\rh\xaa\x9e\xf8;\xb55b\xedw\x04\xa5\xd6\x0eB\xber1\xb6\xe7\xd0\x1f\x19x\x838\x0f\xb2\x954r\x91\xeb\xe0%iZ\x84\x02\x96\x18M\x8c\xe8\x9a\x0f\x93(\x1a\x02\xd0#G+z\xd7\xa3{\xb6Ug\x00\x00\x00\x00\x00\x00s\x19\xaa\xa9,C\x19\xac-^\xfc\x91G1\x18&\x93\xbe\x1bY\x8eE\x80\xb5@\x9a\x16\x01\xa6\n\xe4\x97\xc1\xd0\x8d\xdb\x7f\xefz\xde\xaaR\x99\xb3\xe3\xe0\x99\xeb\xf2q\xa4\xf7\xaa\x93\xc5\b;#|\x89\xed\xc7\xb0\xa6\xa8\x9b\aj-0\xeb#\x98\xd5\x15\"\x9aq\xd3\xc1\x0e\x11T@\xb7\x9c\xaf\xe2\x18\xd4\x80\xec\xf1\x83\xd9V\xe4\xe5\xe0k64\x89\xe78,\xa8z\xd3/\x1d\xe7B\xf5\xb7\xc5\xa1\xc7\xbb\xc6\xe1,\xca\x19J8', 0xd8, 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000200)) init_module(&(0x7f0000000080)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x26, &(0x7f00000001c0)='{\x00') 18:37:40 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x7, 0x4, 0x2, 0x7f, 0x0, 0x7, 0x40000, 0xe, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x1ff, 0x4}, 0x2056, 0x226, 0x5, 0x2, 0x3, 0x5, 0xff1d, 0x0, 0x10001, 0x0, 0xc8}, 0x0, 0x4, 0xffffffffffffffff, 0x19) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x4) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$LOOP_SET_FD(r0, 0x4c00, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = dup2(r3, r2) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), r0) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000200)=ANY=[]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x40000, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:37:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:37:40 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) [ 3348.156442] 9pnet: p9_fd_create_unix (18499): problem connecting socket: ./file0: -111 18:37:40 executing program 2: futex(0x0, 0x5, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f0000000000)=0x3, 0x100, 0x1, &(0x7f0000000040)={0x77359400}, &(0x7f00000000c0)=0x1, 0xfffffffe) [ 3348.218988] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3348.259073] EXT4-fs (loop6): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3348.262223] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3348.303708] nfs: Unknown parameter '9p' 18:37:41 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xd6, 0x0, 0x0, 0x4000004, 0x2}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) write$binfmt_elf64(r2, 0x0, 0x48) tee(0xffffffffffffffff, r0, 0x400, 0xa) r3 = eventfd(0x1ff) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/consoles\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001f40)=[{&(0x7f0000001e80)=""/181, 0xb5}], 0x1, 0x0, 0x0) connect$inet(r4, &(0x7f0000000280)={0x2, 0x4e22, @empty}, 0x10) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) ppoll(&(0x7f00000001c0)=[{r0, 0xc424}, {0xffffffffffffffff, 0x9530}, {}, {0xffffffffffffffff, 0x18}, {r3, 0x100}, {r1, 0x8}, {r2}, {r4, 0x400}], 0x8, &(0x7f0000000240)={r5, r6+60000000}, &(0x7f0000000280)={[0x4]}, 0x8) r7 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r8, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) bind$inet6(r8, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r8, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$sock_inet6_SIOCDIFADDR(r7, 0x8936, &(0x7f0000000100)={@mcast1, 0x32}) sendfile(r8, r7, 0x0, 0x9bbb) creat(&(0x7f0000000040)='./file0\x00', 0x0) [ 3348.447245] cgroup2: Unknown parameter 'kZ(fÙ` Qñ|Üo£»w:ÃÉ' [ 3348.459857] 9pnet: p9_fd_create_unix (18522): problem connecting socket: ./file0: -111 18:37:41 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) 18:37:41 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3348.528670] nfs: Unknown parameter '9p' 18:37:41 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) ftruncate(r0, 0xffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = fsmount(0xffffffffffffffff, 0x0, 0x88) sendmmsg$inet6(r2, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r3 = openat(r2, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x100000001) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x1080, 0x29, 0x10, 0x70bd26, 0x25dfdbfe, {0x16}, [@typed={0x8, 0x42, 0x0, 0x0, @ipv4=@rand_addr=0x64010101}, @generic="c2bf21ed498607ea12ba0ea55d6c0d6213f61333afde45715919f8019d439fdf25482ccf19bc35263e06603db591832fbb2c75eb344e41721cc9", @typed={0x4, 0x7a}, @nested={0x1010, 0x84, 0x0, 0x1, [@typed={0x8, 0x18, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @typed={0x1004, 0x71, 0x0, 0x0, @binary="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"}]}, @typed={0x14, 0x25, 0x0, 0x0, @ipv6=@mcast2}]}, 0x1080}, 0x1, 0x0, 0x0, 0xd1}, 0x44014) 18:37:41 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000340)={0x2, 0x4e21, @broadcast}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000180)) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="00804886b1655e09966a7e07c44fecf87834ecdbb66502fef69ff0e82950e675813c39669333615802006d95a29c8ce20472c2ac5996ebcb1b3d4462fe59be4c704b17c759b22d78c09367f849dcb8494ee15dcf7d0932dbaed64f8c680c37873c7d65eecdf0eaed8aa6cb52ef5ae7ab35864fec9cb6832dcf658d3b207a59e9d5"]) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x0) r2 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000180)=[{0x0, 0x0, 0x1001000a00}], 0x2800018, &(0x7f0000000240)=ANY=[]) socket$inet(0x2, 0x3, 0x3) mkdirat(r2, &(0x7f0000000000)='./file1\x00', 0x0) fchmodat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x100) ioctl$BTRFS_IOC_LOGICAL_INO(0xffffffffffffffff, 0xc0389424, &(0x7f0000000100)={0x9fcf, 0x30, '\x00', 0x1, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r3 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r4 = dup(r3) getdents64(r4, &(0x7f0000001d00)=""/4085, 0xff5) execveat(0xffffffffffffffff, &(0x7f0000000380)='./file1\x00', &(0x7f0000000440)=[&(0x7f00000003c0)=':\x00', &(0x7f0000000400)='\x00'], &(0x7f0000000580)=[&(0x7f0000000480)=')&[\\]\x00', &(0x7f00000004c0)='vfat\x00', &(0x7f0000000500)='\v:*\'-[#\\\x00', &(0x7f0000000540)='}}\\\x00'], 0x100) getdents(r4, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r0, &(0x7f0000000140)={0x10000018}) connect$inet(r0, &(0x7f0000000080)={0x2, 0x4e20, @local}, 0x10) unshare(0x48020200) 18:37:41 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x46e2, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xd1) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r3 = syz_open_dev$vcsa(&(0x7f0000000140), 0x6, 0x8040) openat(r3, &(0x7f0000000340)='./file1\x00', 0x4001, 0x3) write$binfmt_script(r2, &(0x7f0000000080)={'#! ', './file0'}, 0xb) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) fallocate(r1, 0x30, 0xff, 0x5) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r6 = dup2(r5, r4) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) fchmod(r5, 0x4) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYRES16]) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r7, r6, 0x0, 0x7ffffff9) 18:37:41 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 18:37:41 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x26}}, 0x10) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @private=0xa010102}, 0x10) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000180)=0x4008, 0x4) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmallocinfo\x00', 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendfile(r0, r2, 0x0, 0xffe3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) fcntl$lock(r0, 0x5, &(0x7f00000000c0)={0x2, 0x1, 0xfffffffffffffffd, 0x4, 0xffffffffffffffff}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x77359400}}, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x115) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x12, 0x0, 0x0) [ 3348.805632] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:37:41 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r3 = dup2(r2, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) 18:37:41 executing program 3: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x924) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x80000001, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x6, 0x0, 0x1) [ 3349.021709] FAT-fs (loop6): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 18:37:41 executing program 2: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, &(0x7f0000000040)={0x2, 0x10000}) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x80000, 0x2c, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000700100000f000000000000000000000004000000000002000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d6f4655f000000000000000001000000000000000b0000000004000008000000d2c20100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e33373631313835303700"/192, 0xc0, 0x400}, {&(0x7f0000010100)="000000000000000000000000c7b2a4502ed64a6eb421652eb677bbba010040000c00000000000000d6f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000003800000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0300000004000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="03000000040000000500000017000f000300040000000000000000000f008551", 0x20, 0x800}, {&(0x7f0000010500)="ff010000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d6f4655fd6f4655fd6f4655f00"/2080, 0x820, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d6f4655fd7f4655fd7f4655f00000000000004002000000000000800050000000af301000400000000000000000000000100000030000000", 0x40, 0x1800}, {&(0x7f0000010f00)="20000000681d5748681d574800000000d6f4655f00"/32, 0x20, 0x1880}, {&(0x7f0000011000)="8081000000180000d6f4655fd6f4655fd6f4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000500000000200000004000000520000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d6f4655f00"/160, 0xa0, 0x1c00}, {&(0x7f0000011100)="8081000000180000d6f4655fd6f4655fd6f4655f00000000000001002000000010000800000000000af3020004000000000000000000000002000000600000000200000004000000620000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000d6f4655f00"/160, 0xa0, 0x2000}, {&(0x7f0000011200)="c0410000002c0000d6f4655fd6f4655fd6f4655f00000000000002002000000000000800000000000af301000400000000000000000000000b00000040000000", 0x40, 0x3c00}, {&(0x7f0000011300)="20000000000000000000000000000000d6f4655f000000000000000000000000000002ea00"/64, 0x40, 0x3c80}, {&(0x7f0000011400)="ed4100003c000000d7f4655fd7f4655fd7f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c653100000000000000000000000000000000000000000000000000000097bbe33d00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x4000}, {&(0x7f0000011500)="ed8100001a040000d7f4655fd7f4655fd7f4655f00000000000001002000000000000800010000000af301000400000000000000000000000200000070000000000000000000000000000000000000000000000000000000000000000000000000000000ba8b7ff700000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000", 0xa0, 0x4400}, {&(0x7f0000011600)="ffa1000026000000d7f4655fd7f4655fd7f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3337363131383530372f66696c65302f66696c6530000000000000000000000000000000000000000000008cbe886300000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000", 0xa0, 0x4800}, {&(0x7f0000011700)="ed8100000a000000d7f4655fd7f4655fd7f4655f000000000000010000000000000000100100000073797a6b616c6c65727300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008d33368e00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea040700000000000000000000000000006461746106015403000000000600000000000000786174747231000006014c0300000000060000000000000078617474723200"/256, 0x100, 0x4c00}, {&(0x7f0000011800)="0000000000000000000000000000000078617474723200007861747472310000ed81000028230000d7f4655fd7f4655fd7f4655f00000000000002002000000000000800010000000af30100040000000000000000000000090000008000000000000000000000000000000000000000000000000000000000000000000000000000000072b2bc0c00000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000", 0xc0, 0x4fe0}, {&(0x7f0000011900)="ed81000064000000d7f4655fd7f4655fd7f4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c0ac393e100000000000000000000000000000000000000000000000020000000681d5748681d5748681d5748d7f4655f681d57480000000000000000000002ea04073403000000002800000000000000646174610000000000000000", 0xc0, 0x5400}, {&(0x7f0000011a00)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00lersyzkallersyzkallersyzkallersyzkallers', 0x40, 0x57c0}, {&(0x7f0000011b00)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009403090166696c652e636f6c64000000", 0x80, 0xc000}, {&(0x7f0000011c00)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8030000", 0x20, 0x10000}, {&(0x7f0000011d00)="00000000000400"/32, 0x20, 0x10400}, {&(0x7f0000011e00)="00000000000400"/32, 0x20, 0x10800}, {&(0x7f0000011f00)="00000000000400"/32, 0x20, 0x10c00}, {&(0x7f0000012000)="00000000000400"/32, 0x20, 0x11000}, {&(0x7f0000012100)="00000000000400"/32, 0x20, 0x11400}, {&(0x7f0000012200)="00000000000400"/32, 0x20, 0x11800}, {&(0x7f0000012300)="00000000000400"/32, 0x20, 0x11c00}, {&(0x7f0000012400)="00000000000400"/32, 0x20, 0x12000}, {&(0x7f0000012500)="00000000000400"/32, 0x20, 0x12400}, {&(0x7f0000012600)="00000000000400"/32, 0x20, 0x12800}, {&(0x7f0000012700)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x14000}, {&(0x7f0000012800)="0200"/32, 0x20, 0x14400}, {&(0x7f0000012900)="0300"/32, 0x20, 0x14800}, {&(0x7f0000012a00)="0400"/32, 0x20, 0x14c00}, {&(0x7f0000012b00)="0500"/32, 0x20, 0x15000}, {&(0x7f0000012c00)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000100"/96, 0x60, 0x15400}, {&(0x7f0000012d00)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x18000}, {&(0x7f0000012e00)="0200"/32, 0x20, 0x18400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x18800}, {&(0x7f0000013000)="0400"/32, 0x20, 0x18c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x19000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000100"/96, 0x60, 0x19400}, {&(0x7f0000013300)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x1c000}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="105530a4a5b4ae7d340e5c95ba7aa4c75e8af6bd084c19208924364a90d8a3064a400a8003776a152e19b3c7dfbfbfd60600000000000000b1c987e633bf4814550ca47a9afd497aab0533954dadb0f0a58cbbc573143f411125808cecc73ac340fd9e60fbbfbcc96642ac60c8034a7180cd597d31fa41d2f1fdc4c5e0e8f600"/141]) r1 = open(&(0x7f0000000080)='./file0\x00', 0x2000, 0x121) syz_io_uring_setup(0x68dd, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000140)=0x0) setresuid(0xee00, 0x0, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r4, 0x0) setresuid(0x0, r4, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r5, 0x0) r6 = getuid() setresuid(r5, 0x0, r6) syz_mount_image$ext4(&(0x7f0000000880)='ext3\x00', &(0x7f00000008c0)='./file0\x00', 0x5, 0x4, &(0x7f0000000b00)=[{&(0x7f0000000900)="92e9ffa8e2805388161de76d63be2a1f97838c0d72554e0a8c580a50d6e227019ebd62946f7ca8959055746952587c6fb21ae351b8f9f583a2114ad1ec24c0fd4692fb92ee97ffd4a761fb8798c8496aae7bde52c9e7f6ca8d5c6adbe77e02dc46173999a43cf10d3ddaa174", 0x6c, 0x4e}, {&(0x7f0000000980)="6f278f45d8d86470eacaeb2429aecb7afbc7342e663e26057226e5a180ea2bdb512ca5f0d6ddd7a82433f846aa6005e66d6fdda22e374304a6ff03d91341f06ffa3487d7682115c449e7d109e16651373e8ef692001f92d27062308dc70865c70fe520827ff3c333eb8042c031896c4e8f475e0f4dcc2ba2", 0x78, 0x3f}, {&(0x7f0000000a00)="b78df0160909b378c473ce856175b8c743a733c15b3a582131cc4470b894aa6980f996667e924828d54d2b07b8882055cb5b5f007418b863bab007e635a3b5e8428df5565d154768491a3c", 0x4b, 0x8}, {&(0x7f0000000a80)="ea6594697665e78d0762c6aafcd7cf965d6c32eb6b23cebc9d36f239d837a9530211c0031754dfc5092b4442dc0ad6033902f1c88d6105107ca0e3aa48eb8ff0131fca1ec064bf8c1094cbaaf47bdb294d173ce046bad5c8db58f5", 0x5b, 0x101}], 0x210090, &(0x7f0000000b80)={[{@delalloc}, {@journal_path={'journal_path', 0x3d, './file0'}}], [{@obj_user={'obj_user', 0x3d, '&'}}, {@obj_role={'obj_role', 0x3d, 'ext4\x00'}}, {@seclabel}, {@smackfsfloor={'smackfsfloor', 0x3d, '['}}, {@fsname={'fsname', 0x3d, '$:\'!'}}, {@dont_hash}, {@fowner_gt}, {@fsuuid={'fsuuid', 0x3d, {[0x38, 0x32, 0x31, 0x38, 0x32, 0x30, 0x37, 0x34], 0x2d, [0x34, 0x64, 0x33, 0x65], 0x2d, [0x62, 0x32, 0x37, 0x36], 0x2d, [0x38, 0x31, 0x35, 0x36], 0x2d, [0x65, 0x33, 0x37, 0x66, 0x37, 0x35, 0x61, 0x36]}}}, {@fowner_gt={'fowner>', r5}}]}) r7 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r7, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0, 0x40000021}, 0x0) accept4(r1, &(0x7f0000000740)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @dev}}, &(0x7f00000007c0)=0x80, 0x800) syz_io_uring_submit(r2, 0x0, &(0x7f0000000700)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd=r0, 0x2, &(0x7f0000000640)=""/182, 0xb6, 0x2}, 0x6) r8 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000800)='/proc/self/attr/sockcreate\x00', 0x2, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000840)=@IORING_OP_TEE={0x21, 0x3, 0x0, @fd=r8, 0x0, 0x0, 0x8af, 0x5, 0x1, {0x0, 0x0, r1}}, 0xdb) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000c80)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="06000000f20000050000000000000000121ccde68d097ea1ab884ac29b3c802fc0582604927bed6e3953c5f868e27b4d33914270246717a2367c20f3d22c29fdb1"]) 18:37:41 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3349.199156] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:37:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)={[{@usrjquota}, {@delalloc}]}) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0xc000)=nil, 0xc000, 0x2000002, 0x10, 0xffffffffffffffff, 0x10000000) recvfrom$inet6(0xffffffffffffffff, &(0x7f0000000280)=""/56, 0x38, 0x0, 0x0, 0x0) pkey_mprotect(&(0x7f0000ff4000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000004c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@msize={'msize', 0x3d, 0x380000}}, {@uname={'uname', 0x3d, '#!@-'}}, {@noextend}, {@dfltgid}]}}) open_tree(r1, &(0x7f0000000180)='./file0\x00', 0x8000) socket$inet_udp(0x2, 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x7, 0x6, 0x6, 0x0, 0x4, 0x3, 0x6, 0x7, 0x309, 0x40, 0x325, 0x9, 0x4, 0x38, 0x1, 0xffff, 0x7ff, 0x1ff}, [{0x5, 0x1, 0x7, 0x2, 0x8, 0x5, 0x4, 0xff}, {0x6474e551, 0x100, 0x0, 0x0, 0x2, 0x91, 0x9, 0x3}], "72397842dd1ee185b81a7ac97f843b8c772a6ad26bf8286a2aa67ff49f25d2cd68667c0e67dd69a07edfae7a33456612bf1d2f01e134566926a376117c442b403982cb2df640018f6e1ec3b034cd4293983054726e6cf90026f48bcde8d700b4fb07fbfa61bf376063bc615c91f4154c8f5bf952", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xa24) ioctl$sock_SIOCADDDLCI(0xffffffffffffffff, 0x8980, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) listen(r2, 0x0) openat(r1, &(0x7f0000000200)='./file0\x00', 0x400000, 0x21) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) [ 3349.376126] EXT4-fs (loop3): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue 18:37:42 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20000000000}, 0x0, 0xe, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYBLOB='\n\x00'/11], 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r4 = dup2(r3, r2) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a56149a2b95cb4f01e900"/21, @ANYRES16]) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 18:37:42 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x8800000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(0xffffffffffffffff, 0x4) socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000000240)) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file0'}, 0xb) fallocate(r1, 0x3, 0x0, 0x18000) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0xce) r3 = dup2(r2, 0xffffffffffffffff) getpeername(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f00000000c0)=0x80) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f00000001c0)='./file1\x00', 0x0, 0x0, &(0x7f0000001640), 0x10018c6, &(0x7f0000000180)=ANY=[@ANYBLOB="6a75a83ec0bb0850db0b56149a2b95cb4ff840981e", @ANYRES16]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x0, 0x0) sendfile(r4, r3, 0x0, 0x7ffffff9) 18:37:42 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x200000, 0x26, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000d5f4655fd5f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000000004000008000000d2c20000120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e38323232353731363100"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000091b73ef4b8d944c4be6aeaa0d6c47e6c010040000c00000000000000d4f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000005500000000000000", 0x40, 0x540}, {&(0x7f0000010300)="030000000400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000019000f000300040000000000000000000f002e69", 0x20, 0x1000}, {&(0x7f0000010500)="7f000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d4f4655fd4f4655fd4f4655f00"/8224, 0x2020, 0x2000}, {&(0x7f0000012600)="ed41000000100000d4f4655fd5f4655fd5f4655f00000000000004008000000000000800050000000af301000400000000000000000000000100000010000000", 0x40, 0x4400}, {&(0x7f0000012700)="20000000c4caafbcc4caafbc00000000d4f4655f00"/32, 0x20, 0x4480}, {&(0x7f0000012800)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000030000000", 0x40, 0x4800}, {&(0x7f0000012900)="20000000000000000000000000000000d4f4655f00"/32, 0x20, 0x4880}, {&(0x7f0000012a00)="8081000000180000d4f4655fd4f4655fd4f4655f00000000000001008000000010000800000000000af301000400000000000000000000000200000040000000", 0x40, 0x4c00}, {&(0x7f0000012b00)="20000000000000000000000000000000d4f4655f00"/32, 0x20, 0x4c80}, {&(0x7f0000012c00)="c041000000300000d4f4655fd4f4655fd4f4655f00000000000002008000000000000800000000000af301000400000000000000000000000300000020000000", 0x40, 0x6800}, {&(0x7f0000012d00)="20000000000000000000000000000000d4f4655f000000000000000000000000000002ea00"/64, 0x3e, 0x6880}, {&(0x7f0000000140)="ed4100003c000000d5f4655fd5f4655fd5f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c65310000000000000000000000000000000000000000000000000000005aec127300000000000000000000000000000000000000000000000020000000c4caafbcc4caafbcc4caafbcd5f4655fc4caafbc0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x6c00}, {&(0x7f0000012f00)="ed8100001a040000d5f4655fd5f4655fd5f4655f00000000000001008000000000000800010000000af301000400000000000000000000000100000050000000000000000000000000000000000000000000000000000000000000000000000000000000392c7b8c00000000000000000000000000000000000000000000000020000000c4caafbcc4caafbcc4caafbcd5f4655fc4caafbc0000000000000000", 0xa0, 0x7000}, {&(0x7f0000013000)="ffa1000026000000d5f4655fd5f4655fd5f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3832323235373136312f66696c65302f66696c653000000000000000000000000000000000000000000000d8199c5e00000000000000000000000000000000000000000000000020000000c4caafbcc4caafbcc4caafbcd5f4655fc4caafbc0000000000000000", 0xa0, 0x73fd}, {&(0x7f0000013100)="ed8100000a000000d5f4655fd5f4655fd5f4655f000000000000010000000000000000100100000073797a6b616c6c65727300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004ba95a2c00000000000000000000000000000000000000000000000020000000c4caafbcc4caafbcc4caafbcd5f4655fc4caafbc0000000000000000000002ea040700000000000000000000000000006461746106015403000000000600000000000000786174747231000006014c0300000000060000000000000078617474723200"/256, 0x100, 0x7800}, {&(0x7f0000013200)="0000000000000000000000000000000078617474723200007861747472310000ed81000028230000d5f4655fd5f4655fd5f4655f00000000000002008000000000000800010000000af301000400000000000000000000000300000060000000020000000100000062000000020000000180000062000000000000000000000000000000df980a7e00000000000000000000000000000000000000000000000020000000c4caafbcc4caafbcc4caafbcd5f4655fc4caafbc0000000000000000", 0xc0, 0x7be0}, {&(0x7f0000013300)="ed81000064000000d5f4655fd5f4655fd5f4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c852ae89800000000000000000000000000000000000000000000000020000000c4caafbcc4caafbcc4caafbcd5f4655fc4caafbc0000000000000000000002ea04073403000000002800000000000000646174610000000000000000", 0xc0, 0x8000}, {&(0x7f0000013400)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00lersyzkallersyzkallersyzkallersyzkallers', 0x40, 0x83c0}, {&(0x7f0000013500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c653300000011000000940f090166696c652e636f6c64000000", 0x80, 0x10000}, {&(0x7f0000013600)="0b0000000c0001022e000000020000000c0002022e2e000000000000e80f0000", 0x20, 0x20000}, {&(0x7f0000013700)="00000000001000"/32, 0x20, 0x21000}, {&(0x7f0000013800)="00000000001000"/32, 0x20, 0x22000}, {&(0x7f0000013900)="111fc0d901000000803a0900803a0900000000006e0000000000000005000000", 0x20, 0x30000}, {&(0x7f0000013a00)="0200"/32, 0x20, 0x30400}, {&(0x7f0000013b00)="0300"/32, 0x20, 0x30800}, {&(0x7f0000013c00)="0400"/32, 0x20, 0x10001}, {&(0x7f0000013d00)="0500"/32, 0x20, 0x31000}, {&(0x7f0000013e00)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000400"/96, 0x60, 0x31400}, {&(0x7f0000013f00)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x40000}, {&(0x7f0000014000)="0200"/32, 0x20, 0x40400}, {&(0x7f0000000040)="0300000000000000000000000000000000000000000000000000000000000000c374805edb306d41d2d570b6c794ee049c31735dc353ee840c874f981ee88e81a0c56da8c7b48dac1c13bd5807f11da79da6577256f57ee2d1251ce4d71d2073a3cd5846a8b2b7fc5762daa3a1225e453a", 0x71, 0x40800}, {&(0x7f0000014200)="0400"/32, 0x20, 0x40c00}, {&(0x7f0000014300)="0500"/32, 0x20, 0x41000}, {&(0x7f00000005c0)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000400"/96, 0x60, 0x41400}, {&(0x7f0000014500)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x50000}], 0x0, &(0x7f0000014a00)) [ 3349.491678] Quota error (device loop0): v2_read_file_info: Number of blocks too big for quota file size (112640 > 6144). [ 3349.504856] EXT4-fs warning (device loop0): ext4_enable_quotas:6451: Failed to enable quota tracking (type=0, err=-117, ino=3). Please run e2fsck to fix. [ 3349.518233] EXT4-fs (loop1): mounted filesystem without journal. Opts: usrjquota=,delalloc,,errors=continue [ 3349.525076] EXT4-fs (loop0): mount failed [ 3349.658209] Quota error (device loop0): v2_read_file_info: Number of blocks too big for quota file size (112640 > 6144). [ 3349.667918] EXT4-fs warning (device loop0): ext4_enable_quotas:6451: Failed to enable quota tracking (type=0, err=-117, ino=3). Please run e2fsck to fix. [ 3349.673162] EXT4-fs (loop0): mount failed 2023/05/01 18:37:55 executor 2 failed 11 times: failed to start executor binary: fork/exec /syz-executor.2: permission denied VM DIAGNOSIS: 18:29:58 Registers: info registers vcpu 0 RAX=ffff800000000000 RBX=ffff88801d6c5810 RCX=ffffffff8127ba72 RDX=0000000000000001 RSI=0000000000000004 RDI=ffff88801d6c5810 RBP=1ffff11008b40f42 RSP=ffff888045a079e8 R8 =0000000000000001 R9 =ffff88801d6c5814 R10=0000000000000246 R11=0000000000000001 R12=ffff88801d6c5818 R13=ffff88801d6c5820 R14=ffff88801d6c5898 R15=ffff88801ab19240 RIP=ffffffff816c0ecf RFL=00000287 [--S--PC] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 ffffc90000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007ff129ea7328 CR3=000000000ff48000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=652022746f6f72223d74636361207469 XMM02=3d6c616e696d72657420322e322e302e XMM03=3d656d616e74736f682022646873732f XMM04=40404040404040404040404040404040 XMM05=5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a5a XMM06=20202020202020202020202020202020 XMM07=00000000000000000000000000000000 XMM08=652075253d64692073253d706f000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=d253aa6f4cbb8bd305aaf92ad595f031 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=0000000000000000 RCX=ffffffff8156ac97 RDX=ffff88800e314d40 RSI=ffffffff815f6851 RDI=0000000000000001 RBP=ffffea00006fe980 RSP=ffff8880184679d8 R8 =0000000000000000 R9 =ffffea00006fe987 R10=0000000000000000 R11=0000000000000001 R12=ffffea00006fe988 R13=ffff88800e71c188 R14=dffffc0000000000 R15=00007ff12a432000 RIP=ffffffff814062d0 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000562981601f98 CR3=0000000009626000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=7465677261742e79636e656772656d65 XMM02=73732f6563696c732e6d65747379732f XMM03=00656369767265732e6873732f656369 XMM04=2e2e2e2e2e2e2e2e2e2e2e2e2e2e2e2e XMM05=00005629816542e0000056298164ff60 XMM06=677261742f00006563697665642e3369 XMM07=00000000000000000000000000000000 XMM08=7368746150796c6e4f64616552646e69 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000200000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000