c9a7efd9842c8cc831e18b9df6ca72b74f28c4bf5793f999aa7182040a46b1fbe8322beef198d052e23fed147ea13829825e1bf1345444d7e8e2a0b4b7d5d7df78befcdf67e09a5957491fd3bfb7a68da94378bf604fce5cef972433b367d9fb17b9a2bf4ae27add76f33c50cf131cabb5230c3aeb91bb364bbc79418f9de5114161a89e253a0c573c42b95238699194989767f1a690f3", 0xc5}, {&(0x7f0000001700)="895b597784744b21437166733cfaba7f7b6aecd33fbd6a6ed482a5eaba88d6b9678f11dce3742a61f6e6444207f9e39b9db1c7b8b8b62044167507b28b106d5affde59a1d01b45a08468dcb29500bb518a0b4980ea5fbe1e9a23e89ebde9c36cc443e9d3ccd805cf23295f7f044e13232e80ff71b10b83d4e9ed4ec8828219ac18ae1ba26c9ed975c49cfa19cf707a487d5a34f3bb0809756e33bb8d987eb7bf36cdd3c53ce5290635d2194fea12e9a643186bd15176afd22b97cbb6ddf291e9a4aedc11638e188e3372fbeed0379edf23f6db2bae34ea5885fcc9338a9ee18052fe2d28", 0xe4}, {&(0x7f0000001800)="88c6b4e200dbcb5d58872a9fc33e9ab69a4a7b98f23c69a168d50687040b81a705f99bc77c", 0x25}, {&(0x7f0000001840)="58ce866afdc5a2127d15345dab3792ea61a2a5bc6a33baca75dcd87fabf297cda2eed6d0d639a424a5d26ecb37e9b967433ad37fe65ddb6cc0b703c0f96a2a", 0x3f}, {&(0x7f0000002840)="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", 0x1000}, {&(0x7f0000001880)="66c17c0970f79acb17ca3235f5e75702fcbbc7bbc3f9cac5ccc36cf5ff1913162f37f62752b92600f119cec6c64bf1473c13c77c4415ae8ddc012e0fda5186a330e0bc4368b5e373e083ebee421139775bfb9ed0f2db474fff596678426426", 0x5f}, {&(0x7f0000001900)="6739347c9e06d16c17b343de26b476bc96e273dd58465adeff02f9498c5f5c", 0x1f}, {&(0x7f0000001940)="8a3906c3e155bba4dd4df0870fb965d1c1dd1fa0cbedadc50310b690a8baf5090c4cfdd883146acdfb9399813925b5ccc05cc66bf770e3904274048af2427bf5e097aab3a10684ad2ac83fa8a9fbf96956a165de321e69f8773c9136496c30b2809878b871fe168aac7c25", 0x6b}, {&(0x7f0000003840)="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", 0x1000}], 0x9, &(0x7f0000001a80)=[@hopopts_2292={{0x38, 0x29, 0x36, {0x6, 0x3, '\x00', [@calipso={0x7, 0x18, {0x3, 0x4, 0x3, 0x400, [0x2, 0x8]}}]}}}, @rthdr={{0x68, 0x29, 0x39, {0x2f, 0xa, 0x0, 0x5, 0x0, [@remote, @loopback, @mcast2, @ipv4={'\x00', '\xff\xff', @local}, @mcast1]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x50f5ce37}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x5}}, @hopopts={{0x20, 0x29, 0x36, {0x33, 0x0, '\x00', [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}}}], 0xf0}}, {{&(0x7f0000001b80)={0xa, 0x4e21, 0x4, @mcast2, 0x200}, 0x1c, &(0x7f0000001f40)=[{&(0x7f0000001bc0)="261ba446b7a90aee903d2a8464ebb43b98a29f649e35bc5d0687b5bc76dbdb0c30", 0x21}, {&(0x7f0000001c00)="aa3b66dd651057e4d50f56eb17ca0cc290a11a003a770b25ed5a026cce552c487fc9564f427b6b0e816146ed3dfe2d63830c7c4d0a4abefd49f5e0b8aad16eb8207e74127b8eb24b307fadb421c2ec1b725b", 0x52}, {&(0x7f0000001c80)="83d5daf10c631023e4a38bb384bd1cd886501756cd4f2ae8a2518583d9dcf44bff594556c95e8fcbc0b393af04f6748b9763e4b6d08c9b8aa14763b78aa932582b2c553e5c5461d10b02142e3ce7171b5f20eaacc9a043938d333f53450cff354806cb658d85a67a5a8f55361689d866d5464a61a4f1dfbf39867b45b82b5859d1b7d562533965595a9b9b49bd3d71c305fe648f949aa47348961c14d99b3bc77619eaea5eded6ccef33a15904b872f26044c4604785ef44541c231ee831f8928375d131ecc72885d9b9c0f69b7793f13c2a79e50c8d3df5b283d1b5c5eda8ff499654745c840834039ebae0a094670833c63a", 0xf3}, {&(0x7f0000001e00)="2355b46f9de806a92deb6595f8db80f04968cc3914ad320e436691df33c76657d177dcb1b3bd5bb987fda501738806bc827fe33da548bffb698469d936ad8ac45f373e165062cd02c3747cf85d98e70ca26e120f21fa936f531d2b7ff9e64c59dd251a1513b7720c37f231265b692a390d51", 0x72}, {&(0x7f0000001e80)="b96e6ef8121285d4ee9294a57c446fd8207f5d81f36333f0f1c230e91180742c49f5a5dac9a5a9c8b4531101136099fa39d17c596830afcdfdc9b952a05aa94280738f4d9a704973e8c72e61c720cb9c959ddcf6d5e96ab9120da3c59124437378c98afaafe3d161740331", 0x6b}, {&(0x7f0000001f00)="93abb0548f245c7e4b5278", 0xb}], 0x6, &(0x7f0000001fc0)=[@tclass={{0x14, 0x29, 0x43, 0x3}}, @pktinfo={{0x24, 0x29, 0x32, {@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}], 0x40}}, {{&(0x7f0000002000)={0xa, 0x4e24, 0x4, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x4}, 0x1c, &(0x7f0000002100)=[{&(0x7f0000004840)="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", 0x1000}, {&(0x7f0000002040)="47b73d231e79b3bea24c7de09acc15a7944365d86f7a85080adda9b0840c6bdcdaf70a5300428feaa8a8f1f39c6b36ac15fe9975beedec37a4f2bc7cfed12d6a4d7348881bf28b4c6e5230bdf59d869b098e058b955873b9f5703f74c5f9a2bfc3feb2f5dc081359b7fc51255cbef892ac708068bad00d1cabe54953a59255a387b8b5d03e4809b53d957a8304a2333f5a5802bbf0f8b0a0ae1c1f765f937198281a1a48e8ea6212d181e1872ffcd9b5a538167607cf", 0xb6}], 0x2, &(0x7f0000002140)=[@pktinfo={{0x24, 0x29, 0x32, {@loopback}}}, @hopopts_2292={{0x50, 0x29, 0x36, {0x6c, 0x6, '\x00', [@calipso={0x7, 0x10, {0x0, 0x2, 0x3, 0x81, [0x7]}}, @pad1, @calipso={0x7, 0x20, {0x0, 0x6, 0x4, 0xfce6, [0x9, 0x9, 0x8]}}]}}}], 0x78}}, {{&(0x7f00000021c0)={0xa, 0x4e21, 0x3ff, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x7}, 0x1c, &(0x7f0000002400)=[{&(0x7f0000002200)="2a9324698d859bb68550a431bffde5e2b892e8adb4d65fdb89f58855222a00d0d8c091dab5cb4c80a6706fb3611312ed0765cd45680e263cccef2b9b01570691d3fe5db7bb483ae65992a494e7a399d35efc567ac988e99443bd6996625672e6860543b7f082ddfcf7b02975540afa8394ae668a20b6dfbde96588f015e0a1d79035728307e228fd108f35a80161896bffe4f3bc1482f59f8616b78f9b29703be4eac42932b352100fd3249cb9ed66c4e95dc76a811dcd13c8634284732fd6380f828767144eb90f20b8a2b7c7", 0xcd}, {&(0x7f0000002300)="d8429ead7dc2af1bf0f3b78f7200bfeda7852d9c15484d9111b7f9330d2e6e22", 0x20}, {&(0x7f0000002340)="6ef9d53532d2c114cf6ee4f1c1968535e6536a9e10b81455500658753c437e67610fc80841e7263dc046536a76867346fb", 0x31}, {&(0x7f0000002380)="5ee1f03dcd7d92e6893e12d8e6f629c88e36a07ee5041657be160e1469fcb0c66460eb68df5aa4a383716eca725f4f8ba0bfc80d299df2804284e309c157a480f4e843fff9800aff64da2270796405807671b69e15adf9fcb6ff928093f46d292846", 0x62}], 0x4, &(0x7f0000002440)=[@dontfrag={{0x14, 0x29, 0x3e, 0xffff}}], 0x18}}], 0x9, 0x4000040) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xa, 0x10, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xf88c) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ethtool(&(0x7f0000002740), 0xffffffffffffffff) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmsg$ETHTOOL_MSG_EEE_SET(r4, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r5, @ANYBLOB="011582b8fe000000000000000000090000000c0001800be13fdd1b00c56cf27e5e595ea05d015b75a0eca2a5849d45fbf40287aabfbbbc70d78e6f46310b52663464dd0b25ae978e98bfee8e25bfc663772aa0652f6a9b0480383c5c2f3813058f5eb5de3c5b406e8f72e328f7e0020b00f0fa13baa895b09ab87fbdd5c01df8777e26e392cdc9c96bd89b948ac7da36884eb7949116309033a4af5bd2532d2cba8e1563203281e8a24f01ad65ecb6c6f4223a15db1e8ee3e8f8723b6835d343f86d9f8526d40e680e6ae59451b13e46e8d3239c937b63b385cd797917343ee764ec6db4ca2d5a94aaed", @ANYRES32=r7, @ANYBLOB], 0x20}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r2, 0x89fa, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'ip6tnl0\x00', 0x0, 0x2f, 0x0, 0x7, 0x1b, 0x11, @private2, @local, 0x8, 0x8, 0x3, 0x4}}) 02:36:24 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x25, 0x1cd8}}]}}) 02:36:24 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x102, 0x0) (fail_nth: 91) 02:36:24 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(0x0, 0x0) [ 1675.571353] 9pnet: Insufficient options for proto=fd [ 1675.622339] FAULT_INJECTION: forcing a failure. [ 1675.622339] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1675.623640] CPU: 1 PID: 18082 Comm: syz-executor.0 Not tainted 5.10.199 #1 [ 1675.624401] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1675.625289] Call Trace: [ 1675.625583] dump_stack+0x107/0x167 [ 1675.625983] should_fail.cold+0x5/0xa [ 1675.626424] _copy_from_user+0x2e/0x1b0 [ 1675.626868] __copy_msghdr_from_user+0x91/0x4b0 [ 1675.627378] ? __ia32_sys_shutdown+0x80/0x80 [ 1675.627863] ? __lock_acquire+0x1657/0x5b00 [ 1675.628376] ___sys_recvmsg+0xd5/0x200 [ 1675.628803] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1675.629342] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1675.629910] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1675.630405] ? trace_hardirqs_on+0x5b/0x180 [ 1675.630876] ? lock_acquire+0x197/0x470 [ 1675.631314] ? find_held_lock+0x2c/0x110 [ 1675.631754] ? __might_fault+0xd3/0x180 [ 1675.632200] ? lock_downgrade+0x6d0/0x6d0 [ 1675.632666] ? io_schedule_timeout+0x140/0x140 [ 1675.633199] do_recvmmsg+0x24c/0x6d0 [ 1675.633612] ? ___sys_recvmsg+0x200/0x200 [ 1675.634075] ? lock_downgrade+0x6d0/0x6d0 [ 1675.634536] ? ksys_write+0x12d/0x260 [ 1675.634963] ? wait_for_completion_io+0x270/0x270 [ 1675.635482] ? rcu_read_lock_any_held+0x75/0xa0 [ 1675.636006] ? vfs_write+0x354/0xa70 [ 1675.636420] __x64_sys_recvmmsg+0x20f/0x260 [ 1675.636910] ? ksys_write+0x1a9/0x260 [ 1675.637337] ? __do_sys_socketcall+0x600/0x600 [ 1675.637846] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1675.638430] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1675.639010] do_syscall_64+0x33/0x40 [ 1675.639419] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1675.640015] RIP: 0033:0x7efd37293b19 [ 1675.640432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1675.642466] RSP: 002b:00007efd34809188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1675.643307] RAX: ffffffffffffffda RBX: 00007efd373a6f60 RCX: 00007efd37293b19 [ 1675.644113] RDX: 0000000000000300 RSI: 00000000200068c0 RDI: 0000000000000003 [ 1675.644900] RBP: 00007efd348091d0 R08: 0000000000000000 R09: 0000000000000000 [ 1675.645703] R10: 0000000000000102 R11: 0000000000000246 R12: 0000000000000002 [ 1675.646506] R13: 00007ffd8678098f R14: 00007efd34809300 R15: 0000000000022000 [ 1675.916815] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1675.917428] print_req_error: 6 callbacks suppressed [ 1675.917438] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1675.919069] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1675.919603] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1675.920708] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1675.921240] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1675.922323] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1675.922879] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1675.923959] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1675.924493] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1675.925568] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1675.926114] blk_update_request: I/O error, dev sr0, sector 2096901 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1675.927198] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1675.927770] blk_update_request: I/O error, dev sr0, sector 2096902 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1675.928893] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1675.929440] blk_update_request: I/O error, dev sr0, sector 2096903 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1675.931652] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1675.932743] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1675.933526] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1675.934608] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1675.935395] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1675.936192] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1675.936979] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1675.937761] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1675.938532] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1675.939314] Buffer I/O error on dev loop4, logical block 2096903, async page read [ 1675.963439] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1675.964088] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1675.965268] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1675.965869] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1675.966977] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1675.967625] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1675.968570] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1675.969488] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1675.970398] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1675.971315] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 02:36:39 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(0x0, 0x0) 02:36:39 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = getegid() fchownat(r2, &(0x7f0000000040)='./file0\x00', 0xee00, r3, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x2120, &(0x7f0000001980)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001e00)=""/4112, 0x1000}, {&(0x7f00000011c0)=""/219, 0x129}, {&(0x7f00000017c0)=""/147, 0x8d}], 0x3, 0x400625, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000140)={0x0, @broadcast, 0x4e24, 0x2, 'rr\x00', 0x0, 0x2, 0x37}, 0x2c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)='./file0\x00', &(0x7f0000001440), 0x100000, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:36:39 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x102, 0x0) (fail_nth: 92) 02:36:39 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x2c, 0x1cd8}}]}}) 02:36:39 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:36:39 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:36:39 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "8fa26d6492245ab2c4b2804da276d13b80d6eab731469ef9bd0bd6682f9e0f183009df520ebabe821c9b00d346ccc20828be94fe69407a15053824a6258f96486c0bb31ccac6220be6e4d98329e1bc353ffbde84b1a7b5ead8d77596f4037616d5800509dec7554bdb41197e466643fbcba5f2b0809e0a36800cf0c8c10bff5e61e7ccfb75b4a266a9d1310c0fef7649df2905ffa29534d9db1759a2d718d137309c601822cb64a19452b20388f852c4a21013a11c6f094964fc119a918a11dd68ee0c756635919af6fc1f2ba2e26d1f57a88d98226a2443498c8178b3ccb82cae834c01282312063cbe896bfdb6e96a24c116f81389f50032173a92fb17d1", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:36:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwritev(r0, &(0x7f0000001140)=[{&(0x7f0000000080)="f2", 0x1}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r0, 0xc0505405, &(0x7f0000000280)={{0xffffffffffffffff, 0x1, 0x6, 0x1, 0x5}, 0x100000001, 0x3f, 0xfffffffffffff800}) r2 = openat$incfs(r0, &(0x7f0000000000)='.log\x00', 0x800, 0x0) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x2, 0x235, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r3, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r3, 0x0) sendmsg$DEVLINK_CMD_PORT_GET(r2, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="020027bd7000ffdbdf2505000000080001007063690011000200303030303a30303a31302e300000000008000300010000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000300030000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008000300000000000e0001006e657464657673696d0000000f0002006e657464657673696d3000000800030000000000"], 0xb0}, 0x1, 0x0, 0x0, 0x4090}, 0x94) [ 1690.008660] FAULT_INJECTION: forcing a failure. [ 1690.008660] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1690.011199] CPU: 1 PID: 18128 Comm: syz-executor.0 Not tainted 5.10.199 #1 [ 1690.012605] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1690.014300] Call Trace: [ 1690.014837] dump_stack+0x107/0x167 [ 1690.015599] should_fail.cold+0x5/0xa [ 1690.016400] _copy_from_user+0x2e/0x1b0 [ 1690.017221] __copy_msghdr_from_user+0x91/0x4b0 [ 1690.018164] ? __ia32_sys_shutdown+0x80/0x80 [ 1690.019065] ? __lock_acquire+0x1657/0x5b00 [ 1690.019974] ___sys_recvmsg+0xd5/0x200 [ 1690.020790] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1690.021793] ? lock_downgrade+0x6d0/0x6d0 [ 1690.022642] ? lock_acquire+0x197/0x470 [ 1690.023447] ? find_held_lock+0x2c/0x110 [ 1690.024287] ? __might_fault+0xd3/0x180 [ 1690.025095] ? lock_downgrade+0x6d0/0x6d0 [ 1690.025957] do_recvmmsg+0x24c/0x6d0 [ 1690.026727] ? ___sys_recvmsg+0x200/0x200 [ 1690.027568] ? lock_downgrade+0x6d0/0x6d0 [ 1690.028455] ? ksys_write+0x12d/0x260 [ 1690.029284] ? wait_for_completion_io+0x270/0x270 [ 1690.030312] ? rcu_read_lock_any_held+0x75/0xa0 [ 1690.031293] ? vfs_write+0x354/0xa70 [ 1690.032086] __x64_sys_recvmmsg+0x20f/0x260 [ 1690.033000] ? ksys_write+0x1a9/0x260 [ 1690.033814] ? __do_sys_socketcall+0x600/0x600 [ 1690.034772] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1690.034791] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1690.034816] do_syscall_64+0x33/0x40 [ 1690.034837] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1690.034850] RIP: 0033:0x7efd37293b19 [ 1690.034870] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 02:36:39 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1690.034880] RSP: 002b:00007efd34809188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1690.034901] RAX: ffffffffffffffda RBX: 00007efd373a6f60 RCX: 00007efd37293b19 [ 1690.034911] RDX: 0000000000000300 RSI: 00000000200068c0 RDI: 0000000000000003 [ 1690.034922] RBP: 00007efd348091d0 R08: 0000000000000000 R09: 0000000000000000 02:36:39 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(0x0, 0x0) [ 1690.034933] R10: 0000000000000102 R11: 0000000000000246 R12: 0000000000000002 [ 1690.034944] R13: 00007ffd8678098f R14: 00007efd34809300 R15: 0000000000022000 [ 1690.041596] 9pnet: Insufficient options for proto=fd [ 1690.103312] 9pnet: p9_fd_create_tcp (18230): problem connecting socket to 127.0.0.1 02:36:39 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}, 0x22}]}}) 02:36:39 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x102, 0x0) (fail_nth: 93) 02:36:39 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:36:39 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = getegid() fchownat(r2, &(0x7f0000000040)='./file0\x00', 0xee00, r3, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x2120, &(0x7f0000001980)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001e00)=""/4112, 0x1000}, {&(0x7f00000011c0)=""/219, 0x129}, {&(0x7f00000017c0)=""/147, 0x8d}], 0x3, 0x400625, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000140)={0x0, @broadcast, 0x4e24, 0x2, 'rr\x00', 0x0, 0x2, 0x37}, 0x2c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)='./file0\x00', &(0x7f0000001440), 0x100000, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:36:39 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x2a, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:36:39 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1690.283912] FAULT_INJECTION: forcing a failure. [ 1690.283912] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1690.286417] CPU: 1 PID: 18249 Comm: syz-executor.0 Not tainted 5.10.199 #1 [ 1690.287813] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1690.289505] Call Trace: [ 1690.290044] dump_stack+0x107/0x167 [ 1690.290790] should_fail.cold+0x5/0xa [ 1690.291581] _copy_from_user+0x2e/0x1b0 [ 1690.292411] __copy_msghdr_from_user+0x91/0x4b0 [ 1690.293356] ? __ia32_sys_shutdown+0x80/0x80 [ 1690.294249] ? __lock_acquire+0x1657/0x5b00 [ 1690.295136] ___sys_recvmsg+0xd5/0x200 [ 1690.295926] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1690.296927] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1690.297992] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1690.298894] ? trace_hardirqs_on+0x5b/0x180 [ 1690.299772] ? lock_acquire+0x197/0x470 [ 1690.300579] ? find_held_lock+0x2c/0x110 [ 1690.301399] ? __might_fault+0xd3/0x180 [ 1690.302193] ? lock_downgrade+0x6d0/0x6d0 [ 1690.303028] ? io_schedule_timeout+0x140/0x140 [ 1690.303963] do_recvmmsg+0x24c/0x6d0 [ 1690.304732] ? ___sys_recvmsg+0x200/0x200 [ 1690.305570] ? lock_downgrade+0x6d0/0x6d0 [ 1690.306415] ? ksys_write+0x12d/0x260 [ 1690.307198] ? wait_for_completion_io+0x270/0x270 [ 1690.308182] ? rcu_read_lock_any_held+0x75/0xa0 [ 1690.309119] ? vfs_write+0x354/0xa70 [ 1690.309878] __x64_sys_recvmmsg+0x20f/0x260 [ 1690.310748] ? ksys_write+0x1a9/0x260 [ 1690.311515] ? __do_sys_socketcall+0x600/0x600 [ 1690.312451] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1690.313509] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1690.313535] do_syscall_64+0x33/0x40 [ 1690.313556] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1690.313568] RIP: 0033:0x7efd37293b19 [ 1690.313587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 02:36:39 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = getegid() fchownat(r2, &(0x7f0000000040)='./file0\x00', 0xee00, r3, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x2120, &(0x7f0000001980)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001e00)=""/4112, 0x1000}, {&(0x7f00000011c0)=""/219, 0x129}, {&(0x7f00000017c0)=""/147, 0x8d}], 0x3, 0x400625, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000140)={0x0, @broadcast, 0x4e24, 0x2, 'rr\x00', 0x0, 0x2, 0x37}, 0x2c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)='./file0\x00', &(0x7f0000001440), 0x100000, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) [ 1690.313596] RSP: 002b:00007efd34809188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1690.313616] RAX: ffffffffffffffda RBX: 00007efd373a6f60 RCX: 00007efd37293b19 [ 1690.313627] RDX: 0000000000000300 RSI: 00000000200068c0 RDI: 0000000000000003 [ 1690.313637] RBP: 00007efd348091d0 R08: 0000000000000000 R09: 0000000000000000 02:36:39 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1690.313647] R10: 0000000000000102 R11: 0000000000000246 R12: 0000000000000002 [ 1690.313658] R13: 00007ffd8678098f R14: 00007efd34809300 R15: 0000000000022000 02:36:39 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = getegid() fchownat(r2, &(0x7f0000000040)='./file0\x00', 0xee00, r3, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x2120, &(0x7f0000001980)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001e00)=""/4112, 0x1000}, {&(0x7f00000011c0)=""/219, 0x129}, {&(0x7f00000017c0)=""/147, 0x8d}], 0x3, 0x400625, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000140)={0x0, @broadcast, 0x4e24, 0x2, 'rr\x00', 0x0, 0x2, 0x37}, 0x2c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)='./file0\x00', &(0x7f0000001440), 0x100000, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) [ 1690.314763] 9pnet: Insufficient options for proto=fd [ 1690.337295] 9pnet: p9_fd_create_tcp (18246): problem connecting socket to 127.0.0.1 [ 1690.446897] 9pnet: p9_fd_create_tcp (18354): problem connecting socket to 127.0.0.1 02:36:39 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}, 0x38}]}}) [ 1690.498474] 9pnet: p9_fd_create_tcp (18366): problem connecting socket to 127.0.0.1 [ 1690.534614] 9pnet: Insufficient options for proto=fd [ 1690.770173] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1690.771293] print_req_error: 22 callbacks suppressed [ 1690.771311] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1690.777726] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1690.779927] buffer_io_error: 6 callbacks suppressed [ 1690.779938] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1690.792810] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1690.793929] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1690.796407] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1690.797547] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1690.799922] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1690.801058] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1690.803390] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1690.804514] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1690.806884] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1690.807998] blk_update_request: I/O error, dev sr0, sector 2096901 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1690.810362] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1690.811500] blk_update_request: I/O error, dev sr0, sector 2096902 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1690.814024] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1690.815198] blk_update_request: I/O error, dev sr0, sector 2096903 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1690.817478] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1690.819591] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1690.821116] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1690.822631] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1690.824175] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1690.825713] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1690.827224] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1690.828781] Buffer I/O error on dev loop4, logical block 2096903, async page read [ 1690.854315] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1690.855529] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1690.857438] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1690.858674] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1690.860932] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1690.862311] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1690.863850] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1690.865337] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1690.867195] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1690.868511] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 02:36:54 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) 02:36:54 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:36:54 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = getegid() fchownat(r2, &(0x7f0000000040)='./file0\x00', 0xee00, r3, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x2120, &(0x7f0000001980)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001e00)=""/4112, 0x1000}, {&(0x7f00000011c0)=""/219, 0x129}, {&(0x7f00000017c0)=""/147, 0x8d}], 0x3, 0x400625, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000140)={0x0, @broadcast, 0x4e24, 0x2, 'rr\x00', 0x0, 0x2, 0x37}, 0x2c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)='./file0\x00', &(0x7f0000001440), 0x100000, 0x0) umount2(&(0x7f0000000080)='./file0\x00', 0xb) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:36:54 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:36:54 executing program 4: ftruncate(0xffffffffffffffff, 0x8) r0 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc4}, &(0x7f0000000200)={0x0, "f038779de021f8c8c974dd89170cf2579d1fa459ba726003d07140eeb342b87ae631f7a548867a29f29fd1637ddac658a709b49b093393d0e1c7391515c7ab7c"}, 0x48, 0xfffffffffffffffe) keyctl$chown(0x4, r0, 0xee01, 0xee00) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000980)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000940)={&(0x7f00000008c0)={0x68, 0x0, 0x1, 0x101, 0x0, 0x0, {0x5, 0x0, 0x9}, [@CTA_TUPLE_REPLY={0x44, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x3}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @remote}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}]}, @CTA_HELP={0x10, 0x5, 0x0, 0x1, {0x9, 0x1, 'syz0\x00'}}]}, 0x68}, 0x1, 0x0, 0x0, 0x80}, 0x20000000) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000540)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000440)={0x0, "9b55f610ffe7b9856842eb69443042b20caac33d7dda6ec6986b177fa13c2bd2c68577ea852c8bb47f31ee549b6a921e231ef07ee0f7fca620564faeeeafa440"}, 0x48, 0x0) getsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x24, &(0x7f00000004c0)={@multicast1, @broadcast}, &(0x7f0000000500)=0x8) r2 = add_key$keyring(&(0x7f0000000040), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r3 = add_key$user(&(0x7f0000000a40), &(0x7f0000000a80)={'syz', 0x1}, &(0x7f0000000300)="a3", 0x1, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000000)=@keyring={'key_or_keyring:', r3, 0xa}) request_key(&(0x7f0000000240)='.request_key_auth\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f0000000380)='dns_resolver\x00', r2) add_key$keyring(0x0, &(0x7f0000000440)={'syz', 0x3}, 0x0, 0x0, 0x0) add_key$fscrypt_provisioning(&(0x7f0000000000), &(0x7f0000000140)={'syz', 0x3}, &(0x7f0000000580)=ANY=[@ANYBLOB="02000000000000000102030405060708090a0b0c0d0e07101112131415161718191a1bc4451e1f20212223242526272c292a2b32333435363723c8081953e7c5383b3a3b3c3d3e3f40000000000000"], 0x48, r1) add_key$keyring(&(0x7f0000000340), &(0x7f00000003c0)={'syz', 0x3}, 0x0, 0x0, r0) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000004c0), 0x0, 0x800) preadv(0xffffffffffffffff, &(0x7f0000000880)=[{&(0x7f0000000640)=""/251, 0xfb}, {&(0x7f0000000740)=""/9, 0x9}, {&(0x7f0000000780)=""/27, 0x1b}, {&(0x7f00000007c0)=""/150, 0x96}], 0x4, 0x5, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x100, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x2}, 0x0, 0x8, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000ac0)={0x17412c500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 02:36:54 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) (fail_nth: 1) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:36:54 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x4c, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:36:54 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x102, 0x0) (fail_nth: 94) [ 1705.057794] FAULT_INJECTION: forcing a failure. [ 1705.057794] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1705.060170] CPU: 1 PID: 18483 Comm: syz-executor.0 Not tainted 5.10.199 #1 [ 1705.061603] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1705.063231] Call Trace: [ 1705.063779] dump_stack+0x107/0x167 [ 1705.064530] should_fail.cold+0x5/0xa [ 1705.065314] _copy_from_user+0x2e/0x1b0 [ 1705.066098] __copy_msghdr_from_user+0x91/0x4b0 [ 1705.067051] ? __ia32_sys_shutdown+0x80/0x80 [ 1705.067919] ? __lock_acquire+0x1657/0x5b00 [ 1705.068833] ___sys_recvmsg+0xd5/0x200 [ 1705.069618] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1705.070638] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1705.071680] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1705.072608] ? trace_hardirqs_on+0x5b/0x180 [ 1705.073475] ? lock_acquire+0x197/0x470 [ 1705.074280] ? find_held_lock+0x2c/0x110 [ 1705.075111] ? __might_fault+0xd3/0x180 [ 1705.075930] ? lock_downgrade+0x6d0/0x6d0 [ 1705.075951] ? io_schedule_timeout+0x140/0x140 [ 1705.075984] do_recvmmsg+0x24c/0x6d0 [ 1705.076010] ? ___sys_recvmsg+0x200/0x200 [ 1705.076028] ? lock_downgrade+0x6d0/0x6d0 [ 1705.076055] ? ksys_write+0x12d/0x260 [ 1705.076088] ? wait_for_completion_io+0x270/0x270 [ 1705.076110] ? rcu_read_lock_any_held+0x75/0xa0 [ 1705.076126] ? vfs_write+0x354/0xa70 [ 1705.076150] __x64_sys_recvmmsg+0x20f/0x260 [ 1705.076171] ? ksys_write+0x1a9/0x260 [ 1705.076190] ? __do_sys_socketcall+0x600/0x600 [ 1705.076214] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1705.076232] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1705.076256] do_syscall_64+0x33/0x40 [ 1705.076277] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1705.076289] RIP: 0033:0x7efd37293b19 [ 1705.076319] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1705.076329] RSP: 002b:00007efd34809188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1705.076350] RAX: ffffffffffffffda RBX: 00007efd373a6f60 RCX: 00007efd37293b19 [ 1705.076361] RDX: 0000000000000300 RSI: 00000000200068c0 RDI: 0000000000000003 [ 1705.076371] RBP: 00007efd348091d0 R08: 0000000000000000 R09: 0000000000000000 [ 1705.076381] R10: 0000000000000102 R11: 0000000000000246 R12: 0000000000000002 [ 1705.076393] R13: 00007ffd8678098f R14: 00007efd34809300 R15: 0000000000022000 [ 1705.089347] 9pnet: Insufficient options for proto=fd [ 1705.158728] FAULT_INJECTION: forcing a failure. [ 1705.158728] name failslab, interval 1, probability 0, space 0, times 0 [ 1705.162096] CPU: 1 PID: 18477 Comm: syz-executor.6 Not tainted 5.10.199 #1 [ 1705.163512] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1705.165209] Call Trace: [ 1705.165748] dump_stack+0x107/0x167 [ 1705.166497] should_fail.cold+0x5/0xa [ 1705.167279] ? kvmalloc_node+0x119/0x170 [ 1705.168105] should_failslab+0x5/0x20 [ 1705.168886] __kmalloc_node+0x76/0x420 [ 1705.169677] ? __lock_acquire+0xbb1/0x5b00 [ 1705.170548] kvmalloc_node+0x119/0x170 [ 1705.171346] seq_read_iter+0x81c/0x12b0 [ 1705.172164] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1705.173244] ? SOFTIRQ_verbose+0x10/0x10 [ 1705.174081] proc_reg_read_iter+0x20a/0x2e0 [ 1705.174957] new_sync_read+0x424/0x6f0 [ 1705.175752] ? ksys_lseek+0x1b0/0x1b0 [ 1705.176543] ? _cond_resched+0x12/0x80 [ 1705.177353] ? avc_policy_seqno+0x9/0x70 [ 1705.178187] ? selinux_file_permission+0x92/0x520 [ 1705.179224] vfs_read+0x457/0x580 [ 1705.179955] __x64_sys_pread64+0x201/0x260 [ 1705.180842] ? ksys_pread64+0x1b0/0x1b0 [ 1705.181670] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1705.182775] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1705.183871] do_syscall_64+0x33/0x40 [ 1705.184686] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1705.185728] RIP: 0033:0x7f39bc922b19 [ 1705.186481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1705.190212] RSP: 002b:00007f39b9e98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 1705.191753] RAX: ffffffffffffffda RBX: 00007f39bca35f60 RCX: 00007f39bc922b19 [ 1705.193226] RDX: 000000000000101e RSI: 0000000020000040 RDI: 0000000000000004 [ 1705.194662] RBP: 00007f39b9e981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1705.196100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1705.197547] R13: 00007ffd8fa823bf R14: 00007f39b9e98300 R15: 0000000000022000 [ 1705.207546] 9pnet: p9_fd_create_tcp (18487): problem connecting socket to 127.0.0.1 02:36:54 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:36:54 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x102, 0x0) (fail_nth: 95) 02:36:54 executing program 4: r0 = getpid() r1 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r2, 0x0, 0x0, 0x1000002) sendfile(0xffffffffffffffff, r1, &(0x7f0000000080)=0xa3, 0x7ff) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000009, 0x1f012, r2, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18}, './file0\x00'}) [ 1705.347211] FAULT_INJECTION: forcing a failure. [ 1705.347211] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1705.349728] CPU: 1 PID: 18513 Comm: syz-executor.0 Not tainted 5.10.199 #1 [ 1705.351129] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1705.352817] Call Trace: [ 1705.353356] dump_stack+0x107/0x167 [ 1705.354110] should_fail.cold+0x5/0xa [ 1705.354890] _copy_from_user+0x2e/0x1b0 [ 1705.355703] __copy_msghdr_from_user+0x91/0x4b0 [ 1705.356668] ? __ia32_sys_shutdown+0x80/0x80 [ 1705.357580] ? __lock_acquire+0x1657/0x5b00 [ 1705.358473] ___sys_recvmsg+0xd5/0x200 [ 1705.359266] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1705.360264] ? lock_downgrade+0x6d0/0x6d0 [ 1705.361126] ? lock_acquire+0x197/0x470 [ 1705.361933] ? find_held_lock+0x2c/0x110 [ 1705.362836] ? __might_fault+0xd3/0x180 [ 1705.363644] ? lock_downgrade+0x6d0/0x6d0 [ 1705.364517] do_recvmmsg+0x24c/0x6d0 [ 1705.365282] ? ___sys_recvmsg+0x200/0x200 [ 1705.366123] ? lock_downgrade+0x6d0/0x6d0 [ 1705.366969] ? ksys_write+0x12d/0x260 [ 1705.367756] ? wait_for_completion_io+0x270/0x270 [ 1705.368755] ? rcu_read_lock_any_held+0x75/0xa0 [ 1705.369693] ? vfs_write+0x354/0xa70 [ 1705.370453] __x64_sys_recvmmsg+0x20f/0x260 [ 1705.371327] ? ksys_write+0x1a9/0x260 [ 1705.372097] ? __do_sys_socketcall+0x600/0x600 [ 1705.373037] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1705.374095] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1705.375165] do_syscall_64+0x33/0x40 [ 1705.375922] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1705.376981] RIP: 0033:0x7efd37293b19 [ 1705.377746] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1705.381501] RSP: 002b:00007efd34809188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1705.383043] RAX: ffffffffffffffda RBX: 00007efd373a6f60 RCX: 00007efd37293b19 [ 1705.384492] RDX: 0000000000000300 RSI: 00000000200068c0 RDI: 0000000000000003 [ 1705.385931] RBP: 00007efd348091d0 R08: 0000000000000000 R09: 0000000000000000 [ 1705.387369] R10: 0000000000000102 R11: 0000000000000246 R12: 0000000000000002 [ 1705.388826] R13: 00007ffd8678098f R14: 00007efd34809300 R15: 0000000000022000 [ 1705.642475] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1705.643550] print_req_error: 22 callbacks suppressed [ 1705.643567] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1705.646716] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1705.648807] buffer_io_error: 6 callbacks suppressed [ 1705.648818] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1705.657207] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1705.658305] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1705.660392] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1705.662428] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1705.664597] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1705.665699] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1705.668277] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1705.669364] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1705.671448] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1705.673486] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1705.674944] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1705.676933] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1705.679583] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1705.680656] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1705.683291] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1705.684391] blk_update_request: I/O error, dev sr0, sector 2096901 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1705.687015] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1705.688241] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1705.692857] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1705.694323] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1705.695779] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1705.697227] Buffer I/O error on dev loop4, logical block 2096903, async page read [ 1705.848398] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1705.849468] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1705.854196] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1705.855227] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1705.857173] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1705.858306] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1705.859921] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1705.861052] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1705.862594] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1705.864192] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 02:37:08 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x2000105e, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:37:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x9, 0x2010, 0xffffffffffffffff, 0x966b7000) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x48c8b, 0x0, 0xfffffffe, 0x4, 0x0, 0x0, 0x4a, 0x0, 0x0, 0x0, 0x800}, 0x0, 0x0, r0, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r1) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file1/file0\x00', 0x101) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8}, 0x11000, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r4, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mbind(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, &(0x7f0000000280)=0x3a, 0x6, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r4, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r4, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r4, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) splice(r2, &(0x7f0000000140)=0x7ef6, r1, &(0x7f00000001c0)=0x8, 0x0, 0x6) sendfile(r4, r3, 0x0, 0x9bbb) mbind(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3, &(0x7f0000000240)=0x2, 0xa, 0x1) 02:37:08 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x102, 0x0) (fail_nth: 96) 02:37:08 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) (fail_nth: 2) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:37:08 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = getegid() fchownat(r2, &(0x7f0000000040)='./file0\x00', 0xee00, r3, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x2120, &(0x7f0000001980)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001e00)=""/4112, 0x1000}, {&(0x7f00000011c0)=""/219, 0x129}, {&(0x7f00000017c0)=""/147, 0x8d}], 0x3, 0x400625, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000140)={0x0, @broadcast, 0x4e24, 0x2, 'rr\x00', 0x0, 0x2, 0x37}, 0x2c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f00000013c0)='./file0\x00', &(0x7f0000001400)='./file0\x00', &(0x7f0000001440), 0x100000, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:37:08 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x0, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:37:08 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:37:08 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}], [], 0x2}}) [ 1719.637490] FAULT_INJECTION: forcing a failure. [ 1719.637490] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1719.640038] CPU: 1 PID: 18624 Comm: syz-executor.0 Not tainted 5.10.199 #1 [ 1719.641466] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1719.643139] Call Trace: [ 1719.643675] dump_stack+0x107/0x167 [ 1719.644431] should_fail.cold+0x5/0xa [ 1719.644457] __alloc_pages_nodemask+0x182/0x600 [ 1719.644476] ? lock_chain_count+0x20/0x20 [ 1719.644514] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1719.644569] alloc_pages_vma+0xbb/0x410 [ 1719.644596] wp_page_copy+0xee7/0x1f00 [ 1719.644628] ? print_bad_pte+0x5a0/0x5a0 [ 1719.644646] ? lock_downgrade+0x6d0/0x6d0 [ 1719.644663] ? vm_normal_page+0x162/0x2e0 [ 1719.644687] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1719.644716] do_wp_page+0x27b/0x1390 [ 1719.644742] handle_mm_fault+0x1cc7/0x3500 [ 1719.644767] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1719.644784] ? __skb_checksum_complete+0x1b0/0x3a0 [ 1719.644803] ? __skb_checksum_complete_head+0x2d0/0x2d0 [ 1719.644822] ? __pmd_alloc+0x5e0/0x5e0 [ 1719.644851] ? vmacache_find+0x55/0x2a0 [ 1719.644882] do_user_addr_fault+0x56e/0xc60 [ 1719.644911] exc_page_fault+0xa2/0x1a0 [ 1719.644932] asm_exc_page_fault+0x1e/0x30 [ 1719.644953] RIP: 0010:__put_user_nocheck_4+0x3/0x11 [ 1719.644973] Code: 00 00 48 39 d9 73 54 0f 01 cb 66 89 01 31 c9 0f 01 ca e9 f1 2c 1e 02 90 48 bb fd ef ff ff ff 7f 00 00 48 39 d9 73 34 0f 01 cb <89> 01 31 c9 0f 01 ca e9 d2 2c 1e 02 66 90 48 bb f9 ef ff ff ff 7f [ 1719.644983] RSP: 0018:ffff88804a68f9c8 EFLAGS: 00050202 [ 1719.645000] RAX: 0000000000000020 RBX: ffffffff834ff190 RCX: 0000000020008030 [ 1719.645012] RDX: 1ffff110094d1fc3 RSI: ffffffff830f236a RDI: 0000000000000005 [ 1719.645023] RBP: ffff88804a68fdc8 R08: 0000000000000001 R09: ffff88804aa1f99f [ 1719.645034] R10: 0000000000000000 R11: 0000000000000001 R12: 0000000020008030 [ 1719.645044] R13: 0000000020008000 R14: 0000000000000102 R15: 0000000000000000 [ 1719.645066] ? inet_sendpage+0x130/0x130 [ 1719.645090] ? ____sys_recvmsg+0x2aa/0x590 [ 1719.645113] ____sys_recvmsg+0x2dd/0x590 [ 1719.645141] ? kernel_recvmsg+0x80/0x80 [ 1719.671717] 9pnet: p9_fd_create_tcp (18626): problem connecting socket to 127.0.0.1 [ 1719.672864] ? __import_iovec+0x458/0x590 [ 1719.672898] ? import_iovec+0x83/0xb0 [ 1719.672925] ___sys_recvmsg+0x127/0x200 [ 1719.672952] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1719.683878] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1719.684962] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1719.685903] ? trace_hardirqs_on+0x5b/0x180 [ 1719.686778] ? lock_acquire+0x197/0x470 [ 1719.687617] ? find_held_lock+0x2c/0x110 [ 1719.688437] ? __might_fault+0xd3/0x180 [ 1719.689312] ? lock_downgrade+0x6d0/0x6d0 [ 1719.690142] ? io_schedule_timeout+0x140/0x140 [ 1719.691126] do_recvmmsg+0x24c/0x6d0 [ 1719.691874] ? ___sys_recvmsg+0x200/0x200 [ 1719.692779] ? lock_downgrade+0x6d0/0x6d0 [ 1719.693613] ? ksys_write+0x12d/0x260 [ 1719.694398] ? wait_for_completion_io+0x270/0x270 [ 1719.695358] ? rcu_read_lock_any_held+0x75/0xa0 [ 1719.696300] ? vfs_write+0x354/0xa70 [ 1719.697077] __x64_sys_recvmmsg+0x20f/0x260 [ 1719.697956] ? ksys_write+0x1a9/0x260 [ 1719.698720] ? __do_sys_socketcall+0x600/0x600 [ 1719.699654] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1719.700703] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1719.701736] do_syscall_64+0x33/0x40 [ 1719.702498] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1719.703524] RIP: 0033:0x7efd37293b19 [ 1719.704280] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1719.707941] RSP: 002b:00007efd34809188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1719.709571] RAX: ffffffffffffffda RBX: 00007efd373a6f60 RCX: 00007efd37293b19 [ 1719.709582] RDX: 0000000000000300 RSI: 00000000200068c0 RDI: 0000000000000003 [ 1719.709594] RBP: 00007efd348091d0 R08: 0000000000000000 R09: 0000000000000000 [ 1719.709605] R10: 0000000000000102 R11: 0000000000000246 R12: 0000000000000002 [ 1719.709616] R13: 00007ffd8678098f R14: 00007efd34809300 R15: 0000000000022000 [ 1719.730520] FAULT_INJECTION: forcing a failure. [ 1719.730520] name failslab, interval 1, probability 0, space 0, times 0 02:37:08 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = getegid() fchownat(r2, &(0x7f0000000040)='./file0\x00', 0xee00, r3, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x2120, &(0x7f0000001980)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001e00)=""/4112, 0x1000}, {&(0x7f00000011c0)=""/219, 0x129}, {&(0x7f00000017c0)=""/147, 0x8d}], 0x3, 0x400625, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000140)={0x0, @broadcast, 0x4e24, 0x2, 'rr\x00', 0x0, 0x2, 0x37}, 0x2c) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) [ 1719.730547] CPU: 0 PID: 18629 Comm: syz-executor.6 Not tainted 5.10.199 #1 [ 1719.730559] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1719.730565] Call Trace: [ 1719.730585] dump_stack+0x107/0x167 [ 1719.730610] should_fail.cold+0x5/0xa [ 1719.730631] ? create_object.isra.0+0x3a/0xa20 02:37:08 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(0x0, 0x0) [ 1719.730653] should_failslab+0x5/0x20 02:37:08 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}], [], 0x3}}) [ 1719.730676] kmem_cache_alloc+0x5b/0x310 [ 1719.730701] create_object.isra.0+0x3a/0xa20 [ 1719.730721] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1719.730745] __kmalloc_node+0x1ae/0x420 [ 1719.730763] ? __lock_acquire+0xbb1/0x5b00 [ 1719.730790] kvmalloc_node+0x119/0x170 [ 1719.730811] seq_read_iter+0x81c/0x12b0 02:37:09 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ftruncate(0xffffffffffffffff, 0x1000003) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fcntl$F_GET_FILE_RW_HINT(0xffffffffffffffff, 0x40d, &(0x7f0000000040)) fallocate(r1, 0x10, 0x0, 0x1000002) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8953, &(0x7f0000000080)={{0x2, 0x4e24, @local}, {0x6, @remote}, 0x20, {0x2, 0x4e22, @remote}, 'vxcan1\x00'}) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) shutdown(r0, 0x0) [ 1719.730834] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1719.730851] ? SOFTIRQ_verbose+0x10/0x10 [ 1719.730884] proc_reg_read_iter+0x20a/0x2e0 [ 1719.730907] new_sync_read+0x424/0x6f0 [ 1719.730927] ? ksys_lseek+0x1b0/0x1b0 [ 1719.730948] ? _cond_resched+0x12/0x80 [ 1719.730970] ? avc_policy_seqno+0x9/0x70 [ 1719.730987] ? selinux_file_permission+0x92/0x520 [ 1719.731028] vfs_read+0x457/0x580 [ 1719.731056] __x64_sys_pread64+0x201/0x260 [ 1719.731076] ? ksys_pread64+0x1b0/0x1b0 [ 1719.731100] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1719.731118] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1719.731143] do_syscall_64+0x33/0x40 [ 1719.731165] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1719.731177] RIP: 0033:0x7f39bc922b19 [ 1719.731197] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1719.731207] RSP: 002b:00007f39b9e98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 1719.731229] RAX: ffffffffffffffda RBX: 00007f39bca35f60 RCX: 00007f39bc922b19 [ 1719.731240] RDX: 000000000000101e RSI: 0000000020000040 RDI: 0000000000000004 [ 1719.731250] RBP: 00007f39b9e981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1719.731261] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1719.731272] R13: 00007ffd8fa823bf R14: 00007f39b9e98300 R15: 0000000000022000 [ 1719.732175] 9pnet: Insufficient options for proto=fd [ 1719.893302] 9pnet: Insufficient options for proto=fd [ 1719.932655] 9pnet: p9_fd_create_tcp (18743): problem connecting socket to 127.0.0.1 02:37:09 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x0, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:37:09 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x2) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:37:09 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) (fail_nth: 3) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:37:09 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = getegid() fchownat(r2, &(0x7f0000000040)='./file0\x00', 0xee00, r3, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x2120, &(0x7f0000001980)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001e00)=""/4112, 0x1000}, {&(0x7f00000011c0)=""/219, 0x129}, {&(0x7f00000017c0)=""/147, 0x8d}], 0x3, 0x400625, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) fcntl$dupfd(0xffffffffffffffff, 0x0, r4) setsockopt$IP_VS_SO_SET_DEL(r1, 0x0, 0x484, &(0x7f0000000140)={0x0, @broadcast, 0x4e24, 0x2, 'rr\x00', 0x0, 0x2, 0x37}, 0x2c) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:37:09 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}], [], 0x4}}) 02:37:09 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x102, 0x0) (fail_nth: 97) [ 1720.125721] 9pnet: Insufficient options for proto=fd [ 1720.143356] FAULT_INJECTION: forcing a failure. [ 1720.143356] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1720.145145] CPU: 1 PID: 18874 Comm: syz-executor.0 Not tainted 5.10.199 #1 [ 1720.146178] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1720.147411] Call Trace: [ 1720.147811] dump_stack+0x107/0x167 [ 1720.148357] should_fail.cold+0x5/0xa [ 1720.148949] _copy_from_user+0x2e/0x1b0 [ 1720.149547] __copy_msghdr_from_user+0x91/0x4b0 [ 1720.150252] ? __ia32_sys_shutdown+0x80/0x80 [ 1720.150919] ? __lock_acquire+0x1657/0x5b00 [ 1720.151571] ___sys_recvmsg+0xd5/0x200 [ 1720.152157] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1720.152912] ? lock_downgrade+0x6d0/0x6d0 [ 1720.152931] ? lock_acquire+0x197/0x470 [ 1720.152944] ? find_held_lock+0x2c/0x110 [ 1720.152964] ? __might_fault+0xd3/0x180 02:37:09 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(0x0, 0x0) [ 1720.152978] ? lock_downgrade+0x6d0/0x6d0 [ 1720.153007] do_recvmmsg+0x24c/0x6d0 [ 1720.153026] ? ___sys_recvmsg+0x200/0x200 [ 1720.153040] ? lock_downgrade+0x6d0/0x6d0 [ 1720.153060] ? ksys_write+0x12d/0x260 [ 1720.153086] ? wait_for_completion_io+0x270/0x270 [ 1720.153104] ? rcu_read_lock_any_held+0x75/0xa0 [ 1720.153116] ? vfs_write+0x354/0xa70 [ 1720.153133] __x64_sys_recvmmsg+0x20f/0x260 [ 1720.153147] ? ksys_write+0x1a9/0x260 [ 1720.153161] ? __do_sys_socketcall+0x600/0x600 [ 1720.153179] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1720.153192] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1720.153211] do_syscall_64+0x33/0x40 [ 1720.153227] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1720.153237] RIP: 0033:0x7efd37293b19 [ 1720.153251] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1720.153259] RSP: 002b:00007efd34809188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1720.153275] RAX: ffffffffffffffda RBX: 00007efd373a6f60 RCX: 00007efd37293b19 [ 1720.153282] RDX: 0000000000000300 RSI: 00000000200068c0 RDI: 0000000000000003 [ 1720.153290] RBP: 00007efd348091d0 R08: 0000000000000000 R09: 0000000000000000 [ 1720.153298] R10: 0000000000000102 R11: 0000000000000246 R12: 0000000000000002 [ 1720.153306] R13: 00007ffd8678098f R14: 00007efd34809300 R15: 0000000000022000 [ 1720.191595] 9pnet: p9_fd_create_tcp (18869): problem connecting socket to 127.0.0.1 [ 1720.259964] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1720.259994] print_req_error: 22 callbacks suppressed [ 1720.260008] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1720.260067] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1720.260078] buffer_io_error: 6 callbacks suppressed [ 1720.260086] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1720.260371] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1720.260401] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1720.260448] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1720.260459] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1720.273884] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1720.273914] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1720.273960] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1720.273970] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1720.274083] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1720.274111] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1720.274151] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1720.274161] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1720.274268] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1720.274296] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1720.274336] blk_update_request: I/O error, dev loop4, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1720.274344] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1720.274455] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1720.274506] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1720.274615] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1720.274703] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1720.275597] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1720.275654] Buffer I/O error on dev loop4, logical block 2096903, async page read [ 1720.339624] FAULT_INJECTION: forcing a failure. [ 1720.339624] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1720.339640] CPU: 1 PID: 18868 Comm: syz-executor.6 Not tainted 5.10.199 #1 [ 1720.339648] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1720.339653] Call Trace: [ 1720.339675] dump_stack+0x107/0x167 [ 1720.339694] should_fail.cold+0x5/0xa [ 1720.339714] _copy_to_iter+0x264/0x12d0 [ 1720.339734] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 1720.339754] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1720.339770] ? __check_object_size+0x25a/0x440 [ 1720.339786] ? __sanitizer_cov_trace_pc+0x52/0x60 [ 1720.339802] ? __check_object_size+0x319/0x440 [ 1720.339820] seq_read_iter+0xdcb/0x12b0 [ 1720.339851] proc_reg_read_iter+0x20a/0x2e0 [ 1720.339868] new_sync_read+0x424/0x6f0 [ 1720.339884] ? ksys_lseek+0x1b0/0x1b0 [ 1720.339900] ? _cond_resched+0x12/0x80 [ 1720.339917] ? avc_policy_seqno+0x9/0x70 [ 1720.339930] ? selinux_file_permission+0x92/0x520 [ 1720.339961] vfs_read+0x457/0x580 [ 1720.339981] __x64_sys_pread64+0x201/0x260 [ 1720.339997] ? ksys_pread64+0x1b0/0x1b0 [ 1720.340016] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1720.340029] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1720.340048] do_syscall_64+0x33/0x40 [ 1720.340064] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1720.340075] RIP: 0033:0x7f39bc922b19 [ 1720.340090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1720.340098] RSP: 002b:00007f39b9e98188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 1720.340113] RAX: ffffffffffffffda RBX: 00007f39bca35f60 RCX: 00007f39bc922b19 [ 1720.340121] RDX: 000000000000101e RSI: 0000000020000040 RDI: 0000000000000004 [ 1720.340129] RBP: 00007f39b9e981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1720.340137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1720.340146] R13: 00007ffd8fa823bf R14: 00007f39b9e98300 R15: 0000000000022000 02:37:23 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(0x0, 0x0) 02:37:23 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x0, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:37:23 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x3) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:37:23 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getegid() fchownat(r1, &(0x7f0000000040)='./file0\x00', 0xee00, r2, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x2120, &(0x7f0000001980)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001e00)=""/4112, 0x1000}, {&(0x7f00000011c0)=""/219, 0x129}, {&(0x7f00000017c0)=""/147, 0x8d}], 0x3, 0x400625, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) fcntl$dupfd(0xffffffffffffffff, 0x0, r3) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:37:23 executing program 4: ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000000000000}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @in_args={0x4}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmctl$IPC_STAT(0x0, 0x3, &(0x7f0000000100)=""/235) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)) r1 = shmget(0x2, 0x2000, 0x200, &(0x7f0000ffe000/0x2000)=nil) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r2, &(0x7f0000ff9000/0x4000)=nil, 0x4000) shmctl$IPC_RMID(r2, 0x0) shmctl$SHM_LOCK(0x0, 0xb) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000400)=""/165) 02:37:23 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x102, 0x0) (fail_nth: 98) 02:37:23 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}], [], 0x5}}) 02:37:23 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) (fail_nth: 4) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1734.722999] 9pnet: Insufficient options for proto=fd [ 1734.725991] FAULT_INJECTION: forcing a failure. [ 1734.725991] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1734.728527] CPU: 1 PID: 18994 Comm: syz-executor.0 Not tainted 5.10.199 #1 [ 1734.729966] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1734.731665] Call Trace: [ 1734.732210] dump_stack+0x107/0x167 [ 1734.732979] should_fail.cold+0x5/0xa [ 1734.733761] _copy_from_user+0x2e/0x1b0 [ 1734.734567] __copy_msghdr_from_user+0x91/0x4b0 [ 1734.735510] ? __ia32_sys_shutdown+0x80/0x80 [ 1734.736399] ? __lock_acquire+0x1657/0x5b00 [ 1734.737315] ___sys_recvmsg+0xd5/0x200 [ 1734.738121] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1734.738142] ? lock_downgrade+0x6d0/0x6d0 [ 1734.738167] ? lock_acquire+0x197/0x470 [ 1734.738183] ? find_held_lock+0x2c/0x110 [ 1734.738209] ? __might_fault+0xd3/0x180 [ 1734.738227] ? lock_downgrade+0x6d0/0x6d0 [ 1734.738266] do_recvmmsg+0x24c/0x6d0 02:37:23 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) fcntl$setsig(r1, 0xa, 0x3e) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000040)=ANY=[@ANYBLOB="fdffffff1d00210c02000400180000000000000764cea000"], 0x18}}, 0x0) [ 1734.738291] ? ___sys_recvmsg+0x200/0x200 02:37:23 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x102, 0x0) (fail_nth: 99) [ 1734.738310] ? lock_downgrade+0x6d0/0x6d0 [ 1734.738337] ? ksys_write+0x12d/0x260 02:37:23 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getegid() fchownat(r1, &(0x7f0000000040)='./file0\x00', 0xee00, r2, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x2120, &(0x7f0000001980)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001e00)=""/4112, 0x1000}, {&(0x7f00000011c0)=""/219, 0x129}, {&(0x7f00000017c0)=""/147, 0x8d}], 0x3, 0x400625, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:37:23 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}], [], 0x6}}) [ 1734.738371] ? wait_for_completion_io+0x270/0x270 [ 1734.738393] ? rcu_read_lock_any_held+0x75/0xa0 [ 1734.738410] ? vfs_write+0x354/0xa70 [ 1734.738434] __x64_sys_recvmmsg+0x20f/0x260 [ 1734.738451] ? ksys_write+0x1a9/0x260 [ 1734.738470] ? __do_sys_socketcall+0x600/0x600 [ 1734.738494] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1734.738512] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1734.738537] do_syscall_64+0x33/0x40 [ 1734.738558] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1734.738571] RIP: 0033:0x7efd37293b19 [ 1734.738591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1734.738601] RSP: 002b:00007efd34809188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1734.738621] RAX: ffffffffffffffda RBX: 00007efd373a6f60 RCX: 00007efd37293b19 [ 1734.738632] RDX: 0000000000000300 RSI: 00000000200068c0 RDI: 0000000000000003 [ 1734.738642] RBP: 00007efd348091d0 R08: 0000000000000000 R09: 0000000000000000 [ 1734.738653] R10: 0000000000000102 R11: 0000000000000246 R12: 0000000000000002 [ 1734.738663] R13: 00007ffd8678098f R14: 00007efd34809300 R15: 0000000000022000 [ 1734.752127] 9pnet: p9_fd_create_tcp (18981): problem connecting socket to 127.0.0.1 [ 1734.917040] FAULT_INJECTION: forcing a failure. [ 1734.917040] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1734.917062] CPU: 1 PID: 19107 Comm: syz-executor.0 Not tainted 5.10.199 #1 [ 1734.917073] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1734.917078] Call Trace: [ 1734.917102] dump_stack+0x107/0x167 [ 1734.917125] should_fail.cold+0x5/0xa [ 1734.917150] _copy_from_user+0x2e/0x1b0 [ 1734.917175] __copy_msghdr_from_user+0x91/0x4b0 [ 1734.917195] ? __ia32_sys_shutdown+0x80/0x80 [ 1734.917214] ? __lock_acquire+0x1657/0x5b00 [ 1734.917251] ___sys_recvmsg+0xd5/0x200 [ 1734.917272] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1734.917290] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1734.917311] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1734.917325] ? trace_hardirqs_on+0x5b/0x180 [ 1734.917351] ? lock_acquire+0x197/0x470 [ 1734.917368] ? find_held_lock+0x2c/0x110 [ 1734.917392] ? __might_fault+0xd3/0x180 [ 1734.917411] ? lock_downgrade+0x6d0/0x6d0 [ 1734.917432] ? io_schedule_timeout+0x140/0x140 [ 1734.917465] do_recvmmsg+0x24c/0x6d0 [ 1734.917490] ? ___sys_recvmsg+0x200/0x200 [ 1734.917509] ? lock_downgrade+0x6d0/0x6d0 [ 1734.917535] ? ksys_write+0x12d/0x260 [ 1734.917569] ? wait_for_completion_io+0x270/0x270 [ 1734.917591] ? rcu_read_lock_any_held+0x75/0xa0 [ 1734.917607] ? vfs_write+0x354/0xa70 [ 1734.917630] __x64_sys_recvmmsg+0x20f/0x260 [ 1734.917648] ? ksys_write+0x1a9/0x260 [ 1734.917672] ? __do_sys_socketcall+0x600/0x600 [ 1734.917696] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1734.917714] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1734.917738] do_syscall_64+0x33/0x40 [ 1734.917760] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1734.917772] RIP: 0033:0x7efd37293b19 [ 1734.917792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1734.917802] RSP: 002b:00007efd34809188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1734.917822] RAX: ffffffffffffffda RBX: 00007efd373a6f60 RCX: 00007efd37293b19 [ 1734.917833] RDX: 0000000000000300 RSI: 00000000200068c0 RDI: 0000000000000003 [ 1734.917844] RBP: 00007efd348091d0 R08: 0000000000000000 R09: 0000000000000000 [ 1734.917855] R10: 0000000000000102 R11: 0000000000000246 R12: 0000000000000002 [ 1734.917865] R13: 00007ffd8678098f R14: 00007efd34809300 R15: 0000000000022000 [ 1734.921996] 9pnet: Insufficient options for proto=fd [ 1734.986148] 9pnet: p9_fd_create_tcp (19131): problem connecting socket to 127.0.0.1 [ 1735.110809] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1735.110846] print_req_error: 6 callbacks suppressed [ 1735.110864] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1735.110940] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1735.110958] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1735.111141] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1735.111181] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1735.111287] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1735.111303] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1735.111478] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1735.111517] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1735.111576] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1735.111589] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1735.111919] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1735.111957] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1735.112015] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1735.112030] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1735.113264] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1735.113304] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1735.113363] blk_update_request: I/O error, dev loop4, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1735.113375] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1735.119526] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1735.119604] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1735.119938] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1735.120012] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1735.120958] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1735.121035] Buffer I/O error on dev loop4, logical block 2096903, async page read [ 1735.224646] FAULT_INJECTION: forcing a failure. [ 1735.224646] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1735.224681] CPU: 0 PID: 18983 Comm: syz-executor.6 Not tainted 5.10.199 #1 [ 1735.224692] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1735.224698] Call Trace: [ 1735.224722] dump_stack+0x107/0x167 [ 1735.224747] should_fail.cold+0x5/0xa [ 1735.224774] _copy_to_user+0x2e/0x180 [ 1735.224799] simple_read_from_buffer+0xcc/0x160 [ 1735.224825] proc_fail_nth_read+0x198/0x230 [ 1735.224848] ? proc_sessionid_read+0x230/0x230 [ 1735.224869] ? security_file_permission+0x24e/0x570 [ 1735.224886] ? perf_trace_initcall_start+0x101/0x380 [ 1735.224916] ? proc_sessionid_read+0x230/0x230 [ 1735.224934] vfs_read+0x228/0x580 [ 1735.224959] ksys_read+0x12d/0x260 [ 1735.224978] ? vfs_write+0xa70/0xa70 [ 1735.225003] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1735.225023] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1735.225048] do_syscall_64+0x33/0x40 [ 1735.225070] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1735.225083] RIP: 0033:0x7f39bc8d569c [ 1735.225103] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1735.225113] RSP: 002b:00007f39b9e98170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1735.225135] RAX: ffffffffffffffda RBX: 000000000000004c RCX: 00007f39bc8d569c [ 1735.225146] RDX: 000000000000000f RSI: 00007f39b9e981e0 RDI: 0000000000000005 [ 1735.225157] RBP: 00007f39b9e981d0 R08: 0000000000000000 R09: 0000000000000000 [ 1735.225168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1735.225180] R13: 00007ffd8fa823bf R14: 00007f39b9e98300 R15: 0000000000022000 02:37:39 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x102, 0x0) (fail_nth: 100) 02:37:39 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getegid() fchownat(r1, &(0x7f0000000040)='./file0\x00', 0xee00, r2, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x2120, &(0x7f0000001980)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001e00)=""/4112, 0x1000}, {&(0x7f00000011c0)=""/219, 0x129}, {&(0x7f00000017c0)=""/147, 0x8d}], 0x3, 0x400625, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) socket$inet6_udplite(0xa, 0x2, 0x88) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:37:39 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x4) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:37:39 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:37:39 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) (fail_nth: 1) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:37:39 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}], [], 0x7}}) 02:37:39 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x0, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:37:39 executing program 4: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x8010, &(0x7f0000000280)=ANY=[]) setxattr$security_selinux(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340), &(0x7f0000000380)='system_u:object_r:autofs_device_t:s0\x00', 0x25, 0x1) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) getsockname$unix(0xffffffffffffffff, &(0x7f00000003c0), &(0x7f0000000440)=0x6e) ftruncate(r1, 0x3) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x8) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x10a) write(r3, &(0x7f0000000240)="01", 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x10) fcntl$dupfd(r0, 0x0, r1) sendfile(r1, r2, 0x0, 0x20d315) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40202, 0x0) openat(r2, &(0x7f0000000280)='./file1\x00', 0x200, 0x100) dup2(0xffffffffffffffff, 0xffffffffffffffff) fsetxattr$security_evm(r4, &(0x7f0000000180), &(0x7f00000001c0)=@md5={0x1, "14a8e82f6acb5c1fdec6fd2a1d7050a2"}, 0x11, 0x6) ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f00000002c0)) [ 1749.945212] FAULT_INJECTION: forcing a failure. [ 1749.945212] name failslab, interval 1, probability 0, space 0, times 0 [ 1749.948272] CPU: 0 PID: 19220 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 1749.949678] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1749.951316] Call Trace: [ 1749.951848] dump_stack+0x107/0x167 [ 1749.952577] should_fail.cold+0x5/0xa [ 1749.953348] ? kvmalloc_node+0x119/0x170 [ 1749.954158] should_failslab+0x5/0x20 [ 1749.954280] FAULT_INJECTION: forcing a failure. [ 1749.954280] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1749.954908] __kmalloc_node+0x76/0x420 [ 1749.954928] ? __lock_acquire+0xbb1/0x5b00 [ 1749.954957] kvmalloc_node+0x119/0x170 [ 1749.959595] seq_read_iter+0x81c/0x12b0 [ 1749.960379] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1749.961419] ? SOFTIRQ_verbose+0x10/0x10 [ 1749.962228] proc_reg_read_iter+0x20a/0x2e0 [ 1749.963080] new_sync_read+0x424/0x6f0 [ 1749.963853] ? ksys_lseek+0x1b0/0x1b0 [ 1749.964606] ? _cond_resched+0x12/0x80 [ 1749.965388] ? avc_policy_seqno+0x9/0x70 [ 1749.966184] ? selinux_file_permission+0x92/0x520 [ 1749.967148] vfs_read+0x457/0x580 [ 1749.967843] __x64_sys_pread64+0x201/0x260 [ 1749.968673] ? ksys_pread64+0x1b0/0x1b0 [ 1749.969465] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1749.970497] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1749.971518] do_syscall_64+0x33/0x40 [ 1749.972257] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1749.973288] RIP: 0033:0x7f2cd44e8b19 [ 1749.974020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1749.977644] RSP: 002b:00007f2cd1a5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 1749.979144] RAX: ffffffffffffffda RBX: 00007f2cd45fbf60 RCX: 00007f2cd44e8b19 [ 1749.980524] RDX: 000000000000101e RSI: 0000000020000040 RDI: 0000000000000004 [ 1749.981908] RBP: 00007f2cd1a5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1749.983295] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1749.984674] R13: 00007ffef259577f R14: 00007f2cd1a5e300 R15: 0000000000022000 [ 1749.986104] CPU: 1 PID: 19227 Comm: syz-executor.0 Not tainted 5.10.199 #1 [ 1749.987530] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1749.989223] Call Trace: [ 1749.989762] dump_stack+0x107/0x167 [ 1749.990499] should_fail.cold+0x5/0xa [ 1749.991277] _copy_from_user+0x2e/0x1b0 [ 1749.992083] __copy_msghdr_from_user+0x91/0x4b0 [ 1749.993042] ? __ia32_sys_shutdown+0x80/0x80 [ 1749.993934] ? __lock_acquire+0x1657/0x5b00 [ 1749.994815] ___sys_recvmsg+0xd5/0x200 [ 1749.995601] ? __copy_msghdr_from_user+0x4b0/0x4b0 [ 1749.996587] ? lock_downgrade+0x6d0/0x6d0 [ 1749.997445] ? lock_acquire+0x197/0x470 [ 1749.997915] 9pnet: Insufficient options for proto=fd [ 1749.998241] ? find_held_lock+0x2c/0x110 [ 1749.998274] ? __might_fault+0xd3/0x180 [ 1750.000843] ? lock_downgrade+0x6d0/0x6d0 [ 1750.001703] do_recvmmsg+0x24c/0x6d0 [ 1750.002511] ? ___sys_recvmsg+0x200/0x200 [ 1750.003349] ? lock_downgrade+0x6d0/0x6d0 [ 1750.004194] ? ksys_write+0x12d/0x260 [ 1750.004990] ? wait_for_completion_io+0x270/0x270 [ 1750.005963] ? rcu_read_lock_any_held+0x75/0xa0 [ 1750.006894] ? vfs_write+0x354/0xa70 [ 1750.007656] __x64_sys_recvmmsg+0x20f/0x260 [ 1750.008514] 9pnet: p9_fd_create_tcp (19230): problem connecting socket to 127.0.0.1 [ 1750.008543] ? ksys_write+0x1a9/0x260 [ 1750.010789] ? __do_sys_socketcall+0x600/0x600 [ 1750.011707] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1750.012804] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1750.013871] do_syscall_64+0x33/0x40 [ 1750.014637] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1750.015689] RIP: 0033:0x7efd37293b19 [ 1750.016452] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1750.020223] RSP: 002b:00007efd34809188 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 1750.021812] RAX: ffffffffffffffda RBX: 00007efd373a6f60 RCX: 00007efd37293b19 [ 1750.023288] RDX: 0000000000000300 RSI: 00000000200068c0 RDI: 0000000000000003 [ 1750.024752] RBP: 00007efd348091d0 R08: 0000000000000000 R09: 0000000000000000 [ 1750.026219] R10: 0000000000000102 R11: 0000000000000246 R12: 0000000000000003 [ 1750.027689] R13: 00007ffd8678098f R14: 00007efd34809300 R15: 0000000000022000 02:37:39 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getegid() fchownat(r1, &(0x7f0000000040)='./file0\x00', 0xee00, r2, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x2120, &(0x7f0000001980)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001e00)=""/4112, 0x1000}, {&(0x7f00000011c0)=""/219, 0x129}, {&(0x7f00000017c0)=""/147, 0x8d}], 0x3, 0x400625, 0x0) socket$nl_audit(0x10, 0x3, 0x9) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:37:39 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}], [], 0x8}}) 02:37:39 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x2a, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:37:39 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x0, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) [ 1750.195807] 9pnet: p9_fd_create_tcp (19344): problem connecting socket to 127.0.0.1 [ 1750.198221] 9pnet: Insufficient options for proto=fd 02:37:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(0xffffffffffffffff, 0xf505, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r2, 0x40086607, &(0x7f0000000080)=0x1ff) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r3 = creat(&(0x7f0000000140)='./file0\x00', 0x40) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x8000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) 02:37:39 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x5) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:37:39 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getegid() fchownat(r1, &(0x7f0000000040)='./file0\x00', 0xee00, r2, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x2120, &(0x7f0000001980)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001e00)=""/4112, 0x1000}, {&(0x7f00000011c0)=""/219, 0x129}, {&(0x7f00000017c0)=""/147, 0x8d}], 0x3, 0x400625, 0x0) socket$nl_audit(0x10, 0x3, 0x9) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:37:39 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) (fail_nth: 2) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:37:39 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x102, 0x0) 02:37:39 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x0, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "8fa26d6492245ab2c4b2804da276d13b80d6eab731469ef9bd0bd6682f9e0f183009df520ebabe821c9b00d346ccc20828be94fe69407a15053824a6258f96486c0bb31ccac6220be6e4d98329e1bc353ffbde84b1a7b5ead8d77596f4037616d5800509dec7554bdb41197e466643fbcba5f2b0809e0a36800cf0c8c10bff5e61e7ccfb75b4a266a9d1310c0fef7649df2905ffa29534d9db1759a2d718d137309c601822cb64a19452b20388f852c4a21013a11c6f094964fc119a918a11dd68ee0c756635919af6fc1f2ba2e26d1f57a88d98226a2443498c8178b3ccb82cae834c01282312063cbe896bfdb6e96a24c116f81389f50032173a92fb17d1", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:37:39 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}], [], 0x9}}) [ 1750.411540] FAULT_INJECTION: forcing a failure. [ 1750.411540] name failslab, interval 1, probability 0, space 0, times 0 [ 1750.414089] CPU: 0 PID: 19462 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 1750.415204] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1750.416558] Call Trace: [ 1750.417019] dump_stack+0x107/0x167 [ 1750.417620] should_fail.cold+0x5/0xa [ 1750.418250] ? create_object.isra.0+0x3a/0xa20 [ 1750.419000] should_failslab+0x5/0x20 [ 1750.419612] kmem_cache_alloc+0x5b/0x310 [ 1750.420267] create_object.isra.0+0x3a/0xa20 [ 1750.420994] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1750.421813] __kmalloc_node+0x1ae/0x420 [ 1750.422465] ? __lock_acquire+0xbb1/0x5b00 [ 1750.423166] kvmalloc_node+0x119/0x170 [ 1750.423809] seq_read_iter+0x81c/0x12b0 [ 1750.424463] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1750.425308] ? SOFTIRQ_verbose+0x10/0x10 [ 1750.425978] proc_reg_read_iter+0x20a/0x2e0 [ 1750.426644] new_sync_read+0x424/0x6f0 [ 1750.427279] ? ksys_lseek+0x1b0/0x1b0 [ 1750.427862] ? _cond_resched+0x12/0x80 [ 1750.428484] ? avc_policy_seqno+0x9/0x70 [ 1750.429138] ? selinux_file_permission+0x92/0x520 [ 1750.429913] vfs_read+0x457/0x580 [ 1750.429970] 9pnet: p9_fd_create_tcp (19461): problem connecting socket to 127.0.0.1 [ 1750.430472] __x64_sys_pread64+0x201/0x260 [ 1750.430495] ? ksys_pread64+0x1b0/0x1b0 [ 1750.433341] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1750.434133] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1750.434923] do_syscall_64+0x33/0x40 [ 1750.435496] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1750.436281] RIP: 0033:0x7f2cd44e8b19 [ 1750.436844] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1750.439633] RSP: 002b:00007f2cd1a5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 1750.440759] RAX: ffffffffffffffda RBX: 00007f2cd45fbf60 RCX: 00007f2cd44e8b19 [ 1750.441838] RDX: 000000000000101e RSI: 0000000020000040 RDI: 0000000000000004 [ 1750.442893] RBP: 00007f2cd1a5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1750.443986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1750.445055] R13: 00007ffef259577f R14: 00007f2cd1a5e300 R15: 0000000000022000 [ 1750.473295] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1750.474468] print_req_error: 6 callbacks suppressed [ 1750.474486] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1750.478285] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1750.478349] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1750.479864] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1750.481000] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1750.484240] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1750.484303] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1750.485832] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1750.488473] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1750.490655] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1750.490742] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1750.492208] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1750.493329] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1750.496562] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1750.498139] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1750.498796] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1750.500410] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1750.502599] blk_update_request: I/O error, dev loop4, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1750.502651] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1750.504115] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1750.506866] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1750.506950] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1750.509296] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1750.509419] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1750.511608] Buffer I/O error on dev loop4, logical block 2096903, async page read 02:37:39 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x4c, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1750.546693] 9pnet: Insufficient options for proto=fd [ 1750.830818] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1750.832087] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1750.839318] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1750.840507] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1750.842714] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1750.844482] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1750.846271] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1750.847548] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1750.849379] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1750.850713] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 02:37:54 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) (fail_nth: 3) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:37:54 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x6) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:37:54 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x2000105e, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:37:54 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x0, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:37:54 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getegid() fchownat(r1, &(0x7f0000000040)='./file0\x00', 0xee00, r2, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x2120, &(0x7f0000001980)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001e00)=""/4112, 0x1000}, {&(0x7f00000011c0)=""/219, 0x129}, {&(0x7f00000017c0)=""/147, 0x8d}], 0x3, 0x400625, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:37:54 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x102, 0x0) 02:37:54 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20020000) getpgrp(0x0) socket$inet6_icmp(0xa, 0x2, 0x3a) socket$inet6_udplite(0xa, 0x2, 0x88) syz_open_dev$vcsu(0x0, 0x0, 0x0) openat$tcp_mem(0xffffffffffffff9c, 0x0, 0x1, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/mnt\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = getpid() r2 = dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000040)={0x4, 0x80, 0x0, 0x7, 0x0, 0x7, 0x0, 0x8, 0x10000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, @perf_config_ext={0x80000001}, 0x1110, 0x3, 0x0, 0x6, 0x2, 0x3, 0x6, 0x0, 0x5a, 0x0, 0x1ff}, r1, 0xffffffffffffffff, r2, 0x8) setns(r0, 0x0) 02:37:54 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}], [], 0xa}}) [ 1765.092337] 9pnet: Insufficient options for proto=fd [ 1765.150977] 9pnet: p9_fd_create_tcp (19596): problem connecting socket to 127.0.0.1 [ 1765.155336] FAULT_INJECTION: forcing a failure. [ 1765.155336] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1765.158302] CPU: 0 PID: 19664 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 1765.159749] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1765.161462] Call Trace: [ 1765.162013] dump_stack+0x107/0x167 [ 1765.162770] should_fail.cold+0x5/0xa [ 1765.163560] _copy_to_iter+0x264/0x12d0 [ 1765.164378] ? show_console_dev+0x3e4/0x4f0 [ 1765.165283] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1765.166290] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1765.167358] ? __virt_addr_valid+0x128/0x350 [ 1765.168265] ? __check_object_size+0x319/0x440 [ 1765.169215] seq_read_iter+0xdcb/0x12b0 [ 1765.170065] proc_reg_read_iter+0x20a/0x2e0 [ 1765.170956] new_sync_read+0x424/0x6f0 [ 1765.171762] ? ksys_lseek+0x1b0/0x1b0 [ 1765.172549] ? _cond_resched+0x12/0x80 [ 1765.173371] ? avc_policy_seqno+0x9/0x70 [ 1765.174213] ? selinux_file_permission+0x92/0x520 [ 1765.175222] vfs_read+0x457/0x580 [ 1765.175947] __x64_sys_pread64+0x201/0x260 [ 1765.176815] ? ksys_pread64+0x1b0/0x1b0 [ 1765.177659] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1765.178727] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1765.179784] do_syscall_64+0x33/0x40 [ 1765.180548] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1765.181625] RIP: 0033:0x7f2cd44e8b19 [ 1765.182381] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1765.186162] RSP: 002b:00007f2cd1a5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 1765.187718] RAX: ffffffffffffffda RBX: 00007f2cd45fbf60 RCX: 00007f2cd44e8b19 [ 1765.189179] RDX: 000000000000101e RSI: 0000000020000040 RDI: 0000000000000004 [ 1765.190643] RBP: 00007f2cd1a5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1765.192090] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1765.193562] R13: 00007ffef259577f R14: 00007f2cd1a5e300 R15: 0000000000022000 02:37:54 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x630000, 0x0) perf_event_open(0x0, 0x0, 0x0, r0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xc}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$sg(&(0x7f0000000400), 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r2, 0xc020f509, &(0x7f00000000c0)={r1, 0x6, 0xffff, 0x80000001}) openat(r3, &(0x7f0000000180)='./file0\x00', 0x101200, 0x80) r4 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x8802) r5 = fcntl$dupfd(r4, 0x0, r2) writev(r5, &(0x7f0000000140)=[{&(0x7f0000000300)="0040abe02400030021206cda3b5e5672b89aeddb2a535fbd", 0x7e0}], 0x1) r6 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/consoles\x00', 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000440)=ANY=[@ANYBLOB="080101606b000000c70200000300000080020000040000000000000000000000c7675dc6a3142a845c8971ac860c5a97e74f95bac13b5815880574b4e19d3b7b95c70a3bdf3f9a7dd825786fbe93b8c87d1fae3095a5abdbafe8a1ff70dff0e549b4600513d69b060dde919324bfaf97753144057d74a19b279ba6d4c5fb2d00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000469a161b626ed08f00"/2431], 0x97f) r7 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x40082404, &(0x7f0000000240)=0x8) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1100) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='cgroup2\x00', 0x0, 0x0) dup2(r7, r6) 02:37:54 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x7) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:37:54 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}], [], 0xb}}) [ 1765.228386] 9pnet: Insufficient options for proto=fd 02:37:54 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x0, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:37:54 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x2, 0x0}}], 0x300, 0x102, 0x0) 02:37:54 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getegid() fchownat(r1, &(0x7f0000000040)='./file0\x00', 0xee00, r2, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x2120, &(0x7f0000001980)) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:37:54 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}], [], 0x10}}) [ 1765.383204] 9pnet: Insufficient options for proto=fd [ 1765.387817] 9pnet: p9_fd_create_tcp (19827): problem connecting socket to 127.0.0.1 [ 1765.564896] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1765.566116] print_req_error: 22 callbacks suppressed [ 1765.566134] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1765.569536] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1765.570724] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1765.572968] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1765.574143] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1765.576373] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1765.577492] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1765.579651] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1765.581769] buffer_io_error: 6 callbacks suppressed [ 1765.581782] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1765.584449] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1765.586569] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1765.588126] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1765.590230] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1765.591788] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1765.593889] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1765.595517] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1765.596625] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1765.598822] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1765.599921] blk_update_request: I/O error, dev sr0, sector 2096901 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1765.602078] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1765.603267] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1765.610750] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1765.612319] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1765.613881] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1765.615407] Buffer I/O error on dev loop4, logical block 2096903, async page read 02:38:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x2) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:38:11 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x8) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:38:11 executing program 4: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0xff, 0x0, 0x0, 0x0, 0x204307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x6c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa000306f7a1118ef00aab2fe7972bf486dd6096153f00082c0020010000000000000000000000000000ff0200000000000000000000000000018f00907800000000"], 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @empty}, 0x1c) 02:38:11 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getegid() fchownat(r1, &(0x7f0000000040)='./file0\x00', 0xee00, r2, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x2120, &(0x7f0000001980)) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:38:11 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c6d73697a653d3078303030303030303030303030316364382c009c38921ed0ebabacc196adbc6e6db12ca57402bd96dfa6a794c9b9ebc1075254b61b7089277bf0a4e53805cc35d26b3d30710be20cab356b8acea13c82dc304d56af4578ec62945039cd534026654dc6a6520e842e699f57b8b55775c4589179"]) 02:38:11 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) (fail_nth: 4) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:38:11 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x4, 0x0}}], 0x300, 0x102, 0x0) 02:38:11 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x0, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) [ 1782.423262] 9pnet: Insufficient options for proto=fd [ 1782.430172] FAULT_INJECTION: forcing a failure. [ 1782.430172] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1782.433202] CPU: 1 PID: 19951 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 1782.434628] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1782.436313] Call Trace: [ 1782.436850] dump_stack+0x107/0x167 [ 1782.437609] should_fail.cold+0x5/0xa [ 1782.438400] __alloc_pages_nodemask+0x182/0x600 [ 1782.439349] ? fault_dirty_shared_page+0x3f0/0x3f0 [ 1782.440096] 9pnet: p9_fd_create_tcp (19956): problem connecting socket to 127.0.0.1 [ 1782.440354] ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130 [ 1782.443172] ? count_memcg_event_mm.part.0+0x10f/0x2f0 [ 1782.444231] ? lock_downgrade+0x6d0/0x6d0 [ 1782.445063] ? mark_held_locks+0x9e/0xe0 [ 1782.445905] alloc_pages_vma+0xbb/0x410 [ 1782.446719] handle_mm_fault+0x152f/0x3500 [ 1782.447583] ? __pmd_alloc+0x5e0/0x5e0 [ 1782.448376] ? vmacache_find+0x55/0x2a0 [ 1782.449182] ? vmacache_update+0xce/0x140 [ 1782.450034] do_user_addr_fault+0x56e/0xc60 [ 1782.450914] exc_page_fault+0xa2/0x1a0 [ 1782.451701] asm_exc_page_fault+0x1e/0x30 [ 1782.452539] RIP: 0010:copy_user_generic_string+0x2c/0x40 [ 1782.453645] Code: cb 83 fa 08 72 27 89 f9 83 e1 07 74 15 83 e9 08 f7 d9 29 ca 8a 06 88 07 48 ff c6 48 ff c7 ff c9 75 f2 89 d1 c1 e9 03 83 e2 07 48 a5 89 d1 f3 a4 31 c0 0f 01 ca e9 f3 d1 1e 02 0f 1f 00 0f 01 [ 1782.457341] RSP: 0018:ffff88804db9fab8 EFLAGS: 00050202 [ 1782.458412] RAX: 0000000000000001 RBX: 000000000000004c RCX: 0000000000000009 [ 1782.459841] RDX: 0000000000000004 RSI: ffff8880481e4000 RDI: 0000000020000040 [ 1782.461276] RBP: 0000000020000040 R08: 0000000000000000 R09: ffff8880481e404b [ 1782.462707] R10: ffffed100903c809 R11: 0000000000000001 R12: ffff8880481e4000 [ 1782.464139] R13: 000000002000008c R14: 00007ffffffff000 R15: 0000000000000000 [ 1782.465616] copyout.part.0+0x10b/0x140 [ 1782.466419] _copy_to_iter+0x293/0x12d0 [ 1782.467226] ? show_console_dev+0x3e4/0x4f0 [ 1782.468097] ? _copy_from_iter_nocache+0xd60/0xd60 [ 1782.469089] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1782.470150] ? __virt_addr_valid+0x128/0x350 [ 1782.471036] ? __check_object_size+0x319/0x440 [ 1782.471963] seq_read_iter+0xdcb/0x12b0 [ 1782.472782] proc_reg_read_iter+0x20a/0x2e0 [ 1782.473668] new_sync_read+0x424/0x6f0 [ 1782.474459] ? ksys_lseek+0x1b0/0x1b0 [ 1782.475226] ? _cond_resched+0x12/0x80 [ 1782.476011] ? avc_policy_seqno+0x9/0x70 [ 1782.476824] ? selinux_file_permission+0x92/0x520 02:38:11 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) r1 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getegid() fchownat(r1, &(0x7f0000000040)='./file0\x00', 0xee00, r2, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) [ 1782.477821] vfs_read+0x457/0x580 [ 1782.478684] __x64_sys_pread64+0x201/0x260 [ 1782.479534] ? ksys_pread64+0x1b0/0x1b0 [ 1782.480341] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1782.481410] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1782.482474] do_syscall_64+0x33/0x40 [ 1782.483229] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1782.484262] RIP: 0033:0x7f2cd44e8b19 [ 1782.485016] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1782.488693] RSP: 002b:00007f2cd1a5e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 1782.490223] RAX: ffffffffffffffda RBX: 00007f2cd45fbf60 RCX: 00007f2cd44e8b19 [ 1782.491651] RDX: 000000000000101e RSI: 0000000020000040 RDI: 0000000000000004 [ 1782.493081] RBP: 00007f2cd1a5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1782.494525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1782.494536] R13: 00007ffef259577f R14: 00007f2cd1a5e300 R15: 0000000000022000 02:38:11 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x6c, 0x0}}], 0x300, 0x102, 0x0) [ 1782.594612] 9pnet: p9_fd_create_tcp (20045): problem connecting socket to 127.0.0.1 02:38:11 executing program 4: ioctl$BTRFS_IOC_SCRUB_CANCEL(0xffffffffffffffff, 0x941c, 0x0) ioctl$RTC_UIE_ON(0xffffffffffffffff, 0x7003) r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000000c0), 0x101003, 0x0) pread64(r0, &(0x7f0000000580)=""/178, 0xfffffcd3, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x10b6) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x8, 0x0, 0x4, 0x4d, 0x0, 0x5e, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}, 0x112, 0x5, 0xa, 0x0, 0x0, 0xfffffffd, 0xfffd, 0x0, 0x1}, 0x0, 0xa, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000340)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x6, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262cc5dd8b5bc96f21bc84022b67785d6741984f29f705f842bd5a0870925cdb5d80eb689f80ea6ff07d3876a48c6519dad01907103c1df3928cb15b27437eb6e994a4bed70de6", 0x97, 0x7}, {0x0, 0x0, 0xffffffffdffffff4}, {&(0x7f00000004c0)="02000000000000a499175e68a78de43a27ad80a50cf4985f4557c5795f8617aff5dfc4cfbd4eb8b5ecff8f53a98fe9ccc27717b3d7ee3d18951416f5251df130d7e9658894f2a741f9903ff47a8080b7933dd7c0cff5e728c65b0e6f0d35ec62b82b94ffcd5ee162b68cdf54792576dcb8cebc6c246c7cf898d22100c4ab9ae3b25e8f6068a51d00"/145, 0x1, 0x800}, {&(0x7f0000011600)="f441000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000180)=ANY=[]) pkey_mprotect(&(0x7f0000ff4000/0x3000)=nil, 0x3000, 0x0, 0xffffffffffffffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f00000003c0), 0xa000) r2 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r2) r3 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000fed000/0x13000)=nil, 0x13000, 0x0, r3) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, r3) pkey_mprotect(&(0x7f0000ff8000/0x2000)=nil, 0x2000, 0x8, r3) pkey_mprotect(&(0x7f0000ff4000/0x2000)=nil, 0x2000, 0x0, r2) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$PTP_CLOCK_GETCAPS(r4, 0x80503d01, &(0x7f0000000140)) 02:38:11 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) sendfile(r0, r2, &(0x7f00000000c0)=0x6, 0x2) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) r3 = openat$incfs(r1, &(0x7f0000000000)='.log\x00', 0x2000, 0x2d) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) 02:38:11 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x0, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "8fa26d6492245ab2c4b2804da276d13b80d6eab731469ef9bd0bd6682f9e0f183009df520ebabe821c9b00d346ccc20828be94fe69407a15053824a6258f96486c0bb31ccac6220be6e4d98329e1bc353ffbde84b1a7b5ead8d77596f4037616d5800509dec7554bdb41197e466643fbcba5f2b0809e0a36800cf0c8c10bff5e61e7ccfb75b4a266a9d1310c0fef7649df2905ffa29534d9db1759a2d718d137309c601822cb64a19452b20388f852c4a21013a11c6f094964fc119a918a11dd68ee0c756635919af6fc1f2ba2e26d1f57a88d98226a2443498c8178b3ccb82cae834c01282312063cbe896bfdb6e96a24c116f81389f50032173a92fb17d1", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:38:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x3) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:38:11 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getegid() mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:38:11 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x2000, 0x0}}], 0x300, 0x102, 0x0) [ 1782.728897] 9pnet: Insufficient options for proto=fd 02:38:11 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0xa) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1782.774927] 9pnet: p9_fd_create_tcp (20098): problem connecting socket to 127.0.0.1 [ 1782.931177] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1782.932186] print_req_error: 6 callbacks suppressed [ 1782.932201] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1782.934723] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1782.936395] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1782.946577] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1782.947716] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1782.949491] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1782.949519] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1782.951706] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1782.953747] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1782.955429] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1782.955459] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1782.957629] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1782.958492] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1782.961773] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1782.961864] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1782.963919] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1782.966173] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1782.967940] blk_update_request: I/O error, dev loop4, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1782.968004] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1782.970079] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1782.972350] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1782.972388] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1782.974838] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1782.974880] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1782.977286] Buffer I/O error on dev loop4, logical block 2096903, async page read 02:38:25 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:38:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = add_key(&(0x7f00000000c0)='asymmetric\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="0500000000f20000e1176261818f7adb698544c88b34dcb70b0fa7439771e000002a6c75c2000000"]) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000600)=ANY=[@ANYRES16=r1, @ANYRESOCT, @ANYRESOCT=r0, @ANYRES64, @ANYBLOB="a73daa0009a33228466efa9f5849689752bc4c1f0f04e967b39b584103539f5cddc73ccbaf85d7db4b9bb3acd9d61358fa3e8e01", @ANYRES64=r1]) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x1f, 0x0, 0x80, 0x0, 0x0, 0x9, 0x28000, 0x4, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x3}, 0x80, 0x4bd, 0x6, 0x3, 0x7d0e9dee, 0x6, 0x200, 0x0, 0x6, 0x0, 0x8}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) add_key$keyring(&(0x7f0000000140), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r0) add_key$fscrypt_v1(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$restrict_keyring(0x1d, r3, 0x0, 0x0) keyctl$link(0x8, r3, r3) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r2, {0xee01, 0xffffffffffffffff}}, './file0\x00'}) statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x6000, 0x2, &(0x7f0000000340)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d020000000000000200000000", 0xc7, 0xb800}], 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="696f636861727365743d63703836312c00821a7bd1d6b77ea6b5d7aa2faef19ba58ad7318fc3848cdf9eeccaa103d375e011d42d3f1bd3480f89209ed5f776b8fa8f67d6d5f948868d037b46e6f2d6136e7e22a0256371e9a0a3ed628741ee28c1a557112599f933e194ee9b7ee62c3b88389810c501566ea64efe12f902a86c58f463a19b70833da04ef0fa7bf8ddce23939ac3cd186526e6d230338dae487c6c3edd8c4abb98653c31f5e43c7ff277c9264ec34981a66c1561356d8b88767acb93b02228b5cabad4ddfa7ab505f7a75b4cfc2db3f49de6359f828ceaaf66f90e49a4"]) 02:38:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) (fail_nth: 5) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:38:25 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x4) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:38:25 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:38:25 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x4000, 0x0}}], 0x300, 0x102, 0x0) 02:38:25 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_WRITEV={0x2, 0x2, 0x4000, @fd_index=0x2, 0x4, &(0x7f0000000940)=[{&(0x7f00000000c0)="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", 0xfd}, {&(0x7f0000000380)="7a8eaab16862bab910347aa6ec3a6493784cd7fe7bd03c0c8281f68ae1f273c2f52018ba690ad3cd4a91f294f290d64754954bec0349304d16c1f8023146a9c30f053c5efa4e1ffcc7d795f93a373616b26c966bf868220ab488cb8720db09343caaf25b88e7e4057a25b61e407348326afbac511db75b74c08569dc6903dba387938ff9ebc9c4df0baaed78d3121aa4c9befb449fcbfdd957b1a1455a7031d240c82f0a1a67b32dfd9fceb8c7ff9c8dc8b78b8dd02561aa78b0c03cdf030e9d5482acd0fb7a20e410685db67c39d1d2336f8a62b03336c54dd7e650b38ba0b1e3d4d6085bd1bad57edc", 0xea}, {&(0x7f0000000280)="6e4e1269acb3e53e145ff76c546894aac841b6fada7e444a45cbfa3d79d7d88ff7b3263684a1f41b360a8e8e0a2659816353a11ec2b7c1e438004eb78fcebc4c25f3426948ac3117e62ad862a36fdbc8cdf83b7b79e46bb9bbe7", 0x5a}, {&(0x7f0000000540)="4d03f246e6317ba94807073d2f68a896c7044fcd35ad3603e245f6db4c9a3dd818a7f89d3ea7c11389625a55a1cfa6a1a5569aa5b810c1b2d0cb03955131452a92245d159b870daa2d710a22268a1f9439e64262d9f19c4f678dfcc4b91a43895ff5d9d8965efe31f850ef3ca41693aaba467c5072795d2a0de2cf30839af8e04d0040827a152070ae9e", 0x8a}, {&(0x7f0000000600)="1a4a9c6620e8fc8da93bd338be143e14d8aa0174e17d0633f7bb135986096e152555cdbe903ddc74e0d43bf25ce92908b9148818da6f4b926f35bde3ead68f39708c8177e9d139862986958869e62810e656741535fb6eccb69dfd517926ebaa04f1e64716b552a1d80ea7a0cd65d9fd7e1a33e02778c9684045a4423bd2eeae76029da77a66743161c0255ab169c1f73f9c223db43fb460adf90e025d1632e8ce1c34", 0xa3}, {&(0x7f00000006c0)="6c6034c7dacdf26d2d22eb61983597e771ec0da60c9ed41433e368f23e2dc36b07d8aa8d490928c02a1eed62b48d741e78788b5e33ba5ff61fcf6da20f107fd0e30cd209f18d8038d3421e3b4ac9fbbac583dd74097b2b992ba4431f62bdb7041b2601a9af699a67556aaec438153a3202a157673617d78911186c8a4b46cf52afd873bfea1d74edbd9c12c52386858fda693c975fc9c3814bd3", 0x9a}, {&(0x7f0000000780)="c5f7dd7ee9e6f2e18edf64f77349d8ea37f323a30bb99810f8389d1ded5ebe3dc5c8c19b20af8a7405ac4be0c028e17130a18403640b85c28cdee1c4d06ad383c88bf0b980631ac3e88d809de9ecefda753671199a67e6611975e7734f854ac27bbf1793557f70b1cfe79516819f5eebf0af1e8eaec97d730be5d89706858ed074fe65dfac67868a78588ffc9efdf340411f0a52395353d6501165ef92c6842ab8dd415325af8f4078b03b43b90c45bab6091d0f8acee59253e8d6d9a3e8bfe1a063a072d6448f45d57fc0eb5cea6eb2871bcca0a3", 0xd5}, {}], 0x8, 0x0, 0x1, {0x2}}, 0x9) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) 02:38:25 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) [ 1796.432131] FAULT_INJECTION: forcing a failure. [ 1796.432131] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1796.433509] CPU: 1 PID: 20203 Comm: syz-executor.7 Not tainted 5.10.199 #1 [ 1796.434281] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1796.435206] Call Trace: [ 1796.435503] dump_stack+0x107/0x167 [ 1796.435916] should_fail.cold+0x5/0xa [ 1796.436342] _copy_to_user+0x2e/0x180 [ 1796.436766] simple_read_from_buffer+0xcc/0x160 [ 1796.437294] proc_fail_nth_read+0x198/0x230 [ 1796.437781] ? proc_sessionid_read+0x230/0x230 [ 1796.438284] ? security_file_permission+0x24e/0x570 [ 1796.438830] ? perf_trace_initcall_start+0x101/0x380 [ 1796.439394] ? proc_sessionid_read+0x230/0x230 [ 1796.439900] vfs_read+0x228/0x580 [ 1796.440290] ksys_read+0x12d/0x260 [ 1796.440686] ? vfs_write+0xa70/0xa70 [ 1796.441114] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1796.441722] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1796.442321] do_syscall_64+0x33/0x40 [ 1796.442749] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1796.443317] RIP: 0033:0x7f2cd449b69c [ 1796.443747] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 1796.445848] RSP: 002b:00007f2cd1a5e170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1796.446731] RAX: ffffffffffffffda RBX: 000000000000004c RCX: 00007f2cd449b69c [ 1796.447544] RDX: 000000000000000f RSI: 00007f2cd1a5e1e0 RDI: 0000000000000005 [ 1796.448361] RBP: 00007f2cd1a5e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 1796.449280] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1796.450118] R13: 00007ffef259577f R14: 00007f2cd1a5e300 R15: 0000000000022000 [ 1796.466562] 9pnet: Insufficient options for proto=fd [ 1796.469372] 9pnet: p9_fd_create_tcp (20213): problem connecting socket to 127.0.0.1 02:38:25 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x6c00, 0x0}}], 0x300, 0x102, 0x0) 02:38:25 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x5) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:38:25 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:38:25 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:38:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:38:25 executing program 4: ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000340)=0x85) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)={{0x77359400}}) r1 = inotify_init() ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000280)={{0x1, 0x1, 0x18, r1, {0x5}}, './file0\x00'}) clock_gettime(0x2, &(0x7f0000000000)) r2 = fork() clock_gettime(0x0, &(0x7f0000000180)) pselect6(0x40, &(0x7f0000000080)={0x5, 0xffffffffffffff1f, 0xfffffffffffffffe, 0x5, 0x1, 0x5, 0x429d, 0x101}, &(0x7f00000002c0)={0x2, 0x337, 0x3, 0x7fffffff, 0x433c, 0x2, 0x4}, &(0x7f0000000100)={0x5, 0x0, 0xdffffffffffffffd, 0x1, 0x8, 0x80000001, 0x636d, 0x5}, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f00000000c0)={&(0x7f0000000200)={[0x100000000]}, 0x8}) ptrace(0x10, r2) ptrace$getregset(0x4204, r2, 0x202, &(0x7f0000000140)={&(0x7f0000001280)=""/4096, 0x1000}) dup3(r0, r0, 0x80000) [ 1796.657161] 9pnet: p9_fd_create_tcp (20341): problem connecting socket to 127.0.0.1 [ 1796.741894] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1796.743096] print_req_error: 6 callbacks suppressed [ 1796.743115] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1796.746351] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1796.746420] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1796.747618] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1796.750266] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1796.752386] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1796.752454] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1796.753583] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1796.756218] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1796.758354] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1796.758551] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1796.759535] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1796.764348] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1796.766500] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1796.766576] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1796.767701] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1796.770363] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1796.772516] blk_update_request: I/O error, dev loop4, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1796.773690] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1796.774533] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1796.775751] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1796.775815] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1796.777766] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1796.777821] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1796.779753] Buffer I/O error on dev loop4, logical block 2096903, async page read [ 1796.991814] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1796.993042] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1797.000137] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1797.001353] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1797.004201] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1797.005568] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1797.006860] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1797.008090] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1797.009306] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1797.010542] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 02:38:37 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) timer_delete(0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) capset(&(0x7f0000000000)={0xc92bfb053a14a5a}, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/65, 0x41) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x50, 0x2, 0x3, 0x3, 0x0, 0x0, {0x3}, [@NFQA_CFG_CMD={0x8, 0x1, {0x3}}, @NFQA_CFG_PARAMS={0x9, 0x2, {0x2, 0x1}}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x2}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x18}, @NFQA_CFG_CMD={0x8, 0x1, {0x0, 0x0, 0x1f}}, @NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x8}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x1}]}, 0x50}, 0x1, 0x0, 0x0, 0x8080}, 0x4000004) timer_gettime(r1, &(0x7f0000000280)) timer_gettime(r1, &(0x7f0000000080)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) 02:38:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x6) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:38:37 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x40000, 0x0}}], 0x300, 0x102, 0x0) 02:38:37 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:38:37 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:38:37 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) sendmmsg$inet6(r0, &(0x7f0000000480)=[{{&(0x7f0000000180)={0xa, 0x4e21, 0xe54b, @loopback, 0xffffffff}, 0x1c, &(0x7f00000002c0)=[{&(0x7f0000000200)="d78328b521feadbf1cb90d766d66c34770f84220fc6eca009ef85aa6fa5ff8772de349f27dc12af6d2401b7386a501a501c066bd711d4070", 0x38}, {&(0x7f0000000280)="21b86ff7ecc8cd1ff10bc9c64a463e72a09a9abaa893", 0x16}, {&(0x7f0000000380)="78ae87bad35c2e2fe9c2def891a2011fbd919d8fe32311d640a9b451767d4451a8b385c015f8c40481f47887d58c807c512e19eab2a4534f289b75f222a44a317db6ffe19fdb7b423ed1723cd015965171602fbb336bb0ce6b06691103b4ba16c8323873e0f3b00f79857a23c85adfc8d1e3d0dbc39748052e1f6fdb21a1593db9c13be774d6b6d5f6fb793d229208b37ea5a9581e8f1e80e4a60271f2a66853c7e058e8ccb772cb387d259148e8357b980f3aa0c1db6be9bbb8e33bb6c0691b97afde12b69003e660a55ae6ea7cb2db31f5a7671d8c5718e4bf27b9134e93d467836e75d69369fce5b64785a866cbeb80fefc22358f40e9a4", 0xf9}, {&(0x7f0000000540)="a549313ab4f45646e8302a627b0fd12cc22da2995b92236f2e23e278f26481f68be62271d08d7933a664c270c13159d3df2447c1c5b3985d581c7d53d4f6f2de6781f40607ca86a8e651a1478f6abb80455cf89e07cec765d031a1ff6cf7aeb490f6c42592ea116afeed78f689220f87218d82a0a91c1a0e4c84dc6ff01ae91b969f9f6f0ea66291c62082b7b7b53a3b7bc4d50514db35f8755460f9d41553164916d0ae8342ba459c4bec136a25c7a959ff7e0d0b02ed097a9fe72e4aa280fc949caf9d20daa82da5a7a7cea092be5d934ac9c1bc17ce4a19c84fe9256bc44b9736c440ad0002", 0xe7}], 0x4, &(0x7f0000000640)=[@dontfrag={{0x14}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x2}}, @hoplimit={{0x14, 0x29, 0x34, 0x5}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x84, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x20}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x7}}], 0x80}}], 0x1, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) fchdir(r1) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) stat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) open(&(0x7f0000000000)='./file1\x00', 0x4000, 0x0) 02:38:37 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) openat2$dir(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:38:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x2a, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1808.727871] 9pnet: Insufficient options for proto=fd [ 1808.730441] 9pnet: p9_fd_create_tcp (20366): problem connecting socket to 127.0.0.1 02:38:37 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x200000, 0x0}}], 0x300, 0x102, 0x0) 02:38:37 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(0xffffffffffffffff, 0x4040942c, &(0x7f00000000c0)={0x0, 0x0, [0x5, 0x7]}) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:38:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x4c, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:38:37 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) [ 1808.888134] 9pnet: p9_fd_create_tcp (20485): problem connecting socket to 127.0.0.1 02:38:38 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:38:38 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x3665c4, 0x0}}], 0x300, 0x102, 0x0) 02:38:38 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080)=0x0, 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='t\x00a\x00\x00\x00', @ANYRESDEC=r0, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYRESDEC=r1]) 02:38:38 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x4c) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1808.959852] 9pnet: p9_fd_create_tcp (20492): problem connecting socket to 127.0.0.1 [ 1809.212871] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1809.214057] print_req_error: 22 callbacks suppressed [ 1809.214075] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1809.217330] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1809.218448] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1809.220633] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1809.221771] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1809.223983] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1809.225103] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1809.227285] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1809.229444] buffer_io_error: 6 callbacks suppressed [ 1809.229456] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1809.232073] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1809.234223] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1809.235786] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1809.237944] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1809.239515] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1809.241694] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1809.243380] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1809.244508] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1809.246754] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1809.247875] blk_update_request: I/O error, dev sr0, sector 2096901 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1809.250111] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1809.251321] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1809.257759] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1809.259346] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1809.260908] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1809.262474] Buffer I/O error on dev loop4, logical block 2096903, async page read 02:38:51 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="0500000000f20000e1176261818f7adb698544c88b34dcb70b0fa7439771e000002a6c75c2000000"]) msgctl$IPC_RMID(0x0, 0xff0f0000) preadv(r1, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/123, 0x7b}], 0x1, 0x2fc00000, 0x2) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) ioctl$BTRFS_IOC_SEND(r0, 0x40489426, &(0x7f0000000280)={{r2}, 0x7, &(0x7f0000000140)=[0x3, 0x941, 0x2, 0x9, 0x8, 0xff, 0x0], 0x7f, 0x1, [0x7ff, 0x2, 0x10001, 0x10000]}) r3 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r3, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="0500000000f20000e1176261818f7adb698544c88b34dcb70b0fa7439771e000002a6c75c2000000"]) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r3, 0x8008f511, &(0x7f0000000180)) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="7472616e733d66642c72d038cf243d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',msize=0x0000000000001cd8,\x00']) 02:38:51 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:38:51 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x68) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:38:51 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x7) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:38:51 executing program 3: mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:38:51 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x2000000, 0x0}}], 0x300, 0x102, 0x0) 02:38:51 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x2000105e, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:38:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) stat(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000540)=@acquire={0x244, 0x17, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}}, @in=@local, {@in=@empty, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, r1}}, 0x0, 0x4}, [@algo_auth_trunc={0x119, 0x14, {{'sha384-ce\x00'}, 0x668, 0x180, "faa42a328de8bc9f415f5e16d11e92054ce16a6aea030a5ddc73b7519f28785bfb163b28a4880b6ed653a013d829055ed5c5bfab26806ad11722e12faee442b267607600e0ef56b3ec0f5c7c813be3f21674c2e5dcf80108a83e9d32df18d9e05f1eea953a85eb125ce27f42abae17b7ff7e75e7191e33f6a94ea7e4768c7312888a70db952b934349856e2571d3e458dcefe9eee31ae1d2a4e27f3850469b214ea46cebb32c19f3b794434e65dc8ed77f2521b8d3a2c01a6d1ed554a8497396ebd7dbac9d296536fbf65bf053"}}]}, 0x244}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, 0x0, 0x98a) creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000080)={0x14, 0x22, 0x69844ea0a6ddcd11}, 0x14}}, 0x0) ioctl$FS_IOC_GETFSMAP(r2, 0xc0c0583b, &(0x7f0000000080)=ANY=[@ANYRESOCT]) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000180)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/cpuset.cpus\x00', 0x42, 0x0) io_setup(0x2, &(0x7f0000000140)=0x0) io_submit(r4, 0x1, &(0x7f00000008c0)=[&(0x7f0000000180)={0x0, 0x0, 0x5, 0x1, 0x0, r3, &(0x7f0000000000)='1\"', 0x2}]) setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)=@sha1={0x1, "23a643d1fd6fb9cbab450feb2e06b39ad4d56c71"}, 0x15, 0x0) unshare(0x48020200) unshare(0x10000000) [ 1822.336986] 9pnet: Insufficient options for proto=fd 02:38:51 executing program 1: modify_ldt$write(0x1, &(0x7f0000000000)={0x100, 0x1000, 0x400, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1}, 0x10) r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0xa000, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000540)) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) flock(r0, 0x1) 02:38:51 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x6c) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:38:51 executing program 3: mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:38:51 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x40000000, 0x0}}], 0x300, 0x102, 0x0) [ 1822.501026] 9pnet: Insufficient options for proto=fd 02:38:51 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:38:51 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x8) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:38:51 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) 02:38:51 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x2) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:38:51 executing program 3: mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:38:51 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x74) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1822.676741] 9pnet: Insufficient options for proto=fd 02:38:51 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) [ 1822.985282] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1822.986198] print_req_error: 6 callbacks suppressed [ 1822.986213] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1822.988645] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1822.990268] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1822.996357] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1822.996964] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1822.998153] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1822.999319] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1823.000518] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1823.001136] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1823.002322] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1823.003463] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1823.004812] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1823.005403] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1823.006584] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1823.007731] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1823.008960] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1823.009548] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1823.010715] blk_update_request: I/O error, dev loop4, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1823.011863] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1823.013050] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1823.014022] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1823.014633] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1823.015476] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1823.016808] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1823.019699] Buffer I/O error on dev loop4, logical block 2096903, async page read 02:39:06 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:39:06 executing program 4: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_bp={0x0}, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="0500000000f30080e117796165000000658bb38575"]) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x5, 0x0, 0x0, 0x80, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, r1, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x3, 0x2, 0x0, 0x5, 0x0, 0x0, 0x0, 0xd, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}, 0x4, 0x7, 0x81, 0x6, 0x2, 0x1f, 0x5, 0x0, 0xbd2, 0x0, 0x6}, r3, 0x8, r2, 0x3) r4 = fsopen(&(0x7f00000000c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$GIO_FONTX(r5, 0x4b6b, &(0x7f0000000340)={0x163, 0xe, &(0x7f0000000500)}) ioctl$EXT4_IOC_SWAP_BOOT(r5, 0x6611) r6 = syz_open_dev$vcsu(&(0x7f0000000400), 0x2, 0x28000) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x2, 0x6, 0x4, 0x5, 0x0, 0xfffffffffffffff7, 0x8024, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x0, 0x3}, 0x800, 0x2d, 0x0, 0x5, 0x2f7, 0x59, 0x6, 0x0, 0xfffffff8, 0x0, 0x2008}, r3, 0xf, r6, 0x8) timerfd_settime(r5, 0x1, &(0x7f00000002c0)={{}, {0x0, 0x3938700}}, &(0x7f0000000300)) tee(0xffffffffffffffff, 0xffffffffffffffff, 0x800, 0x0) writev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000000)="fec16210336d9f15c3f8400da3694e40385168dc10f8961e29124019f32e47787236a0e855ee8464b55fe708ef42b431889a61e2e1fac8c5d0ed57ccd35f1bedc03e0129cf02acb9595142c9c51b62a981907b0a776e02fd43307e22511a07d327d39ba89f", 0x65}], 0x1) perf_event_open(&(0x7f0000000240)={0x5, 0x80, 0xbb, 0x81, 0x9, 0x3, 0x0, 0xffff, 0x444, 0xc, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xfffffffa, 0x2, @perf_bp={&(0x7f0000000100), 0xa}, 0x1, 0x2, 0x3, 0x8, 0x0, 0x2, 0x1, 0x0, 0x101, 0x0, 0x8}, 0x0, 0x2, r0, 0x2) 02:39:06 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x7a) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:39:06 executing program 1: r0 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r0, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x0, 0x2}, &(0x7f0000000440)='\xe8\xff\xff\xff\xff\xff\xff\xff\x00\x9d\x00\xf1\xad\xa2.\x803\x7f\xb5U\x18w\xae\x91mLO\x85\xc1D\xf8/\x19Vc\xb0\xc8\xaba\xa9T\xb2\xa4\x9d8\x13kc|Lgj V{\xddKF\xbb6\xf5\xa2\xe5\\/\xf0]\xe6\x0e2\xb5o4\xba\x98\x1e{\xcfZ\x1d\x84\xe0\xa5V\x1c3\xd78A\x9eK\x16\xfcXD\xe3\x9a,W\xb3\xc0\xeb\xcd\xf6\x89\x95\x9e\xa9\xc2H\xc5\xaa\xd8\x101!\xa3\x83\x1b\x83m\xe3RK8\xeby\xaa\x88\x94a\xea\xab#\xce*\x0f\xa0\x8c\xca\x15\xea\xdaf:\xf6\x1b\xbf\x9fR\xba\xb5\xb0\xf7\xf5g\xb1\xdcU;\x1bL\xbd\v\xc4\xf8\xf5\xd8\xd3\xba\x8a5\xa0\x00\xc2\xd7\xe0Y\xd3\xa27\xb4S\xb1bd\x05\x9bD\x01\x85b5U\xb4\x8c\x17\xf4f0P\x9f\xe9`W\xb4\xe0\xf0\x19\xc2\x87P><\xb48\xd2Jb,7\xdc2/\xdd_\xdbXT\xffZ\x12p\xac\xdb[\x00\x00\x00\xf1\xdc\xd4\x99C9\x90\x10T\xf4:\xd6\x15\xff\xe06\x99iM;\xd6\x8c\x96\xdes\xa2\xa7v>\xd8W\xf6B\x9e-*\x83\x1c\xe1\x04\x15E\xa2\xe2S\xee\xb1\x97B\xa7\x9cKN\xfb\x14m\x84\x85A\xb7\x10g\x86\x04\x148{\vh\x14\x94\x81?\x14\xc7\xb5\xd9\xc1\x8f\x9e\xb9l\xbb\xb1H\xa3e\x7f-\xfb\xc2L\xe5\xf6p\xc5\x82\xcb\x85\xe80\xaf6\xf3\xd5\xa1\xe0\xc9\xe6\xb0', r0) r1 = add_key$keyring(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r1, 0xfffffffffffffffe, 0x0, 0x0) request_key(&(0x7f0000000080)='dns_resolver\x00', &(0x7f0000000040)={'syz', 0x0, 0x2}, &(0x7f0000000440)='\xe8\xff\xff\xff\xff\xff\xff\xff\x00\x9d\x00\xf1\xad\xa2.\x803\x7f\xb5U\x18w\xae\x91mLO\x85\xc1D\xf8/\x19Vc\xb0\xc8\xaba\xa9T\xb2\xa4\x9d8\x13kc|Lgj V{\xddKF\xbb6\xf5\xa2\xe5\\/\xf0]\xe6\x0e2\xb5o4\xba\x98\x1e{\xcfZ\x1d\x84\xe0\xa5V\x1c3\xd78A\x9eK\x16\xfcXD\xe3\x9a,W\xb3\xc0\xeb\xcd\xf6\x89\x95\x9e\xa9\xc2H\xc5\xaa\xd8\x101!\xa3\x83\x1b\x83m\xe3RK8\xeby\xaa\x88\x94a\xea\xab#\xce*\x0f\xa0\x8c\xca\x15\xea\xdaf:\xf6\x1b\xbf\x9fR\xba\xb5\xb0\xf7\xf5g\xb1\xdcU;\x1bL\xbd\v\xc4\xf8\xf5\xd8\xd3\xba\x8a5\xa0\x00\xc2\xd7\xe0Y\xd3\xa27\xb4S\xb1bd\x05\x9bD\x01\x85b5U\xb4\x8c\x17\xf4f0P\x9f\xe9`W\xb4\xe0\xf0\x19\xc2\x87P><\xb48\xd2Jb,7\xdc2/\xdd_\xdbXT\xffZ\x12p\xac\xdb[\x00\x00\x00\xf1\xdc\xd4\x99C9\x90\x10T\xf4:\xd6\x15\xff\xe06\x99iM;\xd6\x8c\x96\xdes\xa2\xa7v>\xd8W\xf6B\x9e-*\x83\x1c\xe1\x04\x15E\xa2\xe2S\xee\xb1\x97B\xa7\x9cKN\xfb\x14m\x84\x85A\xb7\x10g\x86\x04\x148{\vh\x14\x94\x81?\x14\xc7\xb5\xd9\xc1\x8f\x9e\xb9l\xbb\xb1H\xa3e\x7f-\xfb\xc2L\xe5\xf6p\xc5\x82\xcb\x85\xe80\xaf6\xf3\xd5\xa1\xe0\xc9\xe6\xb0', r1) r2 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000000c0)={'fscrypt:', @auto=[0x35, 0x31, 0x38, 0x34, 0x39, 0x35, 0x4, 0x61, 0x35, 0x62, 0x31, 0x39, 0x62, 0x66, 0x35, 0x62]}, &(0x7f0000000100)={0x0, "7053cd005df248afb61737493bce5bfd95ae17dd7fc01488004d01e7f0ff10a24a728ea551c62cda62a0d230943ce3608c4f453b1a89ea09a28ddd65e1627827", 0x1b}, 0x48, 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, r0, r1, r2, 0x1) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="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"]) 02:39:06 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x3) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:39:06 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:39:06 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0xa) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:39:06 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x6c000000, 0x0}}], 0x300, 0x102, 0x0) [ 1837.778002] 9pnet: Insufficient options for proto=fd 02:39:06 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0xc4653600, 0x0}}], 0x300, 0x102, 0x0) 02:39:06 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:39:07 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) r1 = clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) r2 = getpgrp(r1) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000340)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xc) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000003c0)=0x0) r7 = openat$cgroup(r0, &(0x7f0000000440)='syz0\x00', 0x200002, 0x0) r8 = clone3(&(0x7f0000000540)={0x21000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000180), {0x36}, &(0x7f0000000200)=""/16, 0x10, &(0x7f0000000280)=""/23, &(0x7f0000000400)=[r2, r3, r1, r4, r1, r6], 0x6, {r7}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="2cd170bff9c8e121d59f17570822d0c2e5e8655c5115f7ad38983c50d04a2e090000007eee6ed46212d903b2", @ANYRESDEC=r5, @ANYRES32=r8]) [ 1837.969215] 9pnet: Insufficient options for proto=fd [ 1838.157633] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1838.158857] print_req_error: 6 callbacks suppressed [ 1838.158876] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1838.162145] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1838.164297] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1838.172845] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1838.174001] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1838.176164] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1838.178345] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1838.180565] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1838.181735] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1838.183933] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1838.186094] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1838.188327] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1838.189468] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1838.192264] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1838.193393] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1838.195604] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1838.197745] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1838.199306] blk_update_request: I/O error, dev loop4, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1838.201434] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1838.203652] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1838.205399] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1838.207215] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1838.212735] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1838.214329] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1838.215929] Buffer I/O error on dev loop4, logical block 2096903, async page read 02:39:19 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0xffffff7f, 0x0}}], 0x300, 0x102, 0x0) 02:39:19 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmallocinfo\x00', 0x0, 0x0) clone3(&(0x7f00000008c0)={0x81041100, 0x0, 0x0, 0x0, {0x23}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) 02:39:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x0) ftruncate(r0, 0x1000003) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, 0x0) fcntl$lock(0xffffffffffffffff, 0x6, 0x0) mkdirat(r0, 0x0, 0x28) getpgrp(0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno', @ANYBLOB, @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000.L,f']) r2 = dup2(r0, r1) r3 = openat(r2, &(0x7f0000000100)='./file0/../file0\x00', 0x203c0, 0x9) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000001c0)={0x0, 0x0}) fcntl$lock(r3, 0x24, &(0x7f0000000140)={0x1, 0xda8543dcaff17c62, 0x40, 0xff, r4}) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) preadv(0xffffffffffffffff, &(0x7f0000001580)=[{0x0}], 0x1, 0x0, 0x0) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0'}, 0xb) 02:39:19 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:39:19 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:39:19 executing program 3: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:39:19 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x4) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:39:19 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x300) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1850.530936] 9pnet: Insufficient options for proto=fd 02:39:19 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x500) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:39:19 executing program 4: syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x9}}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'rose0\x00'}) sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d9f4655fd9f4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="00000000000000000000000085f42d27379e44ba9a8dcb77402e9f71010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="0000000000000000000000000000000000000000000000000000000020002000010000000000000000000000000000000000000004", 0x35, 0x540}, {&(0x7f0000000040)="03", 0x1, 0x640}, {&(0x7f0000000140)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000011600)="ed41000000080000d9f4655fd9f4655fd9f4655f000000000000040040", 0x1d, 0x2400}, {0x0}], 0x0, &(0x7f0000013e00)) 02:39:19 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x5) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:39:19 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:39:19 executing program 4: openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x40440}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x2e, &(0x7f0000000040)={0x0, {{0xa, 0x0, 0x5, @mcast1}}, {{0xa, 0x0, 0x0, @private1}}}, 0x108) setsockopt$inet6_MCAST_MSFILTER(r3, 0x29, 0x30, &(0x7f0000000340)=ANY=[@ANYRES64], 0x110) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000180)={0x2, 0x7e850000, 0x5, 0x0, 0x0, [{{r0}, 0x8e}, {{}, 0x2}, {{r2}, 0x20f}, {{r3}, 0x800}, {{r0}, 0x1ff}]}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) close_range(r1, r5, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r4, 0x80047210, &(0x7f0000000140)) r6 = syz_open_dev$rtc(&(0x7f0000000080), 0x9, 0x101001) ioctl$F2FS_IOC_GARBAGE_COLLECT(r6, 0x4004f506, &(0x7f00000000c0)=0x1) unshare(0x48020200) unshare(0x58040280) r7 = fcntl$dupfd(r6, 0x406, r4) ioctl$BLKSECDISCARD(r7, 0x127d, &(0x7f0000000280)=0x5) 02:39:19 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0xffffffff, 0x0}}], 0x300, 0x102, 0x0) 02:39:19 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:39:19 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_NOP={0x0, 0x4}, 0x921) 02:39:19 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "8fa26d6492245ab2c4b2804da276d13b80d6eab731469ef9bd0bd6682f9e0f183009df520ebabe821c9b00d346ccc20828be94fe69407a15053824a6258f96486c0bb31ccac6220be6e4d98329e1bc353ffbde84b1a7b5ead8d77596f4037616d5800509dec7554bdb41197e466643fbcba5f2b0809e0a36800cf0c8c10bff5e61e7ccfb75b4a266a9d1310c0fef7649df2905ffa29534d9db1759a2d718d137309c601822cb64a19452b20388f852c4a21013a11c6f094964fc119a918a11dd68ee0c756635919af6fc1f2ba2e26d1f57a88d98226a2443498c8178b3ccb82cae834c01282312063cbe896bfdb6e96a24c116f81389f50032173a92fb17d1", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:39:19 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x6) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:39:19 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:39:19 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1850.797011] 9pnet: Insufficient options for proto=fd 02:39:19 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x600) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:39:20 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) [ 1851.061647] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1851.062869] print_req_error: 6 callbacks suppressed [ 1851.062880] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1851.064644] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1851.064654] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1851.064693] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1851.066910] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1851.067510] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1851.069624] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1851.070374] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1851.070441] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1851.071475] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1851.072600] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1851.072683] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1851.077802] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1851.079466] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1851.080092] blk_update_request: I/O error, dev sr0, sector 2096901 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1851.080749] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1851.081292] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1851.083400] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1851.083957] blk_update_request: I/O error, dev sr0, sector 2096902 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1851.084023] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1851.085528] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1851.089267] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1851.101725] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1851.103346] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1851.104927] Buffer I/O error on dev loop4, logical block 2096903, async page read 02:39:33 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:39:33 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x4c) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:39:33 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = fork() sendmsg$nl_netfilter(r1, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40090800}, 0xc, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00', @ANYRES32=r2, @ANYBLOB="040083000c003200020000000000000000"], 0x1454}, 0x1, 0x0, 0x0, 0x808}, 0x10000800) getpgrp(r0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = fork() sendmsg$nl_netfilter(r3, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40090800}, 0xc, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="54140000080601022abd7000fddbdf250000000395ebc53047246d6b2ff2a07321817855e7e58519925e42181a822d28fe1285ae621bdbbad7befc53acc80989bd192c8fd1ce64ebc3c174260e3c8642f487ec9a63e7efbadd50aab19ed1286bc0cb28d4d521e0cb1f714708004e0000000000de1112801563526d995e6114ac15e12c13c9a156b73190485fe35c3aedc2dd0f561ba01b509916f043a92635ff7f4f7067a93562d232b17096584a02b71139d0195dd09d7d60a7309c1fccc7c1ea5ca5b16b8c2fe3c522d25d1977b9c864fdc33bd243c235d548de06ce65bd6eb53db33ea1fd9d0531d366a4be59cbd54593101153daa85f8361cf360c71a11c562486b37019b8e60ff7ede6df9b842e02c25290a93e6c7fb47a72589cd42f9569738809d16cea8055b6f05c28adea97f35d28dcba51529b382d17203b851f3147cc6681895e45be6f1b8be8020f61821384ad194d98752cb3c1cde7c10a8256f318bfcca3d73e49a1e0877754a35438a8621400bac9c8d08ec4eb4dd194c098aae3579ed174fc7ad75e780bad88b436b13778e23542d29c95d2dd28f12cf4b6dcfcdc788959654369db6e5ac0b5cc2d311dc766ece238856a4022f0fc293bd17549a0ed6bb8bcec267474bbee757a9f5751a06bb7e350016401aef1e8809f336d4cddba325b799f97a3f5d4ca59d0b7567a2141dd016a1cb2afbea48385abddb564c27d4926fb9587ea64268184523a464507844ca7555230f68955e16866fd881837b65224ebe603ce77e2190951961cdf0c4e899ac1cbd69aee035a9d49a819e89932b091abf5e48284ca75e074a7b66d217f41aa964dc7dffeff70564fd5a340bf420513c9bd51212cfdda627da4d76b6da7b229f1d1a7e4f8a1f981cb524b2e10771c9683a08e8a179815da1d7eb2d773286d3660c03b4b8487475bfad1bcf32c00cecfa6ba8b4faf2dd2a3cac5df48bda8a05d2e862335fbe0a25d509efc67e846caa51612c6085efce4a391400501123f2202cd203e940dd21c03218f8184656a0d0e9b8291ad60914d226e62117ca2f85a4eac13b588e69efa00584f06c7e2ca773fd39cce224517ee863dbc17867e1f4ee6a35c3db88783f348463d97ecf773117b8a1b750353a3cd9b30cafb4b540af9145ac02ee2d54647d67707d3d01dad4b269ff29f3c3fad5d25728f3c2af9ec0d58f12e57b3b8903b17fccbcc3d219198f991a645b5c5dd9af4855297f5d1688171927e38c379c8d209f8e7175f743f139ca946889741214fe418beaf730acac86e31bbcea5ab521d350c654a1858fd87b3f5d0dbc7348696a9de0d566a0c799843fc597b5936713854f9bddd9f146180dfa7cf67abac4f83f696f9001167a30f9375a5d7b2552f91a53c3b245c9fe3b41e7ca57eb79fbb5ad039d3c7f9669bacdfaa30546fd552bd41d94b5feef42c51c09115ef24e3a753c72d896dce2eceadb0c53eddf01241412a58b206b874e9d80ad3c9d0b17376f96de79d8f3758ae57617def1c23f53b236dce9d17d806866573b4f26323b69f9f178ece82f412faaeb64351a25de1c232080328f3fea8431309ed7819bbd939158e524310d4c26d38ee4cc29ccf0aa74601f20d6acfab238c6c57964cb0a592d2239f15c723adfdd9d46780e1769b9bbe998d32a649a6bb5c7463163d5270213392dcc3d26c9899a71e00bcafdac6a4dde67e824e15ad128c61004d7aa75711d4b5f8d0294a46c78a72b04eb45f4ca6d14e49e1271189843a93340330ef4a6b0aaf23ee1398850c1a14dfb8f0033ee71754a2f6c6f3fa346b529a367f049da7f58806b9931d96958a7f47b54aea058504a3662af05514f973c3c38b463bedf7e5d26a5db318f796eba62b125dde83907a1afd6922f4a165bcf2e40f9d7db5425e92cfdf1ab9d061d411866a7a4ac1b1a0f767949565bf893a82521174e775d0496fc51baf711ef62ab6652b31a13fcd815bcbe92f0848d3e9c309c1c6ef72d74277ccee59bedaa538e72c867922f6ec69492b73e6e4d1f92478c706bd2023f8c13128ca5ca035b4134da2bac9f5e2ac39305da900f4fd309338c4467275b76198623816771f7d2e831fe03910f470291acc9d102f9d895a6334b938e6f5819c8bea0df85532db52f26c4e02a9db4268a017146e076b950cc00fe4ba7f2489d491f662f860d36d927767ac158fb675d5fcef46e358a87e1774314fae60f73a887c9b9c673c58f9248ce9689a3e9b6b7f9c220e8eba53fcabb5674ba9c9fd9ade60b4eec46288904e456723397e72cf738438dd2fcd0ee522216527758e5df11579ce81d562c3336c39ffc02f028729b6faa121cbd3235bf601fd8036dca418383a69f95a2087b79f3566b326e5bb2b96451114e3c65f444018ecd990aa30c29604f717ad68f8df7faf68ca6a649fe35500c45a1cc804e449bd01c6bc76a32ff83a8b736e7dc262361fdffb60157c1dfe638a70a2e623430a9adbb62de9b586434dbae26434dd9b632fcbb49aaf81914035191cb441fbed38c656828c5519fc75fa7ddae7da9f043c2bc1cc939446c866ba1078b00d0de6faf478b427bde7c7498bf5c06f2e9f6f0889257f030eac9e0cd7c57dc478c6dc33b7c1ec98898807762ec01121273f6016c094203bac07e4b13303abb5b85dbcfba1df9da33d1b1ac5fb8af1704c64a370a1691a726093e3f6b8e0f8722b77bca730fc8b066bef7e0f8964fed5e4cbb9479c2c0fde146034925337d21b4fc2ec7392197650a49afd892814f02e9d97c119519f5753db6ce2628e6c8cad122781190202793f52d96f2dc5c6e0098ee7fb0e00232cf75eb670b0530574a276c6954bfa29a1c15088545f752f78c961c1c87cf2c7612f4fdfa2f08d782ec84806d7c0dcf7d172bbd27952715ee3795577af018569114b8238c535a55726dbdbd8d09775ef073e094ca861c9f226efd08b3c6919d4b1c41b2e10e2162806f00db8f9d33c435e66f9904829f6e5bed2f65418cf9f05c39574ccf0a78d422f188cbc4c2026a44fa06036dc76a796fb0b8925ef34624ef52d5ab3f017b5416e4a18ca7b18a1f0187a699b1c5f92554735ca249c49909997caa2d66e1b3198f3b828e0776eaee8d6d8dbae3e954641fc35a3df1132dbb653f4c2740d81c10643bd3d83b9e37e7915e5b1cd815b300f41ef704694ba19c3327bc67b9069cee791b42ce9ddfd0b8159099c76eeaa194c6095292d65cab2ad4f867c7b1e99718a133f29a501e169cb580c5f1175a6e8a42696c028868628a66136119f287a17cb7aab7d39c16d034b2687efb13000c019c6a49d3e0eef7771501dbb264a0bec39950d131396d644d0019a7aa2715d9df88c3bcda91b289ef1de0de78ad07e42129900cee48cdf25229219af7041eb25682a0ab791f977e1f238e3e6289d96861f4708196f1fe4ad1676b31421fc7b0c75b19de988d3053d21f4272707a7f3240f19c0fba758530a7d322052a94d9ddc42b91af889f73703cf2383e0c0607298f1f7b49260dbb31178599110dd39090cb2768f22e0f35b4c99eb757994c3393c29816c672deec4b7a5ca9d6b458b1acdcdbc757fe6307a291b5f6d69d00942e2ec68b05816a1f8e428fdf4217a0447ae61b8b0d7eabf5380c01f337841730313745238bd41428888a1e6b31080ccee40f7d409927947c1903043843e5f62830535bb3c6b328909181832a0a50f86bf3b6503f6cfdb90889ea6ff507a1d92fed6cbc0d541a569f81f706499df61dc41dc258bef787ee51149366d145175a6e7424c4306e388286e67e93041308f8a6689ad0f179456d839b85edb91e2250413a41365bf56e35b10489b87eeb770319dd8e2e210141477f859ce13a6ec4351dbdf0c5b46d644a91ddc526f83babc36080894fd80da81953d0107a5b34401f4ee4a7bfd8f5a9df8944c6414541196f3568e845e4c9103777f5e4e6f6c74da61bcb2c186e556f754df6200f43b1ca8665084df210c8f69487cae371dc0682ffcc64df21ff63391cd3ecc95a6d000f99da3135464c37f51fc5c4bba1dac2ea1e99ad5d2ab01f370765342e939dffb2d0a7cd066cae56ad1fd3cb6689faf1bc4a9f7494ea42c9cd0bdf953f6b25e61f0c37ba3fc6181fec72b919f80a6753908dcf40c57d1092939ebe95d70be5cc68176670008f1e144f2779fe0b706eb677a9b76a01fba222b2a2d1d0abaf956335483a10b314e3368720cf90126a86e7887ee73b072e3b0f5a0f49c1aebe7c3172e2e76430a1713d7d0bc8a0f153655ac5753bc274f9d17effa66425477babad5417d0163fc18e7172da336b6418b3c5cb9891865a8445af4ea5681fc916fc216c1773dff6bdc7e6e4d2f58ae8684d4fb7d1aff427b93b36c6a1c5af507c82e9da1380979c48241d627ec19d7b70b1f65c332d9cd94c1cbf06d16b302155889f1babbb76892472be724eba06ea257a3b0046fed68381622fb0cc9e165b45dc02a1f0b575802ff7c165b233eb973292aa0d5f3d6f0f6351ec3404fb4338534b7f605f61debe161648270fa7b19a0f4fcbc28057b9dbc455c13cefb90b81257acfbed3ad7dba3158afebbb3cbc4090b7373c653596dcc0690d8d16a2b6966c088d055c8cb993c625b2edbb23dd388003939be1670c28710fa9b003f2374405666e537bedc693766316dc7341fa130099ddfd9542114c9bb6eca733eebd13d2f42ac8d5762fb48b9596f6be2b05010375b05689c574a5bb2b2c3186a0caa1d0a3e91328523933ffb6e3501a81e619abb0c2f929082847654dcdfcfbc387eec0c1cb65919c15e2be152cf67ed75017182cc6352776d79ee789d223c034da063dd744b1654f4cc8945a68c448978198375c5ef26e6594a78f8330de499f0d45f4429243d79062b54b9b570bf9c9b6f50316358e0a0ccef97e254d4f8c43d645280f029c6a4d5e267a1b02d110bb1f957c27371a5e4842680cfb25abbb407c277686d633742f755ce4d0557046209ac10dbf990ac49d5236a468b941ac410ad92e4c6baaf251679b36854ed13a01fdb7b2cbee180ad5efb245a925c9be53ed99a873df1627b5f5263fc23e0d66c401279aca8c99b0107d5def9aef96308fc9b38d34f8a33dfe061626e89837fa37a21e173b796e4efad723057ea689b44fc961c55904ead93f47f9d5d6b0a8205727a0a2869d540717f6aa286d53d25e9ea067134998dda9077d9556de7eb5194b2d42538d9f16615976f603db111a99e7e80e2b1126728305f1dccbacf5af9fe71a7df7fa9ed5717469bec20aa2387739eb1c8d9231d1497085e37c2c978bf9833dfbcf530f599b30d0ef88a9dbcf7f370665618ec937dfd3d8625fce60d7efa6e7aeca20942570e32ed8bed1045a7b9968ee0c7d2ff87c935b784cec8fc8f95ddb0a28fa1eebf2ac2d3bf107c23e8a45831332828ac1c58890211ae584d0f66aa47e40efa0445bce82c59f3d4f44b02d6a6d2027cfd92669a44373a2789aca1dc859c710c0da0a4a167725d0a89c2a317ba784759ee54c159e4d962c5b29cbae52d9fb9356aa2cea8bd3a0c27df486ed7afa94cd4f62ca26dc724fbf5411fd63afa3ecc39012932dbd28c0830ff555d3fd0de64c90b768aa9d66bce72b3b9c800193beee1a4f7aab5d571a8999f16327c5eb4fc3502071975727c3fef1210fc751033943d76948210f7d7d5e4067c0d3996bc3041474a8d8096549e17e1456f0cf3db1c081379d647b67f5809cba76ececebe15c646bb5e3987a6405ed0e24229e6c04320b29f53b9cc99d8a3c1c0ccfa2f3193b96793950d2a746f3d8e2e9a9eb0f4a699cd91a07e09d2c3091402172921b0527232463c12b7795e4bd95754aee781cc932947688a058ac2ce414dbc4f6e69622cbb33b71e55d0c64a1e29e17f92e73629da9bb3bd7e3e6bbf6098db9480b4dcab97e502210bb95decfe4c8880515b5134784bc0d2f559491c7273cd8d576ce009933d41158bb0a2cf7f204495faaefb24fcda2e56360ef8b65e1c6ecc3d8e38eb295233ddb31ba588ac87861dd27674878318f8527c15fcfa03e644cc2217060b5c6664bec0369a2ee25ece9521a85de1fde0d305afc180c3f0eea5ee833043d8f313704fb203c91916ae4e68031d5e02fa26a75163e54381f4f1c0e3613449a7b2f08e63506359f3acb6256188531ba0a405b5112c34819f00f4c9e03916cacf26a306b9d1870e719115c3b994ca4079299da48aa4f292ede38faf53cb1af37d1f0ed453be5ed72a6df2fd0a51ece6f68add664dea32c28213b2ba0fe2453224b5cf2d97b9cec78fafe1f054ce2e7bff8e523800222e5353d84fa9d69379af85e85ca1fa25a10ee5da9bf8118271059a4c9f4d54b98af7679d834f6f5509d63cf408d3c9dde3fed6a336df5de0a9645e5bbcfc8a7c3755d45b14ff19e14fa813ee939ceb36f441b37ece4c49e2dee86e94bd1694d9ffc0c398a1983206b868ae8981dd2bdd86927bdbf9ae65bc09efc9354677caab846b0b36d4747766976373e2b9912785fd5af5b75a9e89c57369cc71938a68e667a8d2e09b37f8a4cdf372a48d93dc11d1f4b2ec1285a6fc108479f6dd3f502b890050297a00d0dd035a8635bbd4a3d3cf066a6e0000000277801c004400cd6032075953dd73e5b02e889236acbce6f063d3cb01e12767aa8caf09b020e601971160980372542aa95e49940b711196ceb02fd842cce46ac92ed34b722d91781f032dd34842fc54a1ae5d5e98db813b1be17eeb62c24b5908840bcd93a7eaca0d107a0947dcb85daac2cf0aeaae56dd1f1ffdf9445fe613f94356be469dbc2fe0e6bee554b11fe79e4bf71a15ca04006400baec6dc9e3ac5f6de69fd6f4a815610113c0034785aa04fb53f259fe071005b3de7b0bfe548e7436947b38ca9402388be026f6f5af134d920c8b8db82ea75f5223a1a82240e99e0729ac948735044f12209cd91d38dc6e72d78780000d0a8d8626f9d71179d85cb8ce55fbe8926aa8420c54354164bebb2e7705278d5fcc22a056032a327e3cf9986f3fb904ec00f514306e6d02d4cb3b9116c2fe7cc53b0c3e8fb7172c4c4186058110d6aa44b9fc00dffccb1ce3d1d6ed47bc728fea10faeaf01483592bb35e216bf693a1a0ad41b3f9d7ab42025a6b8f9d6a03fc30c7e3ba6c9d469918700a61e1da0db6f2c5061ddac7b91e8f03e574ee2ef972aa1069a93cff6cb0118938a158fd7d13c1e262005b5d7f979662275254c2f45f43dffb2f97059c3eddfa14b5f1a0a0430c6c472951b8be17f513c059bf5d0fde313945e200e578489408000600", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00', @ANYRES32=r4, @ANYBLOB="040083000c003200020000000000000000"], 0x1454}, 0x1, 0x0, 0x0, 0x808}, 0x10000800) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000380)=0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) r7 = fork() sendmsg$nl_netfilter(r6, &(0x7f00000002c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40090800}, 0xc, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00', @ANYRES32=r7, @ANYBLOB="040083000c003200020000000000000000"], 0x1454}, 0x1, 0x0, 0x0, 0x808}, 0x10000800) clone3(&(0x7f00000004c0)={0x3000c0000, 0x0, &(0x7f0000000000), 0x0, {0x7}, &(0x7f0000001940)=""/102369, 0x18fe1, 0x0, &(0x7f00000003c0)=[r7, r0, r2, r7, 0x0, r4, r5], 0x7}, 0xfffffdce) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) 02:39:33 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x7) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:39:33 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x700) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:39:33 executing program 4: r0 = syz_io_uring_setup(0x5841, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000000480)) socket$inet(0x2, 0x1, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x36, &(0x7f00000000c0)=ANY=[], 0x108) setsockopt$inet6_opts(r1, 0x29, 0x6, 0x0, 0x0) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x800) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000380)={'mangle\x00', 0x0, [0x7, 0x4, 0x1, 0x1d, 0x1]}, &(0x7f0000000000)=0x54) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000200)={0x0, 0x0, 0x0, 'queue1\x00'}) syz_io_uring_setup(0x1, &(0x7f0000000140)={0x0, 0xe3a4, 0x8, 0x80000, 0x97}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000100)) r4 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$BTRFS_IOC_DEFRAG_RANGE(r4, 0x40309410, &(0x7f0000000440)={0x1, 0x1, 0x3, 0x5540, 0x1, [0xff, 0x4, 0x7f]}) write$sndseq(r2, &(0x7f0000000400)=[{0xb6, 0xc1, 0x1, 0x0, @time={0x100, 0xeb}, {0x0, 0x1}, {0x59, 0xbc}, @addr={0x6, 0x7}}], 0x1c) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(0xffffffffffffffff, 0x408c5333, &(0x7f00000002c0)={0x10000, 0x8, 0x0, 'queue0\x00', 0x200}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000600)=@IORING_OP_TIMEOUT={0xb, 0x2, 0x0, 0x0, 0x2, &(0x7f00000005c0), 0x1, 0x1, 0x1}, 0xffffffff) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) fork() r5 = fork() r6 = fork() kcmp(r5, r6, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 02:39:33 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:39:33 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x2}}], 0x300, 0x102, 0x0) 02:39:33 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) [ 1864.846495] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1864.847744] print_req_error: 6 callbacks suppressed [ 1864.847764] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1864.850970] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1864.852071] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1864.854238] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1864.855364] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1864.857547] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1864.858664] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1864.860822] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1864.862935] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1864.864462] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1864.866571] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1864.868103] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1864.870230] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1864.871774] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1864.873849] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1864.876588] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1864.877945] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1864.880167] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1864.881273] blk_update_request: I/O error, dev sr0, sector 2096901 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1864.883455] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1864.884661] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1864.887366] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1864.888938] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1864.890505] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1864.892058] Buffer I/O error on dev loop4, logical block 2096903, async page read 02:39:48 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:39:48 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x4}}], 0x300, 0x102, 0x0) 02:39:48 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3000006, 0x10, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(r1, 0x0, &(0x7f00000000c0)=@IORING_OP_ASYNC_CANCEL={0xe, 0x2, 0x0, 0x0, 0x0, 0x23456, 0x0, 0x0, 0x1}, 0x5) r2 = fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080)=0x0, 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) io_uring_enter(r2, 0x2db3, 0x9013, 0x1, &(0x7f0000000100)={[0x12e]}, 0x8) fcntl$lock(r0, 0x25, &(0x7f0000000000)={0x1, 0x1, 0x200, 0x2, r3}) 02:39:48 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x8) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:39:48 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x68) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:39:48 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0xa00) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:39:48 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:39:48 executing program 4: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0)={0x0, 0xf3e2, 0x10}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200)=0x0, &(0x7f00000004c0)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, 0xffffffffffffff9c, &(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x18}, 0x5) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x40086602, &(0x7f0000000080)={0x2000010}) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000140)={0x8}) r4 = openat(r3, &(0x7f0000000000)='./file0\x00', 0x94000, 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r6, 0x29, 0x32, &(0x7f0000000040)={@private0, r5}, 0x14) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000003c0)={{{@in6=@mcast1, @in6=@private0, 0x4e22, 0x200, 0x4e22, 0x0, 0x0, 0x80, 0x20, 0x2b, r5}, {0x5f748cf5, 0x3f, 0x2, 0xffffffffffff7fff, 0x0, 0x25ff, 0x5, 0xce5b}, {0x80000000, 0x3f, 0x8, 0x5}, 0x1, 0x6e6bb6, 0x2, 0x1, 0x2, 0x1}, {{@in6=@mcast2, 0x4d6, 0x6c}, 0x2, @in6=@private1, 0x3507, 0x0, 0x2, 0xbe, 0xc72, 0x2, 0x6}}, 0xe8) syz_io_uring_submit(r1, r2, &(0x7f00000005c0)=@IORING_OP_OPENAT2={0x1c, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000540)={0x8001, 0x0, 0x13}, &(0x7f0000000580)='./file0\x00', 0x18, 0x0, 0x23456}, 0x400) syz_io_uring_submit(r1, r2, &(0x7f0000000080)=@IORING_OP_ASYNC_CANCEL, 0x0) syz_io_uring_setup(0x365f, &(0x7f0000000240)={0x0, 0x800c931, 0x10, 0x0, 0x310}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f00000001c0), &(0x7f0000000340)=0x0) syz_io_uring_submit(r1, r7, &(0x7f0000000380)=@IORING_OP_MADVISE={0x19, 0x4, 0x0, 0x0, 0x0, &(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x10, 0x1}, 0x7fffffff) r8 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x110b8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2002, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_io_uring_submit(r8, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r9 = openat(r4, &(0x7f0000000500)='./file0/file0\x00', 0x200, 0xb) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000001c40)={'veth0_virt_wifi\x00'}) [ 1879.687202] 9pnet: Insufficient options for proto=fd 02:39:48 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:39:48 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x6c}}], 0x300, 0x102, 0x0) 02:39:48 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:39:48 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_WRITE={0x17, 0x1, 0x4007, @fd=r1, 0x7, &(0x7f0000000140)="38d4e3b3f412bd37fcf069e5d2c8616eedba81fd39b4ccc8e309aecbedb60c0a136bdc07fc434b2155cd033fc886a085adee72c1deb3b9b29c1d37d249fed303cf0b6b4c3fd60044", 0x48, 0x18}, 0x3) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010600)="0243443030310100004c0049004e0055005800200020002000200020002000200020002000200020004300440052004f004d002000200020002000200020002000200020002000200000000000000000be000000000000be252f4500000000000000000000000000000000000000000000000000000000000100000101000001000808001c0000000000001c18000000000000000000001a0000000022001e", 0x9f, 0x8800}, {&(0x7f0000011400)="22001e0000000000001e00080000000008007809140b2a3a0802", 0x1a, 0xf000}], 0x0, &(0x7f0000000280)=ANY=[]) 02:39:48 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1800) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f00000000c0)='wfdno', 0x0, r1) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080)=0x0, 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYRESHEX=r2]) 02:39:49 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x2000}}], 0x300, 0x102, 0x0) 02:39:49 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x14a7) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:39:49 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0xa) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:39:49 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x6c) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1879.903285] 9pnet: Insufficient options for proto=fd 02:39:49 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', 0x0, 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) 02:39:49 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.net/cgroup.procs\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/cgroup.procs\x00', 0x2, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0x80, 0x6) creat(&(0x7f0000000080)='./file0\x00', 0x38) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r3, 0x6611) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r3) write$binfmt_elf64(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="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"/2070], 0x816) syz_mount_image$msdos(&(0x7f00000013c0), &(0x7f0000001400)='./file1\x00', 0x0, 0x0, &(0x7f0000001900), 0x50, &(0x7f0000000280)=ANY=[@ANYRES16=r2, @ANYRESDEC, @ANYBLOB="d2cc4c7927c428e32bd6fbffc51f173a91a59a045d062e7a1999a402000000001cc8c7cccdf691519db5ed7ff08ee809bb02809c8476c1916f5c7712d2280c2cf41442432f7ab601b0d59b0900c19af659e94f5fdf085f96ec86"]) 02:39:49 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x4000}}], 0x300, 0x102, 0x0) 02:39:49 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:39:49 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) [ 1880.083422] 9pnet_virtio: no channels available for device 127.0.0.1 02:39:49 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000000), 0x0, {0xe}, &(0x7f0000000940)=""/102400, 0x19000, 0x0, &(0x7f0000000080), 0x46, {r1}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="2c255a67fe00d6", @ANYRESHEX, @ANYBLOB=',msize=0x0000000000001cd8,\x00']) 02:39:49 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x6c00}}], 0x300, 0x102, 0x0) [ 1880.134192] 9pnet: Insufficient options for proto=fd 02:39:49 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x74) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:39:49 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) [ 1880.224568] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1880.225473] print_req_error: 6 callbacks suppressed [ 1880.225488] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1880.228003] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1880.228011] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1880.229699] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1880.231079] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1880.232163] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1880.233641] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1880.234026] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1880.235627] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1880.237380] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1880.238509] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1880.239383] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1880.241065] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1880.244091] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1880.245006] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1880.246824] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1880.247670] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1880.247708] blk_update_request: I/O error, dev sr0, sector 2096901 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1880.249396] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1880.251242] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1880.252356] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1880.253350] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1880.288703] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1880.289966] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1880.291204] Buffer I/O error on dev loop4, logical block 2096903, async page read 02:40:06 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:40:06 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x4800) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:40:06 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x7a) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:40:06 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) clock_gettime(0x0, &(0x7f000001e7c0)={0x0, 0x0}) recvmmsg$unix(r1, &(0x7f000001e5c0)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000380)=""/180, 0xb4}, {&(0x7f0000000140)=""/47, 0x2f}, {&(0x7f0000000540)=""/155, 0x9b}, {&(0x7f0000000600)=""/206, 0xce}], 0x4}}, {{&(0x7f0000000280), 0x6e, &(0x7f0000019b00)=[{&(0x7f0000000440)=""/97, 0x61}, {&(0x7f0000000200)=""/33, 0x21}, {&(0x7f0000000700)=""/249, 0xf9}, {&(0x7f0000000800)=""/124, 0x7c}, {&(0x7f0000000880)=""/49, 0x31}, {&(0x7f0000019940)=""/161, 0xa1}, {&(0x7f0000019a00)=""/212, 0xd4}], 0x7, &(0x7f0000019b80)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x58}}, {{&(0x7f0000019c00), 0x6e, &(0x7f0000019ec0)=[{&(0x7f0000019c80)=""/176, 0xb0}, {&(0x7f0000019d40)=""/120, 0x78}, {&(0x7f0000019dc0)=""/197, 0xc5}], 0x3}}, {{0x0, 0x0, &(0x7f000001a140)=[{&(0x7f0000019f00)=""/214, 0xd6}, {&(0x7f000001a000)=""/160, 0xa0}, {&(0x7f000001a0c0)=""/122, 0x7a}], 0x3, &(0x7f000001a180)=[@rights={{0x10}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc0}}, {{&(0x7f000001a240), 0x6e, &(0x7f000001c5c0)=[{&(0x7f000001a2c0)=""/157, 0x9d}, {&(0x7f000001a380)=""/4096, 0x1000}, {&(0x7f000001b380)=""/107, 0x6b}, {&(0x7f000001b400)=""/28, 0x1c}, {&(0x7f000001b440)=""/4096, 0x1000}, {&(0x7f000001c440)=""/183, 0xb7}, {&(0x7f000001c500)=""/135, 0x87}], 0x7, &(0x7f000001c640)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f000001c6c0), 0x6e, &(0x7f000001cb80)=[{&(0x7f000001c740)=""/80, 0x50}, {&(0x7f000001c7c0)=""/233, 0xe9}, {&(0x7f000001c8c0)=""/222, 0xde}, {&(0x7f000001c9c0)=""/233, 0xe9}, {&(0x7f000001cac0)=""/4, 0x4}, {&(0x7f000001cb00)=""/26, 0x1a}, {&(0x7f000001cb40)=""/4, 0x4}], 0x7, &(0x7f000001cc00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x128}}, {{&(0x7f000001cd40), 0x6e, &(0x7f000001ddc0)=[{&(0x7f000001cdc0)=""/4096, 0x1000}], 0x1, &(0x7f000001de00)=[@cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc0}}, {{&(0x7f000001dec0), 0x6e, &(0x7f000001e4c0)=[{&(0x7f000001df40)=""/12, 0xc}, {&(0x7f000001df80)}, {&(0x7f000001dfc0)=""/206, 0xce}, {&(0x7f000001e0c0)=""/59, 0x3b}, {&(0x7f000001e100)=""/68, 0x44}, {&(0x7f000001e180)=""/105, 0x69}, {&(0x7f000001e200)=""/242, 0xf2}, {&(0x7f000001e300)=""/156, 0x9c}, {&(0x7f000001e3c0)=""/213, 0xd5}], 0x9, &(0x7f000001e580)=[@cred={{0x1c}}], 0x20}}], 0x8, 0x2040, &(0x7f000001e800)={r3, r4+10000000}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x2, &(0x7f000001e840)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cache_none}, {@access_client}, {@access_client}, {@dfltgid={'dfltgid', 0x3d, r5}}], [{@measure}]}}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000080), 0x301100, 0x0) clone3(&(0x7f00000004c0)={0x3310a0000, 0x0, &(0x7f0000000000), 0x0, {}, &(0x7f0000000940)=""/102400, 0x19000, 0x0, &(0x7f0000000000), 0x0, {r6}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}]}}) 02:40:06 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 02:40:06 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x10) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:40:06 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x40000}}], 0x300, 0x102, 0x0) 02:40:06 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000900), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000940)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r1, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)=ANY=[@ANYBLOB='\x0081\x00', @ANYRES16=r2, @ANYBLOB="010000000000000000000f00000008000300", @ANYRES32=r3, @ANYBLOB="0c0006000000000000000000"], 0x28}}, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000900), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000940)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r4, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)=ANY=[@ANYBLOB='\x0081\x00', @ANYRES16=r5, @ANYBLOB="010000000000000000000f00000008000300", @ANYRES32=r6, @ANYBLOB="0c0006000000000000000000"], 0x28}}, 0x0) sendmsg$NL802154_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000128bd7000fbdbdf250500000008000300", @ANYRES32=0x0, @ANYBLOB="0c000600020000000000000008000300", @ANYRES32=0x0, @ANYBLOB="08000300", @ANYRES32=r6, @ANYBLOB="97669ecd7cb45f1e2fcd456561a46b2c052cf5954e749e77bf020000009697e4abe925dafa344bb84c1b2c8aa4aa61921ba6246f41f2c814fa9b6f6c2f665360f4208a1125facf85cfde4e43"], 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) sendmsg$NL802154_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x4c, 0x0, 0x0, 0x70bd29, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r6}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x48800) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000900), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r7, 0x8933, &(0x7f0000000940)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r8, &(0x7f0000000a40)={0x0, 0x0, &(0x7f0000000a00)={&(0x7f0000000980)=ANY=[@ANYBLOB='\x0081\x00', @ANYRES16=r9, @ANYBLOB="010000000000000000000f00000008000300", @ANYRES32=r10, @ANYBLOB="0c0006000000000000000000"], 0x28}}, 0x0) sendmsg$NL802154_CMD_GET_INTERFACE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x38, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r10}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) sendmsg$NL802154_CMD_DEL_SEC_LEVEL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x50, r2, 0x400, 0x70bd2a, 0x25dfdbfe, {}, [@NL802154_ATTR_SEC_LEVEL={0x2c, 0x22, 0x0, 0x1, [@NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5}, @NL802154_SECLEVEL_ATTR_FRAME={0x8, 0x2, 0x3}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x3}, @NL802154_SECLEVEL_ATTR_DEV_OVERRIDE={0x5, 0x4, 0x1}]}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r10}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x50}, 0x1, 0x0, 0x0, 0x4000894}, 0x20004000) syz_genetlink_get_family_id$nl802154(&(0x7f0000000600), 0xffffffffffffffff) [ 1897.019517] 9pnet_virtio: no channels available for device 127.0.0.1 [ 1897.040459] 9pnet: Insufficient options for proto=fd [ 1897.053121] 9pnet: Insufficient options for proto=fd 02:40:06 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x200000}}], 0x300, 0x102, 0x0) [ 1897.335051] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1897.335782] print_req_error: 6 callbacks suppressed [ 1897.335794] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1897.337737] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1897.338391] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1897.339727] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1897.340372] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1897.341681] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1897.342320] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1897.343619] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1897.344274] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1897.345557] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1897.346217] blk_update_request: I/O error, dev sr0, sector 2096901 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1897.347524] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1897.348848] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1897.349822] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1897.351142] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1897.352105] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1897.353407] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1897.354364] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1897.355681] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1897.356575] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1897.357528] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1897.358538] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1897.359295] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1897.363695] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1897.364614] Buffer I/O error on dev loop4, logical block 2096903, async page read [ 1912.516531] 9pnet_virtio: no channels available for device 127.0.0.1 02:40:21 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x1, &(0x7f00000000c0)=[{0x0}], 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',msize=0x0000000000001cd8,\x00']) 02:40:21 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 02:40:21 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x3665c4}}], 0x300, 0x102, 0x0) 02:40:21 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x4c00) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:40:21 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:40:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xc}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)={0x724, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x710, 0x0, 0x0, 0x1, [@generic="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", @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x724}}, 0x0) r1 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) io_uring_enter(r1, 0x76d3, 0x0, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f00000011c0)='./file1\x00', 0x2986c2, 0x1c8) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfec4) sendmsg$IPSET_CMD_GET_BYNAME(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x4c, 0xe, 0x6, 0x201, 0x0, 0x0, {0xc, 0x0, 0x6}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0xc001}, 0x4000012) pwritev2(r2, &(0x7f00000003c0)=[{&(0x7f0000000340)='t', 0x1}], 0x1, 0x0, 0x0, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = dup(r3) ioctl$sock_SIOCGIFINDEX_80211(r4, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x24, r6, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_GET_PROTOCOL_FEATURES(r2, &(0x7f0000000400)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x14, r6, 0x301, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x8804) r7 = dup(0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) r9 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x24, r9, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r8}, @void}}, [@NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_PROBE_MESH_LINK(r2, &(0x7f0000001180)={&(0x7f0000000b80)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001140)={&(0x7f0000000bc0)=ANY=[@ANYBLOB="7c050000", @ANYRES16=r6, @ANYBLOB="000325bd7000fedb01000000000000a74742", @ANYRES32=r8, @ANYBLOB="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"], 0x57c}, 0x1, 0x0, 0x0, 0x84}, 0x84) 02:40:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x300) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:40:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x48) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1912.525355] netlink: 1792 bytes leftover after parsing attributes in process `syz-executor.4'. 02:40:21 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x2000000}}], 0x300, 0x102, 0x0) 02:40:21 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)) [ 1912.648554] netlink: 1792 bytes leftover after parsing attributes in process `syz-executor.4'. 02:40:21 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(r0, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3}}, './file1\x00'}) fsmount(r1, 0x0, 0x86) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x3040400, &(0x7f0000000300)=ANY=[@ANYRES64, @ANYRESHEX, @ANYBLOB="2c7766646e0400", @ANYRESHEX, @ANYBLOB=',msize=0x0000000000001cd8,\x00']) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) ioctl$EXT4_IOC_GETSTATE(r2, 0x40046629, &(0x7f00000000c0)) [ 1912.734570] 9pnet: p9_fd_create_tcp (22300): problem connecting socket to 127.0.0.1 02:40:21 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:40:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) mount$9p_fd(0x0, &(0x7f0000000380)='./file0/../file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 02:40:21 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x40000000}}], 0x300, 0x102, 0x0) 02:40:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x500) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:40:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x4c) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:40:21 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x6800) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:40:21 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)) 02:40:22 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x6c000000}}], 0x300, 0x102, 0x0) 02:40:22 executing program 4: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x4ee5, &(0x7f0000000080), &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000040)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r3, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) r5 = mmap$IORING_OFF_SQES(&(0x7f0000fef000/0x11000)=nil, 0x11000, 0x1, 0x2010, r0, 0x10000000) syz_io_uring_submit(r4, r5, &(0x7f00000001c0)=@IORING_OP_CONNECT={0x10, 0x3, 0x0, r3, 0x80, &(0x7f0000000140)=@in={0x2, 0x4e23, @broadcast}}, 0x8) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) [ 1912.912673] 9pnet: p9_fd_create_tcp (22420): problem connecting socket to 127.0.0.1 [ 1913.132812] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1913.133528] print_req_error: 6 callbacks suppressed [ 1913.133540] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1913.135510] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1913.136179] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1913.137495] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1913.138168] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1913.139520] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1913.140199] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1913.141527] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1913.142199] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1913.143533] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1913.144214] blk_update_request: I/O error, dev sr0, sector 2096901 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1913.145510] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1913.146789] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1913.147787] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1913.149090] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1913.150015] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1913.151300] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1913.152221] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1913.153482] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1913.154392] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1913.155337] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1913.156374] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1913.157116] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1913.161706] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1913.162685] Buffer I/O error on dev loop4, logical block 2096903, async page read 02:40:36 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x6c00) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:40:36 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) [ 1927.776747] 9pnet: p9_fd_create_tcp (22443): problem connecting socket to 127.0.0.1 [ 1927.806285] 9pnet: Insufficient options for proto=fd 02:40:36 executing program 4: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x0, @perf_config_ext, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x0) fcntl$lock(r0, 0x5, &(0x7f0000000140)={0x2, 0x2, 0x4, 0xffffffffffff24a9}) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x6a2141, 0x8) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) setsockopt$inet6_tcp_int(r2, 0x6, 0x7, &(0x7f00000001c0)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mremap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4000, 0x0, &(0x7f0000ff9000/0x4000)=nil) bind$inet6(r2, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000080)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x0, 0x0, @fd_index}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000100)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0xa7f315189ef476ac, @fd=r1, 0x8dd2, 0x0, 0x0, 0x1c, 0x0, {0x3}}, 0xcf8) munlock(&(0x7f0000ff5000/0x1000)=nil, 0x1000) get_mempolicy(0x0, &(0x7f0000000180), 0x3, &(0x7f0000ffa000/0x4000)=nil, 0x5) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r2, r1, 0x0, 0x9bbb) mmap$usbmon(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0x0, 0x13, 0xffffffffffffffff, 0x0) 02:40:36 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) r1 = accept(r0, &(0x7f00000000c0)=@ax25={{0x3, @null}, [@default, @default, @bcast, @rose, @rose, @remote, @default, @null]}, &(0x7f0000000000)=0x80) r2 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg(r1, &(0x7f0000000880)=[{{&(0x7f0000000300)=@ax25={{0x3, @bcast, 0x2}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @null, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @default, @bcast]}, 0x80, &(0x7f0000000940)=[{&(0x7f0000000380)="b1979601897b957e63f2829218ffd25bd193a489ebb440e015b6c9300d7d3ca622c977ed8ee86cba88adfa5eb1af8c7a1721ba54b943d6f5e940f5a0e1e0bda954b2bda22ed1e1277f612cda08e41d3e477c5f520c0b20a8b85b5f64e97d0ebecc2ddc9984d9bf690cddd09c", 0x6c}, {&(0x7f0000000540)="ac19cd229b43c9f4a7363e4b8c96241bd0754f4d485039df4d0b2c63464888fd669dc942f97893a124249b4177879329d9c5bfae9ab0c977cf67acf6b4a31b58b6d9e33aa0eb20a981acdcb92d71b38d86be01717f5c76904b79aaa3e79d0d0d9207af8ec224f8a7c07a6a2ebd6e62dc1fe88af5d796d00f238fb87b4acb41b0f19161d53993b19e54dd663122c7eae971ffcb9e5372fb99ed86e94aeb97dd45171630cfeb352fa8910c6b5ac619411ada623204d38b7d8006660757bac7a692eb3dba448c9f90a6d956defad25cb2738d448b32932e56b3712e066ca855", 0xde}, {&(0x7f0000000200)="bafb5ac09e38eb07c0ca722e50568976341bd2967d067df46a809fb65e45ae3260", 0x21}, {&(0x7f0000000400)="510e3760e30128e7efad0a8eba6cacd65d6d695ea09ad116224cb20ed7408644722c5771f37e48d3c824dba08063fd4b5c60fc93651d29d151c34cb75bd1cb2f152e7a5f8c8bcc9feee6cb7c01071ca1da67f9200e6ce41847280d79738f408638a06c3f3f1d", 0x66}, {&(0x7f0000000640)="055dbd0106ca56469fd7861a9e16a1f637abb0322f680d977613a5552497405961cec8e4598c5d3e63909d5497edd464d0a2457953da4e916731c8fa08ed8e9863071c22018bf7a9bb0b26bfe1a153fe488c15e8852ad406ae65e2c12062f108aa513b20fa4b3b70d46805753e8859c59f70315dc65fe16d16012c82491c66f9b68106b951fce43b34b64ffa425d8a2e23b15b0ad8a4bd4abee793ab34b0ad349bebd0fbd745e14fbdc9bf0ede5fd9967b2821b074c065193462529e963bb2f6e0f507c195e3b4165354d7d21f5950b8e562231cdfb609567d08b4eec4", 0xdd}, {&(0x7f0000000740)="5f8218e5376b4f09d497873c5c282885cd93e54a23a25f6bce0f305e59f87a3d63f882c8c0d891c017ee776ba3646e3dda6bfb8644ff43eae7c3fb215b159d3420117170e1c918d60f467a514cd83a", 0x4f}, {&(0x7f0000000480)="a7ac1ff9777de8e43c790dc45f88f2566046ebd336c522b3", 0x18}, {&(0x7f00000007c0)="f08b9ba6f60eccb0c4b0ef517c8591ed9f0fb6da68759fdd5dc0a415d1f59a3c6a2d33b99be29df633dfec0e29456ba7604f44ae1070fdfc19d1dc06048815cc35b3443fcd9737883d3114e3c5c2ba540976cc48fe148d0fab303acbc44d9a03ee7753c686298a4063e472f597209d08b0bb8c0a086dade207eebbcda591590a3e90c74b01b0021b5582ec025a14a1444ea9a6415c973eee753410d47273", 0x9e}], 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], 0x22b8}}], 0x1, 0x4) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000f20000e1176261818f7adb698544c88b34dcb70b0fa7439771e000002a6cf6c2000000"]) sendfile(r1, r2, &(0x7f0000000140)=0x7f, 0x758f) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/consoles\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="1735df867c0000000061cfffff0f968d17f3c72a8705cfdefff7ba87ff", @ANYRESHEX, @ANYBLOB=',msize=0x0000000000001cd8,\x00']) 02:40:36 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)) 02:40:36 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x600) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:40:36 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x68) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:40:36 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0xc4653600}}], 0x300, 0x102, 0x0) [ 1928.146627] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1928.147435] print_req_error: 6 callbacks suppressed [ 1928.147446] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1928.149333] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1928.149988] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1928.151281] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1928.151932] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1928.153193] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1928.153833] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1928.155102] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1928.155740] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1928.157053] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1928.157740] blk_update_request: I/O error, dev sr0, sector 2096901 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1928.159092] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1928.160412] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1928.161375] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1928.162680] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1928.163616] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1928.164899] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1928.165847] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1928.167145] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1928.168081] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1928.169022] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1928.170037] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1928.170771] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1928.171474] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1928.172421] Buffer I/O error on dev loop4, logical block 2096903, async page read 02:40:59 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0xffffff7f}}], 0x300, 0x102, 0x0) 02:40:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x6c) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:40:59 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x7400) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:40:59 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 1) 02:40:59 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000160011cd00000000000000000a00000008000000", @ANYRES32, @ANYBLOB="120d32c61c747ef719f9831d3fa789c2d5dd388018454a74bc3ec81cd2e432abf204a98f834f3e91fcbedd6fd41697a0770000000000000000000000f80ba2ef3fb3ccd81137027a4030812a12a09b431b9c985313262f4a2a9ffea71e6aef25a34e3a64b302fd18f80325115eff924927b7887e8a92fd7f0ee0a7809b9235c83804a4a0d8ef71ece06802e3fa8985cde18d477b2d7ba9"], 0x1c}}, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="0500000000f20000e1176261818f7adb698544c88b34dcb70b0fa7439771e000002a6c75c2000000"]) ioctl$BTRFS_IOC_BALANCE(r1, 0x5000940c, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x10001}}, './file0\x00'}) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000240), r0) sendmsg$NL80211_CMD_NEW_KEY(r2, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x40, r3, 0x300, 0x70bd25, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x6, 0x77}}}}, [@NL80211_ATTR_KEY_DEFAULT_TYPES={0x10, 0x6e, 0x0, 0x1, [@NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_MULTICAST={0x4}, @NL80211_KEY_DEFAULT_TYPE_UNICAST={0x4}]}, @NL80211_ATTR_KEY_IDX={0x5, 0x8, 0x1}, @NL80211_ATTR_KEY_TYPE={0x8, 0x37, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0xed4e44e326791b4e) 02:40:59 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) [ 1950.514170] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1950.522581] FAULT_INJECTION: forcing a failure. [ 1950.522581] name failslab, interval 1, probability 0, space 0, times 0 [ 1950.524105] CPU: 0 PID: 22583 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 1950.525010] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1950.526071] Call Trace: [ 1950.526416] dump_stack+0x107/0x167 [ 1950.526886] should_fail.cold+0x5/0xa [ 1950.527396] should_failslab+0x5/0x20 [ 1950.527888] __kmalloc_track_caller+0x79/0x370 [ 1950.528478] ? strndup_user+0x74/0xe0 [ 1950.528978] memdup_user+0x22/0xd0 [ 1950.529433] strndup_user+0x74/0xe0 [ 1950.529912] __x64_sys_mount+0x133/0x300 [ 1950.530432] ? copy_mnt_ns+0xa00/0xa00 [ 1950.530942] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1950.531635] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1950.532312] do_syscall_64+0x33/0x40 [ 1950.532804] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1950.533460] RIP: 0033:0x7f7e97cd8b19 [ 1950.533949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1950.536300] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1950.537268] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 1950.538178] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 1950.539080] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 1950.540001] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1950.540940] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 02:40:59 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x700) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:40:59 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100), 0x5, 0x40000) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000000380)={{{@in=@multicast2, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@empty}}, &(0x7f0000000140)=0xe8) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee00, r4, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x800) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x400, &(0x7f0000000540)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@cache_loose}], [{@uid_eq={'uid', 0x3d, r3}}, {@fowner_lt={'fowner<', r4}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@uid_lt={'uid<', r5}}, {@subj_type={'subj_type', 0x3d, 'wfdno'}}, {@euid_gt={'euid>', 0xffffffffffffffff}}, {@smackfshat={'smackfshat', 0x3d, '&\xbd!\'@$,#'}}]}}) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) [ 1950.557835] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.4'. 02:40:59 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x4000000000000}}], 0x300, 0x102, 0x0) 02:40:59 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:40:59 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 2) 02:40:59 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0xa00) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:40:59 executing program 4: r0 = syz_mount_image$tmpfs(&(0x7f0000002400), &(0x7f0000002440)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002680)=ANY=[@ANYBLOB='mpjl=bind\"\x00']) r1 = syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) futimesat(r0, &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000280)={{r4, r5/1000+10000}}) r6 = accept$packet(0xffffffffffffffff, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, &(0x7f0000000300)=0x14) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000340)={{0x1, 0x1, 0x18, r6}, './file0/file0\x00'}) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r8 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r8, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="0500000000f20000e1176261818f7adb698544c88b34dcb70b0fa7439771e000002a6c75c2000000"]) fcntl$F_SET_FILE_RW_HINT(r8, 0x40e, &(0x7f00000001c0)=0x4) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, r3, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r9}}, 0x8001) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x4, 0x0, 0x20, 0x0, &(0x7f0000000000)="17a51ef30a6b212051f9f3a5ca29b76bcd28700924202f8809085a2a1e1f9509a8a024d5fe5d74ab2c741f702ebedbf0f0a8466851168a46e186ccbc2e88ecb33811b0b34d3fc9d1c2efc449c930b74fed7f5ffd43429153e988e40fa3eda5c99f8fc9e34f97939390090be12b911a63764fc311495daa1b9d9e7a0df43c77b44022dbb74c011a9a22403ccf6cf59bc05656826fab2508e9c3fa9f9230e0f36f1c195d983d7777a1", 0x4, 0x0, 0x0, {0x0, r9}}, 0x7) [ 1950.720639] tmpfs: Unknown parameter 'mpjl' [ 1950.744742] FAULT_INJECTION: forcing a failure. [ 1950.744742] name failslab, interval 1, probability 0, space 0, times 0 [ 1950.746203] CPU: 0 PID: 22710 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 1950.747032] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1950.748031] Call Trace: [ 1950.748362] dump_stack+0x107/0x167 [ 1950.748799] should_fail.cold+0x5/0xa [ 1950.749252] ? create_object.isra.0+0x3a/0xa20 [ 1950.749799] should_failslab+0x5/0x20 [ 1950.750247] kmem_cache_alloc+0x5b/0x310 [ 1950.750730] create_object.isra.0+0x3a/0xa20 [ 1950.751244] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1950.751849] __kmalloc_track_caller+0x177/0x370 [ 1950.752405] ? strndup_user+0x74/0xe0 [ 1950.752862] memdup_user+0x22/0xd0 [ 1950.753284] strndup_user+0x74/0xe0 [ 1950.753729] __x64_sys_mount+0x133/0x300 [ 1950.754226] ? copy_mnt_ns+0xa00/0xa00 [ 1950.754717] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1950.755378] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1950.756022] do_syscall_64+0x33/0x40 [ 1950.756485] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1950.757116] RIP: 0033:0x7f7e97cd8b19 [ 1950.757555] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1950.759834] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1950.760793] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 1950.761671] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 1950.762561] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 1950.763448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1950.764322] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 1950.768824] tmpfs: Unknown parameter 'mpjl' 02:40:59 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "8fa26d6492245ab2c4b2804da276d13b80d6eab731469ef9bd0bd6682f9e0f183009df520ebabe821c9b00d346ccc20828be94fe69407a15053824a6258f96486c0bb31ccac6220be6e4d98329e1bc353ffbde84b1a7b5ead8d77596f4037616d5800509dec7554bdb41197e466643fbcba5f2b0809e0a36800cf0c8c10bff5e61e7ccfb75b4a266a9d1310c0fef7649df2905ffa29534d9db1759a2d718d137309c601822cb64a19452b20388f852c4a21013a11c6f094964fc119a918a11dd68ee0c756635919af6fc1f2ba2e26d1f57a88d98226a2443498c8178b3ccb82cae834c01282312063cbe896bfdb6e96a24c116f81389f50032173a92fb17d1", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:40:59 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x7a00) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:40:59 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x20000000000000}}], 0x300, 0x102, 0x0) 02:40:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x74) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1950.844373] 9pnet: p9_fd_create_tcp (22710): problem connecting socket to 127.0.0.1 [ 1951.321398] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1951.323851] print_req_error: 6 callbacks suppressed [ 1951.323870] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1951.327004] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1951.327076] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1951.328224] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1951.330802] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1951.332905] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1951.332980] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1951.334075] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1951.337063] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1951.339429] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1951.339570] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1951.340630] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1951.343560] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1951.345890] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1951.345971] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1951.347090] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1951.350003] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1951.352356] blk_update_request: I/O error, dev loop4, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1951.352454] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1951.353563] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1951.356512] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1951.356592] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1951.358662] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1951.358769] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1951.360787] Buffer I/O error on dev loop4, logical block 2096903, async page read [ 1951.403854] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1951.405043] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1951.405116] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1951.407082] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1951.407151] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1951.409159] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1951.410353] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1951.411583] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1951.412794] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1951.413993] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 02:41:13 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x3665c4ffffffff}}], 0x300, 0x102, 0x0) [ 1964.700269] FAULT_INJECTION: forcing a failure. [ 1964.700269] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1964.702719] CPU: 1 PID: 22745 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 1964.704173] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1964.705871] Call Trace: [ 1964.706420] dump_stack+0x107/0x167 [ 1964.707181] should_fail.cold+0x5/0xa [ 1964.707999] _copy_from_user+0x2e/0x1b0 [ 1964.708817] memdup_user+0x65/0xd0 [ 1964.709536] strndup_user+0x74/0xe0 [ 1964.710302] __x64_sys_mount+0x133/0x300 [ 1964.711127] ? copy_mnt_ns+0xa00/0xa00 [ 1964.711936] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1964.711956] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1964.711982] do_syscall_64+0x33/0x40 02:41:13 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x7a) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:41:13 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x16fc) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:41:13 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 3) 02:41:13 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "8fa26d6492245ab2c4b2804da276d13b80d6eab731469ef9bd0bd6682f9e0f183009df520ebabe821c9b00d346ccc20828be94fe69407a15053824a6258f96486c0bb31ccac6220be6e4d98329e1bc353ffbde84b1a7b5ead8d77596f4037616d5800509dec7554bdb41197e466643fbcba5f2b0809e0a36800cf0c8c10bff5e61e7ccfb75b4a266a9d1310c0fef7649df2905ffa29534d9db1759a2d718d137309c601822cb64a19452b20388f852c4a21013a11c6f094964fc119a918a11dd68ee0c756635919af6fc1f2ba2e26d1f57a88d98226a2443498c8178b3ccb82cae834c01282312063cbe896bfdb6e96a24c116f81389f50032173a92fb17d1", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:41:13 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0xa714) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:41:13 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) sendmsg$IPCTNL_MSG_EXP_GET(r1, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f00000005c0)={0x30c, 0x1, 0x2, 0x201, 0x0, 0x0, {0x5, 0x0, 0x9}, [@CTA_EXPECT_NAT={0x6c, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0xc, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}]}, @CTA_EXPECT_NAT_TUPLE={0x1c, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}]}, @CTA_EXPECT_NAT_DIR={0x8}]}, @CTA_EXPECT_NAT={0x54, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_TUPLE={0x18, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}]}, @CTA_EXPECT_NAT_TUPLE={0x10, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}]}]}, @CTA_EXPECT_NAT={0x238, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0x70, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1f}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @loopback}, {0x14, 0x4, @remote}}}]}, @CTA_EXPECT_NAT_TUPLE={0x4}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0x50, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x88}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @rand_addr=0x64010101}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}]}, @CTA_EXPECT_NAT_TUPLE={0x44, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x2}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x14, 0x4, @empty}}}]}, @CTA_EXPECT_NAT_TUPLE={0xdc, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @remote}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @dev={0xfe, 0x80, '\x00', 0x42}}, {0x14, 0x4, @private1}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast1}, {0x14, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @broadcast}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}]}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_TUPLE={0x40, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @dev={0xac, 0x14, 0x14, 0x27}}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x3a}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}]}]}]}, 0x30c}, 0x1, 0x0, 0x0, 0x8000}, 0xc801) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)={0x30, 0x10, 0x1, 0x6, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x00'}, @nested={0x13, 0x0, 0x0, 0x1, [@generic="487fec864b245e0f3f9be149f83265"]}]}, 0x30}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000000), 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/warn_count', 0x4080, 0x1) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r4 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) sendfile(r3, r4, 0x0, 0x8000) write$cgroup_pid(r2, &(0x7f00000004c0)=0xffffffffffffffff, 0x12) ioctl$sock_inet_udp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000100)) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000700)=ANY=[], 0x100}, 0x1, 0x0, 0x0, 0x4804}, 0x0) unshare(0x48020200) unshare(0x58000480) 02:41:13 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x20, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee00, r1, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x2}}], [{@euid_eq={'euid', 0x3d, r1}}, {@dont_measure}]}}) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000100), r0) [ 1964.712003] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1964.712016] RIP: 0033:0x7f7e97cd8b19 [ 1964.712037] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1964.712047] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1964.712068] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 1964.712079] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 sendmsg$WG_CMD_SET_DEVICE(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000001d00)={0x1a9c, r2, 0x100, 0x70bd29, 0x25dfdbfb, {}, [@WGDEVICE_A_PRIVATE_KEY={0x24, 0x3, @b}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x1f}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg1\x00'}, @WGDEVICE_A_IFINDEX={0x8}, @WGDEVICE_A_PEERS={0xf4, 0x8, 0x0, 0x1, [{0xf0, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}, @WGPEER_A_ALLOWEDIPS={0xc0, 0x9, 0x0, 0x1, [{0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5, 0x3, 0x3}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x3}}]}]}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x4f}]}]}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e20}, @WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_PEERS={0x1930, 0x8, 0x0, 0x1, [{0x530, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_FLAGS={0x8, 0x3, 0x2}, @WGPEER_A_FLAGS={0x8, 0x3, 0x1}, @WGPEER_A_ALLOWEDIPS={0x4f8, 0x9, 0x0, 0x1, [{0x154, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x17}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1}}]}, {0xa0, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x3}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x27}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x3}}]}, {0x1c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}]}, {0x34, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x5}}]}, {0xf4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x3}}]}]}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x34}}}]}, {0x38, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xa1}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "bcd0ff47996aec28e68e0348c0e9928f262c2f28695e05858df81ea02960ec9a"}]}, {0x49c, 0x0, 0x0, 0x1, [@WGPEER_A_FLAGS={0x8, 0x3, 0x4}, @WGPEER_A_ALLOWEDIPS={0xe8, 0x9, 0x0, 0x1, [{0x7c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x1}}]}, {0x4}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x28}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @local}}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_FLAGS={0x8}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e23, @loopback}}, @WGPEER_A_FLAGS={0x8, 0x3, 0x4}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x2e}}}, @WGPEER_A_ALLOWEDIPS={0x34c, 0x9, 0x0, 0x1, [{0x13c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x2b}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x21}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x1b}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x1}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010100}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}]}, {0x64, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @remote}}, {0x5, 0x3, 0x3}}]}]}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "a6d188dfb391a0299f94eea733c4d90b3846e4b71f000fabf9f78bb727dc74f6"}]}, {0x38, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0xcf1c, @mcast2, 0x6}}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x24}}}]}, {0x24, 0x0, 0x0, 0x1, [@WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e22, 0x4, @local}}]}, {0x35c, 0x0, 0x0, 0x1, [@WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e21, 0x1ff, @mcast1, 0x3}}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "944a07d7496f373d110cc2315c38872d3eb1d43df6d645cfba1ce54e3124bdcf"}, @WGPEER_A_ENDPOINT6={0x20, 0x4, {0xa, 0x4e24, 0xa1f3, @dev={0xfe, 0x80, '\x00', 0x22}, 0x28c}}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_FLAGS={0x8, 0x3, 0x5}, @WGPEER_A_ALLOWEDIPS={0x50, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_ALLOWEDIPS={0x268, 0x9, 0x0, 0x1, [{0xa0, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1}}]}, {0x58, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}]}]}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @c_g}]}, {0x55c, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x1b8, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}]}, {0x70, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x1}}]}, {0xb8, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "37fcfd0e9d4a810d7c90f6d89a5b60b2c3d6735f97cc7ecd172194f8abb2073b"}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @neg}, @WGPEER_A_ENDPOINT4={0x14, 0x4, {0x2, 0x4e22, @rand_addr=0x64010100}}, @WGPEER_A_ALLOWEDIPS={0x344, 0x9, 0x0, 0x1, [{0x118, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010101}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}]}, {0x94, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010102}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x33}}, {0x5, 0x3, 0x3}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}]}, {0xdc, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @loopback}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}]}, {0x4}, {0x64, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @local}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x3}}]}]}]}, {0x418, 0x0, 0x0, 0x1, [@WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "a2062eb94af450a499260241e62c9fe925790c5be8712198f8e4f06769a168ec"}, @WGPEER_A_FLAGS={0x8, 0x3, 0x6}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PRESHARED_KEY={0x24, 0x2, "5595da33013b742b50a5fe8154d3a461715921303e6e00a6d1acde1ffbc7b7b5"}, @WGPEER_A_ALLOWEDIPS={0x390, 0x9, 0x0, 0x1, [{0xb8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x1a}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x2}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x3}}]}, {0x130, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x1}}]}, {0x130, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x40}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x15}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x1}}]}]}, @WGPEER_A_PROTOCOL_VERSION={0x8}]}, {0x1fc, 0x0, 0x0, 0x1, [@WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0x7}, @WGPEER_A_PUBLIC_KEY={0x24, 0x1, @b_g}, @WGPEER_A_ALLOWEDIPS={0x1cc, 0x9, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x29}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x3}}]}, {0xe8, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast1}, {0x5, 0x3, 0x5}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @remote}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @remote}, {0x5, 0x3, 0x1}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5, 0x3, 0x3}}]}, {0x4}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x3}}]}]}]}]}]}, 0x1a9c}, 0x1, 0x0, 0x0, 0x20000000}, 0x800) [ 1964.712090] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 02:41:13 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x200000000000000}}], 0x300, 0x102, 0x0) 02:41:13 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 4) [ 1964.712100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1964.712111] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 1964.725447] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1964.867802] FAULT_INJECTION: forcing a failure. [ 1964.867802] name failslab, interval 1, probability 0, space 0, times 0 [ 1964.867824] CPU: 0 PID: 22761 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 1964.867834] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1964.867840] Call Trace: [ 1964.867863] dump_stack+0x107/0x167 [ 1964.867888] should_fail.cold+0x5/0xa [ 1964.867914] should_failslab+0x5/0x20 [ 1964.867934] __kmalloc_track_caller+0x79/0x370 [ 1964.867953] ? strndup_user+0x74/0xe0 [ 1964.867979] memdup_user+0x22/0xd0 02:41:14 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 5) [ 1964.868000] strndup_user+0x74/0xe0 [ 1964.868023] __x64_sys_mount+0x17c/0x300 [ 1964.868044] ? copy_mnt_ns+0xa00/0xa00 [ 1964.868069] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1964.868088] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1964.868114] do_syscall_64+0x33/0x40 [ 1964.868135] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1964.868147] RIP: 0033:0x7f7e97cd8b19 [ 1964.868168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1964.868178] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1964.868203] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 02:41:14 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x4000000000000000}}], 0x300, 0x102, 0x0) [ 1964.868217] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 1964.868229] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 1964.868240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1964.868259] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 1965.046649] FAULT_INJECTION: forcing a failure. [ 1965.046649] name failslab, interval 1, probability 0, space 0, times 0 [ 1965.049083] CPU: 0 PID: 22874 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 1965.050499] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1965.052203] Call Trace: [ 1965.052758] dump_stack+0x107/0x167 [ 1965.053526] should_fail.cold+0x5/0xa [ 1965.054319] ? create_object.isra.0+0x3a/0xa20 [ 1965.055270] should_failslab+0x5/0x20 [ 1965.056048] kmem_cache_alloc+0x5b/0x310 [ 1965.056882] create_object.isra.0+0x3a/0xa20 [ 1965.057767] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1965.058790] __kmalloc_track_caller+0x177/0x370 [ 1965.059744] ? strndup_user+0x74/0xe0 [ 1965.060539] memdup_user+0x22/0xd0 [ 1965.061264] strndup_user+0x74/0xe0 [ 1965.062015] __x64_sys_mount+0x17c/0x300 [ 1965.062837] ? copy_mnt_ns+0xa00/0xa00 [ 1965.063633] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1965.064688] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1965.065730] do_syscall_64+0x33/0x40 [ 1965.066481] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1965.067517] RIP: 0033:0x7f7e97cd8b19 [ 1965.068288] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1965.071997] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1965.073561] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 1965.075015] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 1965.076474] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 1965.077917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1965.079357] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 02:41:14 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x6, 0x0, 0x0, 0x816084, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) 02:41:14 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:41:14 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x2000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:41:14 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x80000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:41:14 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x300) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:41:14 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x6c00000000000000}}], 0x300, 0x102, 0x0) [ 1965.171415] 9pnet: Insufficient options for proto=fd 02:41:14 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) [ 1965.365242] 9pnet: p9_fd_create_tcp (22874): problem connecting socket to 127.0.0.1 [ 1965.743867] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1965.745047] print_req_error: 22 callbacks suppressed [ 1965.745066] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1965.748377] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1965.749516] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1965.751771] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1965.752892] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1965.755109] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1965.756264] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1965.758454] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1965.760624] buffer_io_error: 6 callbacks suppressed [ 1965.760635] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1965.763232] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1965.765387] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1965.766959] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1965.769124] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1965.770736] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1965.772968] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1965.774658] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1965.775867] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1965.778141] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1965.779294] blk_update_request: I/O error, dev sr0, sector 2096901 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1965.781536] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1965.782768] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1965.784031] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1965.785595] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1965.787146] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1965.788720] Buffer I/O error on dev loop4, logical block 2096903, async page read 02:41:28 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0xffffff7f00000000}}], 0x300, 0x102, 0x0) 02:41:28 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c6d73697a653d307824303030303030303030303031a964382c00"]) 02:41:28 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x100000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:41:28 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 6) 02:41:28 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:41:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x500) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:41:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) ftruncate(r0, 0x10001) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x20d315) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x45142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2000, 0x0) sendfile(r2, r3, 0x0, 0x20d315) 02:41:28 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x4800) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 1979.370950] 9pnet: Insufficient options for proto=fd [ 1979.391338] FAULT_INJECTION: forcing a failure. [ 1979.391338] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1979.393929] CPU: 1 PID: 23019 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 1979.395357] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1979.397065] Call Trace: [ 1979.397618] dump_stack+0x107/0x167 [ 1979.398383] should_fail.cold+0x5/0xa [ 1979.399193] _copy_from_user+0x2e/0x1b0 [ 1979.400058] memdup_user+0x65/0xd0 [ 1979.400797] strndup_user+0x74/0xe0 [ 1979.401557] __x64_sys_mount+0x17c/0x300 [ 1979.402383] ? copy_mnt_ns+0xa00/0xa00 [ 1979.403180] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1979.404260] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1979.405325] do_syscall_64+0x33/0x40 [ 1979.406092] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1979.407132] RIP: 0033:0x7f7e97cd8b19 [ 1979.407896] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1979.411488] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1979.413058] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 1979.414508] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 1979.415973] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 1979.415985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1979.415996] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 02:41:28 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0xffffffff00000000}}], 0x300, 0x102, 0x0) 02:41:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x600) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:41:28 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0xffffffffc4653600}}], 0x300, 0x102, 0x0) 02:41:28 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0xe0ffff) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:41:28 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}], 0x300, 0x102, 0x0) 02:41:28 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$cgroup_int(r1, &(0x7f0000000140)='hugetlb.2MB.max_usage_in_bytes\x00', 0x2, 0x0) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="74726193042891c130bf3b35e5cca9f6bdec84ea0c980b0aa50000000005062a6d5f99adf3371b62347e145b058821482de6adc46317a72a4926831ac3005cfc5fb8318a92c8e489a03815c07956a8ac186f", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',msize=0x0000000000001cd8,\x00']) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) symlinkat(&(0x7f0000000000)='./file1\x00', r0, &(0x7f00000000c0)='./file1\x00') syz_memcpy_off$IO_URING_METADATA_GENERIC(0x0, 0x114, &(0x7f0000000100)=0x3b400000, 0x0, 0x4) 02:41:28 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 7) 02:41:28 executing program 4: r0 = accept4$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000001c0)=0x14, 0x0) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000240)={0x2, 0x5}, 0x4) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x501, 0x0) getsockname$inet(r1, &(0x7f00000000c0)={0x2, 0x0, @loopback}, &(0x7f0000000140)=0x10) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400028020000400000004f80000200040000300080000000000010000000000000002", 0x2d}, {0x0, 0x0, 0x4000}], 0x0, &(0x7f0000000040)={[{@fat=@nfs}]}) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x800, 0x1) [ 1979.605598] FAULT_INJECTION: forcing a failure. [ 1979.605598] name failslab, interval 1, probability 0, space 0, times 0 [ 1979.606926] CPU: 0 PID: 23150 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 1979.607670] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1979.608642] Call Trace: [ 1979.608933] dump_stack+0x107/0x167 [ 1979.609338] should_fail.cold+0x5/0xa [ 1979.609749] ? copy_mount_options+0x55/0x180 [ 1979.610240] should_failslab+0x5/0x20 [ 1979.610656] kmem_cache_alloc_trace+0x55/0x320 [ 1979.611148] ? _copy_from_user+0xfb/0x1b0 [ 1979.611607] copy_mount_options+0x55/0x180 [ 1979.612086] __x64_sys_mount+0x1a8/0x300 [ 1979.612523] ? copy_mnt_ns+0xa00/0xa00 [ 1979.612949] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1979.613523] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1979.614086] do_syscall_64+0x33/0x40 [ 1979.614493] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1979.615054] RIP: 0033:0x7f7e97cd8b19 [ 1979.615466] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1979.617476] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1979.618315] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 1979.619093] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 1979.619871] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 1979.620687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1979.621467] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 02:41:28 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "8fa26d6492245ab2c4b2804da276d13b80d6eab731469ef9bd0bd6682f9e0f183009df520ebabe821c9b00d346ccc20828be94fe69407a15053824a6258f96486c0bb31ccac6220be6e4d98329e1bc353ffbde84b1a7b5ead8d77596f4037616d5800509dec7554bdb41197e466643fbcba5f2b0809e0a36800cf0c8c10bff5e61e7ccfb75b4a266a9d1310c0fef7649df2905ffa29534d9db1759a2d718d137309c601822cb64a19452b20388f852c4a21013a11c6f094964fc119a918a11dd68ee0c756635919af6fc1f2ba2e26d1f57a88d98226a2443498c8178b3ccb82cae834c01282312063cbe896bfdb6e96a24c116f81389f50032173a92fb17d1", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:41:28 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}], 0x300, 0x102, 0x0) 02:41:28 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x4c00) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:41:28 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 8) [ 1979.794649] FAULT_INJECTION: forcing a failure. [ 1979.794649] name failslab, interval 1, probability 0, space 0, times 0 [ 1979.797049] CPU: 1 PID: 23273 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 1979.798455] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1979.798461] Call Trace: [ 1979.798484] dump_stack+0x107/0x167 [ 1979.798509] should_fail.cold+0x5/0xa [ 1979.801439] ? create_object.isra.0+0x3a/0xa20 [ 1979.801463] should_failslab+0x5/0x20 [ 1979.802715] kmem_cache_alloc+0x5b/0x310 [ 1979.803546] create_object.isra.0+0x3a/0xa20 [ 1979.804456] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1979.805482] kmem_cache_alloc_trace+0x151/0x320 [ 1979.806414] ? _copy_from_user+0xfb/0x1b0 [ 1979.807248] copy_mount_options+0x55/0x180 [ 1979.808108] __x64_sys_mount+0x1a8/0x300 [ 1979.808924] ? copy_mnt_ns+0xa00/0xa00 [ 1979.809711] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1979.810763] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1979.811818] do_syscall_64+0x33/0x40 [ 1979.812570] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1979.813596] RIP: 0033:0x7f7e97cd8b19 [ 1979.814340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1979.818014] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1979.819530] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 1979.820977] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 1979.822413] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 1979.823865] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1979.825290] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 1979.857547] 9pnet: p9_fd_create_tcp (23273): problem connecting socket to 127.0.0.1 [ 1979.978780] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1979.979443] print_req_error: 6 callbacks suppressed [ 1979.979454] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1979.981214] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1979.982361] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1979.986042] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1979.986627] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1979.987777] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1979.988935] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1979.990106] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1979.990729] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1979.991893] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1979.993033] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1979.994218] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1979.994832] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1979.995986] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1979.997133] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1979.998329] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1979.998944] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1980.000111] blk_update_request: I/O error, dev loop4, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1980.001270] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1980.002524] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1980.003464] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1980.004110] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1980.004950] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1980.006216] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1980.011701] Buffer I/O error on dev loop4, logical block 2096903, async page read [ 1980.020092] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1980.020764] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1980.021720] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1980.022324] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1980.023497] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1980.024459] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1980.025413] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1980.026773] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1980.027461] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1980.028422] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1980.042610] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1980.047793] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1980.048482] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1980.049433] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1980.050385] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1980.051324] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1980.052294] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1980.053248] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1995.656172] FAULT_INJECTION: forcing a failure. [ 1995.656172] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1995.658631] CPU: 0 PID: 23287 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 1995.660069] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1995.661733] Call Trace: [ 1995.662491] dump_stack+0x107/0x167 [ 1995.663227] should_fail.cold+0x5/0xa [ 1995.664032] _copy_from_user+0x2e/0x1b0 [ 1995.664844] copy_mount_options+0x76/0x180 [ 1995.665700] __x64_sys_mount+0x1a8/0x300 [ 1995.666517] ? copy_mnt_ns+0xa00/0xa00 [ 1995.667312] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1995.668368] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1995.669407] do_syscall_64+0x33/0x40 [ 1995.670155] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1995.671184] RIP: 0033:0x7f7e97cd8b19 02:41:44 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 9) 02:41:44 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x1000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:41:44 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000000c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}], [{@fsuuid={'fsuuid', 0x3d, {[0x36, 0x65, 0x34, 0x36, 0x63, 0x63, 0x62, 0x63], 0x2d, [0x66, 0x64, 0x38, 0x35], 0x2d, [0x33, 0x65, 0x7f3375189b9b2874, 0x39], 0x2d, [0x39, 0x63, 0x39, 0x31], 0x2d, [0x39, 0x35, 0x36, 0x32, 0x35, 0x33, 0x37, 0x39]}}}]}}) 02:41:44 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x700) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:41:44 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "8fa26d6492245ab2c4b2804da276d13b80d6eab731469ef9bd0bd6682f9e0f183009df520ebabe821c9b00d346ccc20828be94fe69407a15053824a6258f96486c0bb31ccac6220be6e4d98329e1bc353ffbde84b1a7b5ead8d77596f4037616d5800509dec7554bdb41197e466643fbcba5f2b0809e0a36800cf0c8c10bff5e61e7ccfb75b4a266a9d1310c0fef7649df2905ffa29534d9db1759a2d718d137309c601822cb64a19452b20388f852c4a21013a11c6f094964fc119a918a11dd68ee0c756635919af6fc1f2ba2e26d1f57a88d98226a2443498c8178b3ccb82cae834c01282312063cbe896bfdb6e96a24c116f81389f50032173a92fb17d1", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:41:44 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r1, 0x107, 0x9, &(0x7f0000000040)=0x8, 0x4) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = accept(r0, 0x0, &(0x7f00000000c0)) r4 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r4, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="0500000000f20000e1176261818f7adb698544c88b34dcb70b0fa7439771e000002a6c75c2000000"]) sendfile(r3, r4, &(0x7f0000000100)=0x3, 0x800) r5 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0xc0400, 0x0) ioctl$GIO_SCRNMAP(r5, 0x4b40, &(0x7f0000000180)=""/109) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) [ 1995.671947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 sendmsg$nl_generic(r3, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000580)={0x14c0, 0x1f, 0x400, 0x70bd2d, 0x25dfdbfc, {0x5}, [@typed={0xd, 0x6d, 0x0, 0x0, @str='-,^\'}\\2:\x00'}, @nested={0x335, 0x5b, 0x0, 0x1, [@generic="9c9ff8ab82278000a4a760c45cfdc06d4fa7b15a0af51cd485d24bcac0568082f4343a9417bd04e6e81e434d6425e2ef599048284f2902062e09fa11da6ff4c50931f95dd267bee5db907edc32b1cecd6684d3a49858a5882234e01415f956ff8e894c66a63da555f90c7c1354d595d13616b682a10295574e635bebd79528494380a2", @generic="0dce05db4da6c3d1c36d186d49f9c5620f056ffba624bb89f39323772b63b76556bb0d8f27cd4a5e004a892a8cda9b13a84c06ba84d999d29060487f876be94e7baa91bc9f22c9088b2c9e751977f2e31f48c339a93790732bfc864caea3637f365e57e585a3c03d97aa3c279816de4413509784d1dd0683b685308b54fb6548f13a6e30351519a01d1a219d972d8e030e72d0a63e2de77ad80a7005657eb744ca8761b4fb3519e8dbf67fc40efa369db846a845c4fe9afde9fb2805e8a81df22343e35efe55421c0421c87a8fc309b7dfee514dda7feafd4df8794578f32c46f1", @generic="9a7c91231cd3f0fbe803ebcecfe6e19c7e540578f6ef759dca4f0085e69fe35520fdc0a83d33f18466a919d6c2b771904c4744a1c9b6bf3de4968b9a3a7a871eeda1a586bc9f45e53e", @generic="91b61bdc4f6fede34b7a200d5e48e09d009b03ecf9bf01b40aeab1929305d8e6488213e70332b0ece99ea4bd8051c5b0ab295fb18f601db4cdb20a5e5d4505e75b3ff5d038ef46287eb5be2aabd5ec8e9e6654b89733dfe15260e79fcc17c5acefbc5bc31cd8a4b5dcf09b791c61e6177382aca7d00b38cfd739a405f0da390ab61f27b112c797654c40e82576569fc824ea10075874f2314ce9404338b6a12cdcdef0328a8596e49fa1c0c12612eb89b78396b112367caa6a9c9f2aa083e948", @typed={0x4, 0x45}, @generic="eae27ae868507fbec51978038c14a9dd66fa6db56d4764ebe23811d7bc9e48f06c7ff9126f", @generic="e17cee30235daf6733039afc854a29924be5e033158bc397efa34483b58290d68f004a75f44efe5fd7d1552afd4e6b54ea70e7e5b54e5e618dc704745a020cedb645b4d4b61b2406d54aea1148f12a35c215ab5ca369cf1c9e824e477308e04b0446e894dba421d89131066f429bdf6f0ab56540578178fae5e5e12fe17b66b5f10f44066036bc55df617f63cb5e8553a8545a", @typed={0x8, 0x40, 0x0, 0x0, @pid}]}, @nested={0x1004, 0x74, 0x0, 0x1, [@generic="2648a326b3ffc03e58efb515f9fc8829d5def9b154b5dba104a957c7b3d07c2b1af02d44ae0925d41625c69d79365dfeca2384df63e491556867e30c9c466f73a833a81771d636c2f4afebf0f0c60deb226f567c460ae976b3860dc3df7d93a749e4c527b6cf7646119537b4af1af72741ecf51c3a722a1f5b2590853115d8a31e5c9879935defd3d1fe0347aa9d27deaba8d269cd2a1940f08441dfef4e3d3a12a77bd1a6b18ed668d850d53d13bf461e8b8b669ac193153e93e5e4e930df901a9893e5105af42d7375e39caec36b687c2d96d2cbce8638e607b6bff030c0e84bb6fd154d16d5bce299ae3bb5af5edd3d9c9bfc83e5ceb4135628e438186c740615c4414b089e1c41ac044bee4fc10e2bfeec5803a49a3a5abad5cd887ca82ffae017c8888e5ae092dfe2617ed3f82d3de2889391eff14b4b6dc48ec2644664573f15b52b4d24d58e1e080fe87a37a2fd2ec98db61397f8e9069a75a7735cbffd59ec01e6e2a91316367056df569c4fbba5b8d8cdc7d8a1d61155276967201c112366de848bf2e9e5749d931146beb60a19ca4de7dbc2dbb50a0fdb0348e5174b2aa2e4d8fe65ad226d7272034dfda56d16427756f1da20224eb884ebc8d65735c2cf0f1b1c526aa53fde5ad8372e3e68ebeebee35fc64917e45cc852fc22ccf543310b2cceda74ef2bbb8b750c54c6be96a10e5e3e400b7ef8440bdf1f7f7a7cbfebe3708cc519b85a3fbdbfdd394506371b3484e6e80d27f61145a26fc7bcf410e01c3a7f0a4f2b69fedc2dbf38fe0e5b5f7a93e613ad89e63952ca8bd8a48211e6b8a31a577187a00877a67ed32749b637bd6ca8c2b9132d1d9b7634895deaa1547d8c7652f0e79e1b9471309d319ef70a41b7c284aebd6efd23265b81b640e9ea66e1f39ceec79cafcf5dc666ea409502cac216e15b50c8813ad980b967e9b3303c231e9eb68ba0faffa111340886a2a7e8efc1751833303152f096f4478a333df947cd38ebb55a02679fe2f018432bde0a81463bad8f36c40f70b1db4d9b0065821bd33298471b2b076679dbcd75c8acff36460ecbf8310babdab346676e396747bfec15a9e3cfce821f9e659d06072585a403a104ad9e3e28ed9f6d54de991d2b8e78135b820b93bf080dd743e98ae2abeac1b7f056e229ee0ceda783b40b71ac9169a3f6463822ef02296915411d0e6a9d72ce6ac7af84419013f2da3d0ef882c60bc5046518780bea3742b45cd6f9582127b1acaabc6ba310195f9712b5bf92cf11a2178d9fd07cf71f89bf99c87d7b55d23ee75c8c2b7233a32bbd29554b2e18e7eb6f7958d869b41022b695b340e74fbb1687bc2515a273fed0316172a38ecb99d58b4ea48610a98de5b0ed420b0bc01f6f0efd0b816bcfbffe013baa096396742f20222dcad6552f67e567654d4d5ddeaee7a256f62f504c9026f817ac84fe9bf330396ba30ef8d759b47eb0b0bd39990d38f79b53b94af6f69b5fd61640a2f66e47438cf917601cddd540cc57008a54c22b3fdfd4e5bc2bdacd871a960f79c535a71c126e9ffa61b46519561ad0ebd17522ee8b43010e81a4e5d42d007ef6628b87c4076d441ec958f81258427c69ae18edfa775d1b7ab2f436c43cf334d72c77dd16a999996348176ef371305379e2be2cfdc7f29a08cfc40bd17f812096ac44c6886403d2f007cb75746113b7d7dba1ff9d96f44e9d3d6e0d57ea30cd5da1abfd26d8ba86d2112f6e296bb35b50504792fa4cc8ad6c2b442599d7a8edfe5c0e36abaddadf3235aa3e973e75cb7977cf7fe9a367a3570f96509998a1716bfb9439889d569740845417c99fff9c4673b327606abe94a5ec1fe3e7bca9f88b7185c292fa03f29c3b0e39c73ee19887dda4fd7e089c69c83c6979d5a54e73d3bdec09466be73a5e98f94f953319cc5587912dd827bd485341c8229f809ddabd007a59f1bc0d62a0741eaaedfab2a58298663926032f5be38b1e36922f84d1f57c0a9bf88d37662952f6ddc1a7e7def58f1ccec04098a5860acbcc7a641ec1bd1cd8056420b6f4c471e40529dfea1e9365160c750ca593e5e3e108846ce4dac29cdf071716a2de86e0f2cae3514252f40f4e55ba927ccaa032a94124e8fe826cf367d532cac8bfccf5eaddee1652febf3d446ac2d71f0e825ef2d394e26c8db365e749d7c10d1bb47ac52c03d97ff12c8183515f9d40c99511b5b6896c2dcb351bff02cbe77b67218a9c0c26f3c76918fa8083ce1465d2b29a3d49e4d0a1770db6fec62a48def2982f22d1df23f3ac5182a48f603c9a3787eebff16742b8176748b8ca997c36b520acf546d24f3ed774ca3972f54576585896107e81043b559cf0e0aac51f1a8f77c1615e03ea300f25b7a7497bcc73f49103207ef858b660a32a3639e02ee093063b70e42295350992333ec790a822c5756857b9322a5ee0811fecdb13e351c35d3ddcf361c6e94e88db89da7e74311c917a17b606d7861a7e6cec65ff532bdf12b8a19cb3543c77652b1f659c2465d08e9001bc5d6f37e8aa0303cccfc6a910154ed36635a89a4469546484dfcc0fab5923871d1634a6dd92d77ea929192413dbc580de213dc77d1b7daef94e9395e79265b036e4cee0c6c626302b31a9f398085cd9d488599c1beedc35e86a92ec35012f80bb6980945ea8e6bc2c2db6d4dbbbdb05889167deff8b1b6f18345710dba23f90dd037b48c948fa8dcc6cf837129366d0d7bd629dc23241ee5eb26188e3cbe13b3704525d03cc12c1eeb56206d18c8a53b5b112240be835580e619e7633d4cf5d0f65c06ff20a0d8c30839d0ac239941345b4e5d0e179e85813de423e354f7b746e22e597deca92778268b6da5b6e8857d95eeeb57ba99b3aaca597f8b2eadd851c01d115fa943d3084855318294273962b9c478dca4ec10f79d874598ef4f65758d31a825de1485b7c9a81aa958b4bed6b6f59879bece12d383ba5e4c5458407a4c720c034718252e0c3175261dc7d439e4d36cca0030a91f20351b776f6fa306eb7f5e74f81d5250da977aea1afc75b8494e871c0df2b371bca6d806aed71918ff5be32141a8a1d3affafbe32663f4cb6d1cae560c3c87d5be0d2cbeaadd0b0b4a75ed9aa79310719a790542113edb21a5af7ffaf8670a2212a50998dc04b7cbbf86a2a8c54a0fff18a975497e0ca162f5fa397e3bc43808175faf663594a12944aef3a6dd159921e32f9d2b5f6b1da785853f4bd9672dcf34edbaa6c5f8e065031154f59a6e0d41ada862afeed5ac2a7b136daa82dd305c02ca7188e919a2dc955fa280eea3a9d225c2a38b7ccd0eab91ebc680b396a22daf1cc9e3c0fa202f442f5740507d8462d8b6785f67de720baf80498265f90e7ef0528e8e1f2de39a00d851f77a307d660b9ac62cdc5ca616517523950a3e55a05d9b92207c437e571b93bc504985ed56035ee805c2f6d50b3cdbd3c4d91c9836ccd9497519816763085b190ac86f4f4ae05d36ad34687a5380e437ac887ae1a71ab93c6555093a81b9aef56a796429dd0d8ff2b5569c6d40d22d769b5a8c3b834499b73f6d671a719aba76de0dd4a0fec7aad0c89ca2a21cff6e7b26daebfb84580bbdc9e9632e8decbb656c1d05761925555ac36f6b244b8625521378effee36b951b9fece4a6928682028e5b6ba04885d376a5222a5e0e1af26dba1f6424e7c659a5f8732403e0d9eb69b339eb1ed8a90cc270dc4677c61e3f7711da04184ecc484196fd40203228c0efe2d648f146d421e512a548909d5e79b506d39b380afd5123a56c41c2235809aaf1a98ff62f487844fae53b2a254cb40d7b1e5c697110619b4c6e0371218d38ef1add0e3aa47831ff673cedbb4c367525194b618e7f700bd4960ce76f55c2df593fb9eacbcc3e95935761cab183d030cb035d2cd5e673d596918c6fb55c9cc54eb843fc5fdb8e407cdd935232778e3910730a85ba5f0be4597b95a7bdec92ed0922b9fb5d85fd5d4dcf08c484c43d6ca65dc3273798ce2efe36c82736d3d228ce275d88df179ce0de89ac8e47ac8cc0004e529363c7983539ac49c34392ad1e993adfb89608075375056390db99760937431a67ba43b663a38869ccbb8ad76325018fe755c5f72ee8307c997aab45867b62c00695041155aace3c581525ed010aa3aa8d7d6ddd90dc90626aed541f1e8a5e985bbd953c025c15f5156a7e44a3f45df8a2cf322788b1031ad00f10a1c6cb4513eb8d2af6f6b00e951087bc24887c9f59b8d79a0a3628a0f2b30dc0dae664536e1f8b2957d0b61f9ad011dd179c9114994a82e9456beb5998616ae238608a27d4dc332cb4d7b5965f0ab53ac2a743d8e259c0aabc32919de40ffb3ed0da8981adab92784f39c292d833464e7332c72fc1fcf43518b0e444d3256808f148b418a3890c23a154103bf0b70fd267039e0e22f3923b6278fdd65eebe0430128457416db4cee13b52d6e78822eb844db7554489070dfa9112712f38e1831a03986adf17ecab15b12ced515233bf13d5814c6ce604f2ae787fadce88a5630284acb2a17cf6533b783895fc4765bb74f78d1c449a72466920e73386c7cdb88adcbb5de6200f18b8a792fbe434b0227d191b9918e1532515cec19655735bde635d98f503a81c3c4eb2deb84e2b4d655ca75e81de3643ec391accbab5ac4f56e911507bf7102bb934ad0a8595d0982e82b178b67260f80ab5ea44ef2840a56fbafe7c09f4a70c940a680d8ae754365be1e2a0a436c7977d11dd281246d99c7268f4e36244c97d3781abf4270a4888204ce4001081503649a642e21b39e232e9e1b7786a893dd529e1fcbf4837e0cd873201a5aff6f74614a4b518436230d465c24fb39487b70293f0e9747ff3a2a61ea5a7e50d426d0966792299c6b535cdfc8b13d96675a2237e750213444a03c2d034ec1859ad2add77c973c88ece0901fc1b086bbec2bf3eaeaca4586dcf517f7a2ebd2dd35b5c7d6f8ba62a9ac47bdf657be4cf489a8131943b6f7aa45cd7c6b9ae7308d39eda7ff9155c7ce4dffd018e57454c4706990f97ad5fdb2c0b0b5334a028562f0523034e31c0be3c3296c2a34bef66c9f52b33a77a21eb2e4131bb67b842c872a58120ac376cf31cb51730430a4828d7852f792dfa1d3e22c048f76deb31052df6edf7118d40618dad21f7aca655877d5e44830197219b480ce536df1455f5068f264880ed0b159d893794ba94db99bf8ab01fca0740df46c69794bc99efc1afb356fb541efe2ec2b24a22363331e87046d32f437bbb2659d22632f36cc5f4bc95aec5d9a604df78320807f3e3b84359c661f9beb31b49af16f0f5854ad25db048c9cd383fbe1588a6b0d4997dc7280ceb48079320b8937becf83bf23afc313c2f9f73df0cba1d492d023ac83e5b25a94f942dbb714ef1782c45b87686e46190e178e079b7959261f3d8c3de115c853d50153cbbf5c4bba271e3b940bc67887eaa485148763bb841a19c0f1ec55137cc1bc1bd6f5f16254248037c8dea68c9060dc91cb347c7d7f3ce0f9ee07e3cadfc3d21a62cbf98c5f65e46507a5d1e0cfade564f38ecdc11c489b154f1de905fe9ae9bba52e9fa95fcf2bf92759c357fd086212d30a73053251f6209fdb07d510678318d7cff1326380a3a6a6f1b33426ac17d1dd5865ed6603c051014abe42f7df96ad8a7d6654d1758ff903af489683a510c759d74cb5face0eb56b7d5fd66e4674a5dbd22b43e092a4dcf7a4063d46a7af4ae81b6ba7f49b0b9f4c7051462a7df521de8e120ff674cf0d36fb4"]}, @typed={0x4, 0x36}, @nested={0x119, 0x26, 0x0, 0x1, [@generic="e199ce84c8621f5e801e504834248caf22ffdbdd8cb8f1e014186756be92ce24d5a69abbd3cbdbfa043f4a91d4d237af", @typed={0x8, 0x69, 0x0, 0x0, @ipv4=@private=0xa010101}, @generic="d4f78d20ea9b69c3e8012512fec95ad70a52f545190d33a702046ace48f2bfdd174b1422029dbdc50c05ff004e284de653136e16d0f52eb6aa47f370421bbc60a0d35a02e611c5a2b1a0af447eb4f721a7e24572e42469a0ebbea342ebc5b3eb03d64eecba25168e48f3ea70d67dde5311264374a8efa696ac1a3b629e", @generic="76f0544d8302ac29d41b3da9382a3cdc135170e3ad618cfad0f856a42cc4edc198317054e3b627f7b07a34cdecbf1278eaf3af77b38ba7dca1ebed1d58654b3398a912880cd0b9c44b1b29a061a580f5", @typed={0xe, 0x14, 0x0, 0x0, @str='/dev/vcsa\x00'}]}, @generic="9519b777746ad4552d21bd542749f8c017b934c891488096185ea485e7bbc300569b8e12bcc85dfc659ca92045db46", @generic="f242", @typed={0xc, 0x69, 0x0, 0x0, @u64=0x1}]}, 0x14c0}, 0x1, 0x0, 0x0, 0x800}, 0x34d476e4dabca6f1) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x4e23, 0x8, @mcast2, 0x1}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x0, 0x0) 02:41:44 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x6800) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:41:44 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}}], 0x300, 0x102, 0x0) [ 1995.671958] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1995.671979] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 1995.671989] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 1995.672000] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 1995.672011] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1995.672022] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 1995.688185] 9pnet: Insufficient options for proto=fd [ 1995.692317] 9pnet: p9_fd_create_tcp (23287): problem connecting socket to 127.0.0.1 02:41:44 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x4c00) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:41:44 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 10) 02:41:44 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) [ 1995.921381] FAULT_INJECTION: forcing a failure. [ 1995.921381] name failslab, interval 1, probability 0, space 0, times 0 [ 1995.923754] CPU: 1 PID: 23411 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 1995.925191] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1995.926851] Call Trace: [ 1995.927397] dump_stack+0x107/0x167 [ 1995.928142] should_fail.cold+0x5/0xa [ 1995.928927] ? getname_flags.part.0+0x50/0x4f0 [ 1995.929855] should_failslab+0x5/0x20 [ 1995.930623] kmem_cache_alloc+0x5b/0x310 [ 1995.931445] getname_flags.part.0+0x50/0x4f0 [ 1995.932347] ? _copy_from_user+0xfb/0x1b0 [ 1995.933192] user_path_at_empty+0xa1/0x100 [ 1995.934050] __x64_sys_mount+0x1e9/0x300 [ 1995.934870] ? copy_mnt_ns+0xa00/0xa00 [ 1995.935662] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1995.936732] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1995.937791] do_syscall_64+0x33/0x40 [ 1995.938556] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1995.939597] RIP: 0033:0x7f7e97cd8b19 [ 1995.940361] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1995.944072] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1995.945628] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 1995.947080] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 1995.948550] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 1995.949988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1995.951429] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 1996.024479] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1996.025718] print_req_error: 38 callbacks suppressed [ 1996.025736] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1996.029024] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1996.029036] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1996.029075] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1996.031239] buffer_io_error: 14 callbacks suppressed [ 1996.031252] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 1996.039106] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1996.040809] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1996.041296] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 1996.042380] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1996.046750] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1996.046784] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1996.048907] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 1996.051548] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1996.053790] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1996.054429] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1996.054947] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1996.057019] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 1996.060770] blk_update_request: I/O error, dev loop4, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1996.060859] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1996.062938] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 1996.064161] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1996.065756] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 1996.067040] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1996.068211] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 1996.070934] Buffer I/O error on dev loop4, logical block 2096903, async page read 02:41:59 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 11) 02:41:59 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}}], 0x300, 0x102, 0x0) 02:41:59 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:41:59 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x2000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:41:59 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x6c00) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:41:59 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080)=0x0, 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) pidfd_open(r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7472616e73d668ae01007a1413b9e13d66642c7266646e6f3d3c483beaae244228ae82e31ab77a89b221a13821186f2e75b94a8ad290d805c137be0bf24e8e8973062dfef369fa6ee88e34dcb88c5d6292184b33db3cb72a0f563be3956720e2796555293fb5da91c2046082bb8334a7d9aaae12a7491d9475b97519b2eaa423a8d3ddbb2dbf16d7a2f37bb5940fa7e7dd89", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',msize=0x0000000000001cd8,\x00']) 02:41:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0xa00) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:41:59 executing program 4: ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000340)=0x85) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f0000000240)={{0x77359400}, {r0, r1/1000+60000}}) creat(&(0x7f0000000080)='./file0\x00', 0x20) socket$inet6_udplite(0xa, 0x2, 0x88) clock_gettime(0x2, &(0x7f0000000000)) clock_getres(0x2, &(0x7f00000000c0)) r2 = fork() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) ptrace(0x10, r2) ptrace$getregset(0x4204, r2, 0x202, &(0x7f0000000140)={&(0x7f0000001280)=""/4096, 0x1000}) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) fork() [ 2010.676155] FAULT_INJECTION: forcing a failure. [ 2010.676155] name failslab, interval 1, probability 0, space 0, times 0 [ 2010.678762] CPU: 1 PID: 23458 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2010.678773] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2010.678780] Call Trace: [ 2010.678806] dump_stack+0x107/0x167 [ 2010.678832] should_fail.cold+0x5/0xa [ 2010.678854] ? create_object.isra.0+0x3a/0xa20 [ 2010.678878] should_failslab+0x5/0x20 [ 2010.678897] kmem_cache_alloc+0x5b/0x310 02:41:59 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x7400) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 2010.678924] create_object.isra.0+0x3a/0xa20 [ 2010.678945] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2010.678971] kmem_cache_alloc+0x159/0x310 [ 2010.678998] getname_flags.part.0+0x50/0x4f0 [ 2010.679018] ? _copy_from_user+0xfb/0x1b0 [ 2010.679040] user_path_at_empty+0xa1/0x100 [ 2010.679067] __x64_sys_mount+0x1e9/0x300 [ 2010.679089] ? copy_mnt_ns+0xa00/0xa00 [ 2010.679116] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 02:41:59 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}], 0x300, 0x102, 0x0) [ 2010.679136] ? syscall_enter_from_user_mode+0x1d/0x50 02:41:59 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 12) [ 2010.679164] do_syscall_64+0x33/0x40 [ 2010.679187] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2010.679201] RIP: 0033:0x7f7e97cd8b19 02:41:59 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) lseek(r1, 0xfff, 0x2) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) r2 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x4000) pread64(r2, &(0x7f00000000c0)=""/186, 0xba, 0x7) fsmount(r0, 0x0, 0x3) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="000000000000004da216e1591253af", @ANYRESHEX, @ANYBLOB="c657d7ad6e6f3d9982d1ab877599557d502c59", @ANYRESHEX, @ANYBLOB=',msize=0x0000000000001cd8,\x00']) [ 2010.679223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2010.679234] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2010.679257] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2010.679270] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2010.679282] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2010.679294] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2010.679306] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 2010.697971] 9pnet: p9_fd_create_tcp (23458): problem connecting socket to 127.0.0.1 [ 2010.804247] FAULT_INJECTION: forcing a failure. [ 2010.804247] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2010.804260] CPU: 0 PID: 23555 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2010.804266] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2010.804270] Call Trace: [ 2010.804284] dump_stack+0x107/0x167 [ 2010.804298] should_fail.cold+0x5/0xa 02:41:59 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 13) [ 2010.804314] strncpy_from_user+0x34/0x470 [ 2010.804329] getname_flags.part.0+0x95/0x4f0 [ 2010.804340] ? _copy_from_user+0xfb/0x1b0 [ 2010.804351] user_path_at_empty+0xa1/0x100 [ 2010.804365] __x64_sys_mount+0x1e9/0x300 [ 2010.804377] ? copy_mnt_ns+0xa00/0xa00 [ 2010.804391] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2010.804402] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2010.804416] do_syscall_64+0x33/0x40 [ 2010.804428] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2010.804435] RIP: 0033:0x7f7e97cd8b19 [ 2010.804446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 02:42:00 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}}], 0x300, 0x102, 0x0) [ 2010.804451] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 02:42:00 executing program 4: r0 = creat(&(0x7f0000000180)='./file1\x00', 0x14a) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r2 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0xa, 0x13, r1, 0x0) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000000)={r0, 0x5c, 0x8}) write$binfmt_elf64(r3, &(0x7f0000000280)=ANY=[], 0xfdef) accept$inet6(r3, &(0x7f0000001340)={0xa, 0x0, 0x0, @remote}, &(0x7f0000001380)=0xfffffffffffffee7) pwrite64(0xffffffffffffffff, &(0x7f0000000080)="5c03c8b801f098720be1a0939cba80001e54ca1b89e060c72664e4e4345313484f661d367a499955de9b9a638b2c14a88e443a7d3c5b4ce453a108d0f12889b29c2ff887e11579623ebd970cc6c87ccc40ae49e747328a966ea363afa0ce2f71bd86a88209569b46dba8cabf829efefae6a880bdbc6eaf3cf5fc13485b9abe9f57f6918b14d5337ffa0d11168d95d226f8674ef0fc207b8108536eb17a546c76", 0xa0, 0x2) syz_io_uring_complete(r2) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000300), 0x400000, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r5) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000000)={0x0, 0x0, 0x8946}) read$hidraw(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000) tee(0xffffffffffffffff, 0xffffffffffffffff, 0xfff, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x2, 0x4, 0x0, 0x7f, 0x0, 0x15e, 0x50, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x7c}, 0x0, 0x3, 0x401, 0x0, 0xfffffffffffffffd, 0x0, 0x8}, 0x0, 0xffdfffffffffffff, r4, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) [ 2010.804464] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2010.804469] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2010.804476] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2010.804481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2010.804487] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 2010.911126] FAULT_INJECTION: forcing a failure. [ 2010.911126] name failslab, interval 1, probability 0, space 0, times 0 [ 2010.911156] CPU: 1 PID: 23630 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2010.911172] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2010.911180] Call Trace: [ 2010.911209] dump_stack+0x107/0x167 [ 2010.911242] should_fail.cold+0x5/0xa [ 2010.911274] ? alloc_fs_context+0x57/0x840 [ 2010.911304] should_failslab+0x5/0x20 [ 2010.911330] kmem_cache_alloc_trace+0x55/0x320 [ 2010.911369] alloc_fs_context+0x57/0x840 [ 2010.911411] path_mount+0xa72/0x20b0 [ 2010.911447] ? strncpy_from_user+0x9e/0x470 [ 2010.911479] ? finish_automount+0xa90/0xa90 [ 2010.911502] ? getname_flags.part.0+0x1dd/0x4f0 [ 2010.911520] ? _copy_from_user+0xfb/0x1b0 [ 2010.911550] __x64_sys_mount+0x282/0x300 [ 2010.911571] ? copy_mnt_ns+0xa00/0xa00 [ 2010.911596] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2010.911615] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2010.911640] do_syscall_64+0x33/0x40 [ 2010.911665] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2010.911678] RIP: 0033:0x7f7e97cd8b19 [ 2010.911697] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2010.911706] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2010.911727] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2010.911738] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2010.911749] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2010.911759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2010.911770] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 2011.184855] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2011.186426] print_req_error: 6 callbacks suppressed [ 2011.186445] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2011.189729] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2011.190844] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2011.193049] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2011.194156] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2011.196343] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2011.197484] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2011.199777] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2011.201917] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 2011.203466] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2011.205576] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 2011.207122] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2011.209248] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 2011.210800] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2011.212959] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 2011.215153] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2011.216277] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2011.218453] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2011.219594] blk_update_request: I/O error, dev sr0, sector 2096901 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2011.221805] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2011.223008] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2011.229744] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 2011.231333] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 2011.232899] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 2011.234460] Buffer I/O error on dev loop4, logical block 2096903, async page read 02:42:15 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 14) 02:42:15 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x1851) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:42:15 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:42:15 executing program 4: r0 = syz_io_uring_setup(0x33c1, &(0x7f0000000640)={0x0, 0x1, 0x0, 0x0, 0x217}, &(0x7f00000a0000)=nil, &(0x7f0000ff2000/0xc000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000000c0)=0x0) r3 = socket$inet(0x2, 0xa, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000500)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffce}, 0x0, 0x12001}, 0x0) setsockopt$inet_opts(r0, 0x0, 0x4, &(0x7f00000006c0)="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", 0x1000) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0xc0402, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_ADD(r4, 0x4c80, r5) io_uring_enter(r0, 0x17a6, 0x0, 0x0, 0x0, 0x0) 02:42:15 executing program 1: keyctl$instantiate(0xc, 0x0, &(0x7f00000000c0)=@encrypted_update={'update ', 'default', 0x20, 'user:', '-(,!J'}, 0x1a, 0xfffffffffffffff8) r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000540)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x34081, 0x0) ioctl$F2FS_IOC_ABORT_VOLATILE_WRITE(r3, 0xf505, 0x0) syz_io_uring_complete(0x0) r4 = request_key(&(0x7f0000000200)='asymmetric\x00', &(0x7f0000000300)={'syz', 0x2}, &(0x7f0000000340)='&///\x00', 0xfffffffffffffff8) r5 = add_key$keyring(&(0x7f0000000380), &(0x7f0000000480)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r4, 0x0, r5, 0x1) recvmsg$unix(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000940)=""/4082, 0xff2}, {&(0x7f00000003c0)=""/159, 0x9f}], 0x2, &(0x7f0000000100)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}], 0x38}, 0x20) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x121009, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@euid_eq={'euid', 0x3d, r6}}]}}) 02:42:15 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x300, 0x102, 0x0) 02:42:15 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x7a00) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:42:15 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x3000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 2026.010410] FAULT_INJECTION: forcing a failure. [ 2026.010410] name failslab, interval 1, probability 0, space 0, times 0 [ 2026.012982] CPU: 0 PID: 23689 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2026.014487] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2026.016331] Call Trace: [ 2026.016896] dump_stack+0x107/0x167 [ 2026.017679] should_fail.cold+0x5/0xa [ 2026.018492] ? create_object.isra.0+0x3a/0xa20 [ 2026.019489] should_failslab+0x5/0x20 [ 2026.020309] kmem_cache_alloc+0x5b/0x310 [ 2026.021190] create_object.isra.0+0x3a/0xa20 [ 2026.022128] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2026.023211] kmem_cache_alloc_trace+0x151/0x320 [ 2026.024213] alloc_fs_context+0x57/0x840 [ 2026.025101] path_mount+0xa72/0x20b0 [ 2026.025902] ? strncpy_from_user+0x9e/0x470 [ 2026.026824] ? finish_automount+0xa90/0xa90 [ 2026.027743] ? getname_flags.part.0+0x1dd/0x4f0 [ 2026.028765] ? _copy_from_user+0xfb/0x1b0 [ 2026.029663] __x64_sys_mount+0x282/0x300 [ 2026.030535] ? copy_mnt_ns+0xa00/0xa00 [ 2026.031369] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2026.032534] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2026.033640] do_syscall_64+0x33/0x40 [ 2026.034444] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2026.035531] RIP: 0033:0x7f7e97cd8b19 [ 2026.036339] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2026.040210] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2026.041818] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2026.043324] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2026.044843] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2026.046345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2026.047846] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 2026.058133] 9pnet: p9_fd_create_tcp (23689): problem connecting socket to 127.0.0.1 02:42:15 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$chown(0x12, 0x0, 0xee01, 0x0) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000340)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000016c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="400000001f0020002cbd0000008000000001000004d20a00050000005ec72ab9e00000000000000000030000000000000000000062"], 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x240400c5) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000600)=@updsa={0x184, 0x10, 0x1, 0x0, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xd}}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x0, 0x32}, @in6=@private0, {0x0, 0x0, 0x7241}, {}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x58, 0x2, {{'cbc(aes)\x00'}, 0x80, "0f24aa6b13c2e62f3556b1cbcfeac2a0"}}, @extra_flags={0x8, 0x18, 0xfd}, @address_filter={0x28, 0x1a, {@in=@multicast1, @in=@remote, 0xa, 0x8, 0x80}}, @lastused={0xc}]}, 0x184}}, 0x0) sendmsg$DEVLINK_CMD_SB_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="425b52ee81368fcbc5ba1c2285c55336e616917a96d4720a0a9add5c971dbdc94c4560931e89a14e8f9447b2b4ae73f0f94058ec45d6ef7242dd345c0ddd2ba5f4f908db0aae86c3391a0091737b41f03b8a4259372118576143ad9f0ce7abbf1aefd60c20211ddbf3e3540a3b412e005fa59afb877794f5b6a6a68b", @ANYRES16=0x0, @ANYBLOB="00022dbd7000fedbdf250b000000080001007063690011000200303030303a30303a31302e300000000008000b000100696d0000000f0002006e6574646576736d6d30000008000b008000e2ff070001007063690011000200303030303a30303a31302e3000000071668aa461a6c4d154bf030d3a53cf0008000b00aeffffff"], 0x84}}, 0x24048015) creat(&(0x7f0000000080)='./file0\x00', 0x0) symlinkat(&(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001ac0)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)) syz_io_uring_submit(r2, 0x0, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 02:42:15 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}}], 0x300, 0x102, 0x0) 02:42:15 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x2000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:42:15 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0xfc16) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:42:15 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 15) 02:42:15 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:42:15 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3665c4}}], 0x300, 0x102, 0x0) 02:42:15 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f0000000140)={0x1040100, 0x0, 0x0, 0x0, {0x3c}, 0x0, 0x0, 0x0, 0x0, 0x2f, {r1}}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) r2 = eventfd(0x2) sendfile(r2, r0, &(0x7f0000000000), 0x6) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7472616e773d66642cfe4264645cf1a275693bf1fc7266646e6f1d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',msize=0x0000000000001cd8,\x00']) fallocate(r1, 0x2, 0xeef, 0x0) [ 2026.232813] FAULT_INJECTION: forcing a failure. [ 2026.232813] name failslab, interval 1, probability 0, space 0, times 0 [ 2026.234110] CPU: 1 PID: 23813 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2026.234869] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2026.235786] Call Trace: [ 2026.236085] dump_stack+0x107/0x167 [ 2026.236502] should_fail.cold+0x5/0xa [ 2026.236934] ? legacy_init_fs_context+0x44/0xe0 [ 2026.237451] should_failslab+0x5/0x20 [ 2026.237880] kmem_cache_alloc_trace+0x55/0x320 [ 2026.238384] ? lockdep_init_map_type+0x2c7/0x780 [ 2026.238920] legacy_init_fs_context+0x44/0xe0 [ 2026.239422] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2026.239974] alloc_fs_context+0x4fd/0x840 [ 2026.240451] path_mount+0xa72/0x20b0 [ 2026.240865] ? strncpy_from_user+0x9e/0x470 [ 2026.241342] ? finish_automount+0xa90/0xa90 [ 2026.241821] ? getname_flags.part.0+0x1dd/0x4f0 [ 2026.242334] ? _copy_from_user+0xfb/0x1b0 [ 2026.242791] __x64_sys_mount+0x282/0x300 [ 2026.243245] ? copy_mnt_ns+0xa00/0xa00 [ 2026.243667] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2026.244256] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2026.244833] do_syscall_64+0x33/0x40 [ 2026.245250] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2026.245817] RIP: 0033:0x7f7e97cd8b19 [ 2026.246234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2026.248216] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2026.249055] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2026.249828] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2026.250605] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2026.251382] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2026.252155] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 02:42:15 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x4000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:42:15 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}}], 0x300, 0x102, 0x0) 02:42:15 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYRESOCT]) 02:42:15 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 16) [ 2026.361983] 9pnet: Insufficient options for proto=fd 02:42:15 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x4800) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 2026.399814] FAULT_INJECTION: forcing a failure. [ 2026.399814] name failslab, interval 1, probability 0, space 0, times 0 [ 2026.402486] CPU: 0 PID: 23961 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2026.402813] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2026.403997] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2026.404004] Call Trace: [ 2026.404025] dump_stack+0x107/0x167 [ 2026.404600] print_req_error: 6 callbacks suppressed [ 2026.404610] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2026.406481] should_fail.cold+0x5/0xa [ 2026.406506] ? legacy_init_fs_context+0x44/0xe0 [ 2026.406822] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2026.407585] should_failslab+0x5/0x20 [ 2026.408111] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 2026.410441] kmem_cache_alloc_trace+0x55/0x320 [ 2026.410463] ? lockdep_init_map_type+0x2c7/0x780 [ 2026.418808] legacy_init_fs_context+0x44/0xe0 [ 2026.419816] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2026.420927] alloc_fs_context+0x4fd/0x840 [ 2026.421226] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2026.421880] path_mount+0xa72/0x20b0 [ 2026.421906] ? strncpy_from_user+0x9e/0x470 [ 2026.422499] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2026.423286] ? finish_automount+0xa90/0xa90 [ 2026.423307] ? getname_flags.part.0+0x1dd/0x4f0 [ 2026.423807] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2026.426086] ? _copy_from_user+0xfb/0x1b0 [ 2026.426120] __x64_sys_mount+0x282/0x300 [ 2026.426563] Buffer I/O error on dev loop4, logical block 2096897, async page read 02:42:15 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}], 0x300, 0x102, 0x0) [ 2026.427583] ? copy_mnt_ns+0xa00/0xa00 [ 2026.427609] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2026.434158] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2026.434556] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2026.435280] do_syscall_64+0x33/0x40 [ 2026.435303] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2026.435883] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2026.436656] RIP: 0033:0x7f7e97cd8b19 [ 2026.437430] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2026.439424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2026.439435] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2026.439857] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 2026.442084] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2026.442097] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2026.444979] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2026.445693] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2026.445705] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2026.445720] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 2026.446547] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2026.452926] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2026.454103] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 2026.480654] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2026.481307] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2026.482773] blk_update_request: I/O error, dev loop4, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2026.483946] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 2026.485317] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2026.486120] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 2026.487516] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2026.488233] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 2026.489432] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2026.490112] Buffer I/O error on dev loop4, logical block 2096903, async page read [ 2026.843169] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2026.843880] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 2026.852767] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2026.853613] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 2026.854818] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2026.855495] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2026.856461] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2026.857416] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2026.858406] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2026.859357] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 02:42:28 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x5000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:42:28 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:42:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x4c00) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:42:28 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) getresgid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000100)=0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, r2}}, './file1\x00'}) 02:42:28 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 17) 02:42:28 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x80000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 2038.985966] FAULT_INJECTION: forcing a failure. [ 2038.985966] name failslab, interval 1, probability 0, space 0, times 0 [ 2038.987366] CPU: 1 PID: 24062 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2038.988160] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2038.989103] Call Trace: [ 2038.989414] dump_stack+0x107/0x167 [ 2038.989842] should_fail.cold+0x5/0xa [ 2038.990285] should_failslab+0x5/0x20 [ 2038.990719] __kmalloc_track_caller+0x79/0x370 [ 2038.991239] ? vfs_parse_fs_string+0xc0/0x150 [ 2038.991750] kmemdup_nul+0x2d/0xa0 [ 2038.992154] vfs_parse_fs_string+0xc0/0x150 [ 2038.992667] ? vfs_parse_fs_param+0x560/0x560 [ 2038.993177] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2038.993739] ? alloc_fs_context+0x54f/0x840 [ 2038.994237] path_mount+0x60b/0x20b0 [ 2038.994664] ? strncpy_from_user+0x9e/0x470 [ 2038.995169] ? finish_automount+0xa90/0xa90 [ 2038.995655] ? getname_flags.part.0+0x1dd/0x4f0 [ 2038.996186] ? _copy_from_user+0xfb/0x1b0 [ 2038.996662] __x64_sys_mount+0x282/0x300 [ 2038.997127] ? copy_mnt_ns+0xa00/0xa00 [ 2038.997589] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2038.998204] ? syscall_enter_from_user_mode+0x1d/0x50 02:42:28 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x40000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) keyctl$chown(0x12, 0x0, 0xee01, 0x0) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000340)={&(0x7f0000001600)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000016c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="400000001f0020002cbd0000008000000001000004d20a00050000005ec72ab9e00000000000000000030000000000000000000062"], 0x40}, 0x1, 0x0, 0x0, 0x80}, 0x240400c5) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000002dc0)={&(0x7f0000000600)=@updsa={0x184, 0x10, 0x1, 0x0, 0x0, {{@in6=@ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xd}}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x0, 0x32}, @in6=@private0, {0x0, 0x0, 0x7241}, {}, {}, 0x0, 0x0, 0xa, 0x4}, [@algo_crypt={0x58, 0x2, {{'cbc(aes)\x00'}, 0x80, "0f24aa6b13c2e62f3556b1cbcfeac2a0"}}, @extra_flags={0x8, 0x18, 0xfd}, @address_filter={0x28, 0x1a, {@in=@multicast1, @in=@remote, 0xa, 0x8, 0x80}}, @lastused={0xc}]}, 0x184}}, 0x0) sendmsg$DEVLINK_CMD_SB_GET(r1, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="425b52ee81368fcbc5ba1c2285c55336e616917a96d4720a0a9add5c971dbdc94c4560931e89a14e8f9447b2b4ae73f0f94058ec45d6ef7242dd345c0ddd2ba5f4f908db0aae86c3391a0091737b41f03b8a4259372118576143ad9f0ce7abbf1aefd60c20211ddbf3e3540a3b412e005fa59afb877794f5b6a6a68b", @ANYRES16=0x0, @ANYBLOB="00022dbd7000fedbdf250b000000080001007063690011000200303030303a30303a31302e300000000008000b000100696d0000000f0002006e6574646576736d6d30000008000b008000e2ff070001007063690011000200303030303a30303a31302e3000000071668aa461a6c4d154bf030d3a53cf0008000b00aeffffff"], 0x84}}, 0x24048015) creat(&(0x7f0000000080)='./file0\x00', 0x0) symlinkat(&(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') creat(&(0x7f0000000040)='./file0\x00', 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000001ac0)=@IORING_OP_FILES_UPDATE={0x14, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000180)=0x0, &(0x7f0000002a40)) syz_io_uring_submit(r2, 0x0, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) io_uring_enter(0xffffffffffffffff, 0x58ab, 0x0, 0x0, 0x0, 0x0) 02:42:28 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}}], 0x300, 0x102, 0x0) [ 2038.998957] do_syscall_64+0x33/0x40 [ 2038.998971] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2038.998979] RIP: 0033:0x7f7e97cd8b19 [ 2038.998991] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2038.998997] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2038.999009] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2038.999016] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2038.999022] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2038.999028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2038.999034] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 02:42:28 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 18) [ 2039.005321] 9pnet: Insufficient options for proto=fd [ 2039.101938] FAULT_INJECTION: forcing a failure. [ 2039.101938] name failslab, interval 1, probability 0, space 0, times 0 [ 2039.103259] CPU: 1 PID: 24179 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2039.104017] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2039.104917] Call Trace: [ 2039.105206] dump_stack+0x107/0x167 [ 2039.105601] should_fail.cold+0x5/0xa [ 2039.106023] ? create_object.isra.0+0x3a/0xa20 [ 2039.106527] should_failslab+0x5/0x20 [ 2039.106951] kmem_cache_alloc+0x5b/0x310 [ 2039.107391] create_object.isra.0+0x3a/0xa20 [ 2039.107863] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2039.108414] kmem_cache_alloc_trace+0x151/0x320 [ 2039.108934] ? lockdep_init_map_type+0x2c7/0x780 [ 2039.109456] legacy_init_fs_context+0x44/0xe0 [ 2039.109951] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2039.110491] alloc_fs_context+0x4fd/0x840 [ 2039.110947] path_mount+0xa72/0x20b0 [ 2039.111366] ? strncpy_from_user+0x9e/0x470 [ 2039.111835] ? finish_automount+0xa90/0xa90 [ 2039.112308] ? getname_flags.part.0+0x1dd/0x4f0 [ 2039.112812] ? _copy_from_user+0xfb/0x1b0 [ 2039.113276] __x64_sys_mount+0x282/0x300 [ 2039.113716] ? copy_mnt_ns+0xa00/0xa00 [ 2039.114140] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2039.114698] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2039.115266] do_syscall_64+0x33/0x40 [ 2039.115672] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2039.116222] RIP: 0033:0x7f7e97cd8b19 [ 2039.116642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2039.118589] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2039.119407] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2039.120177] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2039.120955] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2039.121714] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2039.122482] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 2039.138518] 9pnet: p9_fd_create_tcp (24179): problem connecting socket to 127.0.0.1 [ 2039.347558] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2039.348765] print_req_error: 22 callbacks suppressed [ 2039.348783] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2039.352095] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2039.353234] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2039.355419] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2039.356539] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2039.358748] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2039.359854] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2039.362012] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2039.364140] buffer_io_error: 6 callbacks suppressed [ 2039.364152] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 2039.366726] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2039.368852] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 2039.370399] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2039.372527] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 2039.374091] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2039.376209] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 2039.379269] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2039.380397] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2039.382606] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2039.383732] blk_update_request: I/O error, dev sr0, sector 2096901 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2039.385974] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2039.387201] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2039.388439] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 2039.390043] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 2039.391617] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 2039.393198] Buffer I/O error on dev loop4, logical block 2096903, async page read 02:42:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x5118) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:42:41 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xc4653600}}], 0x300, 0x102, 0x0) 02:42:41 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 19) 02:42:41 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="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"]) 02:42:41 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x6000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:42:41 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x100000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:42:41 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:42:41 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x5000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 2052.069295] 9pnet: Insufficient options for proto=fd [ 2052.077759] FAULT_INJECTION: forcing a failure. [ 2052.077759] name failslab, interval 1, probability 0, space 0, times 0 [ 2052.079047] CPU: 0 PID: 24187 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2052.079841] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2052.080774] Call Trace: [ 2052.081078] dump_stack+0x107/0x167 [ 2052.081501] should_fail.cold+0x5/0xa [ 2052.081943] ? v9fs_mount+0x5a/0x8f0 [ 2052.082372] should_failslab+0x5/0x20 [ 2052.082805] kmem_cache_alloc_trace+0x55/0x320 [ 2052.083321] ? v9fs_write_inode+0x60/0x60 [ 2052.083791] v9fs_mount+0x5a/0x8f0 [ 2052.084206] ? v9fs_write_inode+0x60/0x60 [ 2052.084703] legacy_get_tree+0x105/0x220 [ 2052.085162] vfs_get_tree+0x8e/0x300 [ 2052.085588] path_mount+0x13be/0x20b0 [ 2052.086032] ? strncpy_from_user+0x9e/0x470 [ 2052.086524] ? finish_automount+0xa90/0xa90 [ 2052.087028] ? getname_flags.part.0+0x1dd/0x4f0 [ 2052.087581] ? _copy_from_user+0xfb/0x1b0 [ 2052.088086] __x64_sys_mount+0x282/0x300 [ 2052.088571] ? copy_mnt_ns+0xa00/0xa00 [ 2052.089054] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2052.089684] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2052.090296] do_syscall_64+0x33/0x40 [ 2052.090746] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2052.091350] RIP: 0033:0x7f7e97cd8b19 [ 2052.091791] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2052.093987] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2052.094912] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2052.095751] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2052.096596] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2052.097440] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2052.098288] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 02:42:41 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 20) [ 2052.151326] FAULT_INJECTION: forcing a failure. [ 2052.151326] name failslab, interval 1, probability 0, space 0, times 0 [ 2052.152738] CPU: 0 PID: 24252 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2052.153519] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2052.154442] Call Trace: [ 2052.154743] dump_stack+0x107/0x167 [ 2052.155153] should_fail.cold+0x5/0xa [ 2052.155578] ? create_object.isra.0+0x3a/0xa20 [ 2052.156099] should_failslab+0x5/0x20 [ 2052.156531] kmem_cache_alloc+0x5b/0x310 [ 2052.156995] ? cred_has_capability.isra.0+0x152/0x2b0 [ 2052.157580] create_object.isra.0+0x3a/0xa20 [ 2052.158076] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2052.158645] kmem_cache_alloc_trace+0x151/0x320 [ 2052.159177] ? v9fs_write_inode+0x60/0x60 [ 2052.159641] v9fs_mount+0x5a/0x8f0 [ 2052.160041] ? v9fs_write_inode+0x60/0x60 [ 2052.160500] legacy_get_tree+0x105/0x220 [ 2052.160958] vfs_get_tree+0x8e/0x300 [ 2052.161380] path_mount+0x13be/0x20b0 [ 2052.161803] ? strncpy_from_user+0x9e/0x470 [ 2052.162290] ? finish_automount+0xa90/0xa90 [ 2052.162772] ? getname_flags.part.0+0x1dd/0x4f0 [ 2052.163281] ? _copy_from_user+0xfb/0x1b0 [ 2052.163781] __x64_sys_mount+0x282/0x300 [ 2052.164225] ? copy_mnt_ns+0xa00/0xa00 [ 2052.164687] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2052.165302] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2052.165900] do_syscall_64+0x33/0x40 [ 2052.166337] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2052.166928] RIP: 0033:0x7f7e97cd8b19 [ 2052.167367] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2052.169530] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2052.170418] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2052.171259] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2052.172099] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2052.172939] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2052.172946] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 2052.188494] 9pnet: p9_fd_create_tcp (24252): problem connecting socket to 127.0.0.1 02:42:41 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f}}], 0x300, 0x102, 0x0) 02:42:41 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 21) 02:42:41 executing program 4: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000005c0), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000400)=0x5) recvmsg(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000880)=@rc={0x1f, @none}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000940)=""/149, 0x95}], 0x1}, 0x2) r1 = syz_open_procfs(0x0, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f00000004c0)) mknodat$loop(0xffffffffffffffff, &(0x7f0000000240)='./mnt\x00', 0x0, 0x1) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f00000002c0)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) mount$9p_unix(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)='./mnt\x00', &(0x7f0000000480), 0x115549713482a633, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=unix,rootcontext=system_u,smackfsroot=prefer,fsmagQ', @ANYRESDEC, @ANYBLOB="f7d613dc6606c9a3588e04b7606ac9fd1ade12dcc41164f2987f50b57ddde7398dfa62a6441744aa6e8cbd3f3df8382e72c823184c0bbc38889d3524baa988", @ANYRESDEC=r2, @ANYRESHEX=r2]) sendmsg$nl_xfrm(r1, &(0x7f0000000280)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)=@delpolicy={0x78, 0x14, 0x100, 0x70bd2d, 0x25dfdbfc, {{@in=@local, @in6=@private0, 0x4e24, 0x5, 0x4e21, 0x9, 0xa, 0x20, 0xb0, 0x32, 0x0, r2}, 0x6e6bb9, 0x2}, [@policy_type={0xa, 0x10, {0x1}}, @mark={0xc, 0x15, {0x35075c, 0x4}}, @XFRMA_SET_MARK_MASK={0x8, 0x1e, 0x2}, @XFRMA_SET_MARK={0x8, 0x1d, 0x45e1}]}, 0x78}, 0x1, 0x0, 0x0, 0xc}, 0x8080) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/fib_trie\x00') preadv(r3, &(0x7f0000000580)=[{&(0x7f0000001380)=""/213, 0xd5}, {&(0x7f0000000600)=""/209, 0xd1}, {&(0x7f00000001c0)=""/89, 0x59}], 0x3, 0x5545, 0x0) [ 2052.277308] FAULT_INJECTION: forcing a failure. [ 2052.277308] name failslab, interval 1, probability 0, space 0, times 0 [ 2052.279647] CPU: 1 PID: 24315 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2052.281086] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 02:42:41 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000}}], 0x300, 0x102, 0x0) [ 2052.282884] Call Trace: [ 2052.283462] dump_stack+0x107/0x167 [ 2052.284218] should_fail.cold+0x5/0xa [ 2052.285048] should_failslab+0x5/0x20 [ 2052.285804] __kmalloc_track_caller+0x79/0x370 [ 2052.286843] ? v9fs_session_init+0xa7/0x1680 [ 2052.287734] ? kernel_text_address+0xf2/0x120 [ 2052.288673] kstrdup+0x36/0x70 [ 2052.289346] v9fs_session_init+0xa7/0x1680 02:42:41 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = syz_open_procfs$userns(r1, &(0x7f0000000000)) ioctl$AUTOFS_IOC_READY(r2, 0x9360, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000940)="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", 0x1000) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7472db0a6acf616e733d66642c7266646e6f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',msize=0x0000000000001cd8,\x00']) [ 2052.290303] ? lock_release+0x680/0x680 [ 2052.291197] ? find_held_lock+0x2c/0x110 [ 2052.292029] ? kmem_cache_alloc_trace+0x151/0x320 [ 2052.293036] ? v9fs_show_options+0x690/0x690 [ 2052.293942] ? trace_hardirqs_on+0x5b/0x180 [ 2052.294829] ? kasan_unpoison_shadow+0x33/0x50 [ 2052.295765] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2052.296816] v9fs_mount+0x79/0x8f0 [ 2052.297542] ? v9fs_write_inode+0x60/0x60 [ 2052.298386] legacy_get_tree+0x105/0x220 [ 2052.299210] vfs_get_tree+0x8e/0x300 [ 2052.299966] path_mount+0x13be/0x20b0 [ 2052.300763] ? strncpy_from_user+0x9e/0x470 [ 2052.301639] ? finish_automount+0xa90/0xa90 02:42:41 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x200000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 2052.302566] ? getname_flags.part.0+0x1dd/0x4f0 [ 2052.303526] ? _copy_from_user+0xfb/0x1b0 [ 2052.304380] __x64_sys_mount+0x282/0x300 [ 2052.305227] ? copy_mnt_ns+0xa00/0xa00 [ 2052.306025] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2052.307085] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2052.308147] do_syscall_64+0x33/0x40 [ 2052.308920] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2052.309953] RIP: 0033:0x7f7e97cd8b19 [ 2052.310706] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2052.314415] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2052.315950] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2052.317396] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2052.318835] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2052.320267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2052.321716] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 02:42:41 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:42:41 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x7000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:42:41 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000000000}}], 0x300, 0x102, 0x0) 02:42:41 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="74cf0b55b23e36f287815ac69ba7d3525696a4ba726664ce0b3db88119d8e1274619a6cd10aa374134be03d54c2c7d203148d3d6c7936c2acc92e9326aa854b8114fab9fb5aed0b8483f50e4fd02ce09514b0ffb76e30bd91db79071e9a9ef08dff253928d33e170778f7cf96fe213dde8c4d0d8eb1ad49baf71422d1b0d19e743dd9950bc9febf43f8b79ebc0898b469473b6c15a8b349973e6bdbd09e7625ecc0a0c6b23a8410c3395d46fb22a2814f42f1533e8eb57e8d2e453a83324adf8e743c9469a3e8cf527da9748e2a6443896f9c7d7d2ca76f4b031cffd8767ce2dbe81", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c6d73697a653d307830304230332b3902000000000000008e2c6200"/40]) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) unlinkat(r0, &(0x7f0000000000)='./file1\x00', 0x200) 02:42:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x6800) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:42:41 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) [ 2052.775882] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2052.777109] print_req_error: 6 callbacks suppressed [ 2052.777127] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2052.780452] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2052.781622] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2052.783876] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2052.785046] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2052.787310] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2052.788474] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2052.790719] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2052.792901] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 2052.794509] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2052.797209] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 2052.798799] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2052.800973] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 2052.802561] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2052.804758] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 2052.806494] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2052.807637] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2052.809898] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2052.811048] blk_update_request: I/O error, dev sr0, sector 2096901 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2052.813314] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2052.814554] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2052.821741] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 2052.823370] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 2052.824994] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 2052.826579] Buffer I/O error on dev loop4, logical block 2096903, async page read 02:42:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x6c00) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:42:58 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) [ 2068.969076] FAULT_INJECTION: forcing a failure. [ 2068.969076] name failslab, interval 1, probability 0, space 0, times 0 [ 2068.971465] CPU: 0 PID: 24561 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2068.972940] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2068.974594] Call Trace: [ 2068.975137] dump_stack+0x107/0x167 [ 2068.975929] should_fail.cold+0x5/0xa [ 2068.976713] ? create_object.isra.0+0x3a/0xa20 [ 2068.976735] should_failslab+0x5/0x20 02:42:58 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0xe0ffff) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:42:58 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 22) 02:42:58 executing program 4: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0x7, 0xcd, 0x8, 0xc, 0x0, 0x0, 0x80240, 0x8, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x4, @perf_config_ext={0xffffffffffffffff, 0x5}, 0x3a2c84db24e08843, 0x80200000, 0x6, 0x2, 0x7, 0x7f, 0x8, 0x0, 0x6, 0x0, 0xfffffffffffffffd}, 0x0, 0x10, r0, 0x3) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000500), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="7472616e730966640e7266646e6f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c63616368657461673d162c64656275593d30782c6d6d61702c6163636573733d616e852c64666c7475690500", @ANYRESHEX=0xee00, @ANYBLOB="2c7375626a5f726f6c653d2dc32a2c7569643e", @ANYRESDEC=0xee01, @ANYBLOB=',smackfsfloor=,euid<', @ANYRESDEC=0x0, @ANYBLOB=',measure,func=POLICY_CHECK,\x00']) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0xfffe, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10, 0x0}, 0x404c008) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) 02:42:58 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x3665c4ffffffff}}], 0x300, 0x102, 0x0) 02:42:58 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000140)='./file1\x00', 0x440440, 0x2) removexattr(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000100)=@known='system.advise\x00') fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB='t(j|\x00 \x00\x00\x00']) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) 02:42:58 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0xa000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 2068.976753] kmem_cache_alloc+0x5b/0x310 [ 2068.976777] create_object.isra.0+0x3a/0xa20 [ 2068.976797] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2068.976821] __kmalloc_track_caller+0x177/0x370 [ 2068.976860] ? v9fs_session_init+0xa7/0x1680 [ 2068.976879] ? kernel_text_address+0xf2/0x120 [ 2068.976904] kstrdup+0x36/0x70 [ 2068.976924] v9fs_session_init+0xa7/0x1680 [ 2068.976944] ? lock_release+0x680/0x680 [ 2068.976961] ? find_held_lock+0x2c/0x110 [ 2068.976986] ? kmem_cache_alloc_trace+0x151/0x320 [ 2068.977004] ? v9fs_show_options+0x690/0x690 [ 2068.977033] ? trace_hardirqs_on+0x5b/0x180 [ 2068.977057] ? kasan_unpoison_shadow+0x33/0x50 [ 2068.977078] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2068.977103] v9fs_mount+0x79/0x8f0 [ 2068.977125] ? v9fs_write_inode+0x60/0x60 [ 2068.977145] legacy_get_tree+0x105/0x220 [ 2068.977165] vfs_get_tree+0x8e/0x300 02:42:58 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}}], 0x300, 0x102, 0x0) [ 2068.977187] path_mount+0x13be/0x20b0 [ 2068.977211] ? strncpy_from_user+0x9e/0x470 [ 2068.977233] ? finish_automount+0xa90/0xa90 02:42:58 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 23) [ 2068.977251] ? getname_flags.part.0+0x1dd/0x4f0 [ 2068.977269] ? _copy_from_user+0xfb/0x1b0 02:42:58 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/loop1', 0x400, 0x40) clone3(&(0x7f00000008c0)={0x20349500, 0x0, 0x0, 0x0, {0x2b}, 0x0, 0x45, 0x0, 0x0, 0x0, {r0}}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) open$dir(&(0x7f00000000c0)='./file1\x00', 0x44200, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) [ 2068.977300] __x64_sys_mount+0x282/0x300 [ 2068.977320] ? copy_mnt_ns+0xa00/0xa00 [ 2068.977344] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2068.977363] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2068.977388] do_syscall_64+0x33/0x40 [ 2068.977409] entry_SYSCALL_64_after_hwframe+0x62/0xc7 02:42:58 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x7, 0x7, 0x6, 0x40, 0x0, 0x1, 0x8212, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x6, 0x401}, 0x100, 0x2, 0x6, 0x8, 0xfff, 0x10000, 0x5de, 0x0, 0x80000000, 0x0, 0x7}, r0, 0x1, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101142, 0x0) write$P9_RWSTAT(r1, &(0x7f0000000280)={0x7}, 0x7) [ 2068.977422] RIP: 0033:0x7f7e97cd8b19 [ 2068.977442] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2068.977452] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2068.977473] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2068.977483] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2068.977494] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2068.977504] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2068.977515] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 2069.001461] 9pnet: Insufficient options for proto=fd [ 2069.022369] 9pnet: p9_fd_create_tcp (24561): problem connecting socket to 127.0.0.1 [ 2069.200913] FAULT_INJECTION: forcing a failure. [ 2069.200913] name failslab, interval 1, probability 0, space 0, times 0 [ 2069.200935] CPU: 1 PID: 24686 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2069.200945] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2069.200951] Call Trace: [ 2069.200972] dump_stack+0x107/0x167 [ 2069.200996] should_fail.cold+0x5/0xa [ 2069.201026] should_failslab+0x5/0x20 [ 2069.201047] __kmalloc_track_caller+0x79/0x370 [ 2069.201068] ? v9fs_session_init+0xa7/0x1680 [ 2069.201088] ? kernel_text_address+0xf2/0x120 [ 2069.201113] kstrdup+0x36/0x70 [ 2069.201131] v9fs_session_init+0xa7/0x1680 [ 2069.201152] ? lock_release+0x680/0x680 [ 2069.201169] ? find_held_lock+0x2c/0x110 [ 2069.201195] ? kmem_cache_alloc_trace+0x151/0x320 [ 2069.201213] ? v9fs_show_options+0x690/0x690 [ 2069.201242] ? trace_hardirqs_on+0x5b/0x180 [ 2069.201265] ? kasan_unpoison_shadow+0x33/0x50 [ 2069.201286] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2069.201311] v9fs_mount+0x79/0x8f0 [ 2069.201334] ? v9fs_write_inode+0x60/0x60 [ 2069.201354] legacy_get_tree+0x105/0x220 [ 2069.201374] vfs_get_tree+0x8e/0x300 [ 2069.201395] path_mount+0x13be/0x20b0 [ 2069.201419] ? strncpy_from_user+0x9e/0x470 [ 2069.201441] ? finish_automount+0xa90/0xa90 [ 2069.201461] ? getname_flags.part.0+0x1dd/0x4f0 [ 2069.201478] ? _copy_from_user+0xfb/0x1b0 [ 2069.201509] __x64_sys_mount+0x282/0x300 [ 2069.201529] ? copy_mnt_ns+0xa00/0xa00 [ 2069.201553] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2069.201575] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2069.201600] do_syscall_64+0x33/0x40 [ 2069.201622] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2069.201634] RIP: 0033:0x7f7e97cd8b19 [ 2069.201653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2069.201663] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2069.201684] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2069.201695] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2069.201705] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2069.201724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2069.255211] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 2069.259856] 9pnet: Insufficient options for proto=fd 02:42:58 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000000000}}], 0x300, 0x102, 0x0) 02:42:58 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:42:58 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x48000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:42:58 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x1000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:42:58 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x7400) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:42:58 executing program 4: r0 = syz_io_uring_setup(0x5e8, &(0x7f0000000300), &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000380), &(0x7f00000003c0)) syz_io_uring_setup(0x718d, &(0x7f0000000000)={0x0, 0x86a0, 0x0, 0x2, 0x273, 0x0, r0}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) 02:42:58 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) fsmount(r0, 0x0, 0x70) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c6d73697a653d30783030303010ab5069d1f2415f30"]) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) write$binfmt_elf64(r1, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x8, 0x3, 0x65, 0x9, 0x3, 0x3, 0x3, 0x392, 0x40, 0x160, 0x1f, 0x40, 0x38, 0x1, 0x109c, 0xef9, 0x1ff}, [{0x1, 0xffffffff, 0x2, 0x3, 0x4, 0xffff, 0x0, 0x1}, {0x60000000, 0x8, 0x2, 0x7e, 0xd2, 0x3, 0x7, 0x7}], "8bd8b3b725e0a322c4fdcbe99438b07ddb0bff8f9729e173fa9f244d80537e8e93362a0f05cca57fba31f0282122a831471a9943f72e289617d35fc06781ad6b2724cebc000f136570383085c7", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x5fd) [ 2069.538021] 9pnet: Insufficient options for proto=fd 02:42:58 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00000000000000}}], 0x300, 0x102, 0x0) [ 2069.702487] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2069.703714] print_req_error: 6 callbacks suppressed [ 2069.703732] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2069.707033] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2069.707076] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2069.709638] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 2069.710700] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2069.710819] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2069.712620] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2069.714553] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2069.714747] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2069.715873] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 2069.717919] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2069.720438] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2069.722454] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2069.723163] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 2069.725220] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2069.732322] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2069.733425] blk_update_request: I/O error, dev sr0, sector 2096901 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2069.734460] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2069.735572] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2069.738076] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 2069.739232] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2069.740935] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 2069.751790] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 2069.753649] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 2069.755539] Buffer I/O error on dev loop4, logical block 2096903, async page read 02:43:12 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 24) 02:43:12 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff7f00000000}}], 0x300, 0x102, 0x0) [ 2083.692293] FAULT_INJECTION: forcing a failure. [ 2083.692293] name failslab, interval 1, probability 0, space 0, times 0 [ 2083.693627] CPU: 1 PID: 24935 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2083.694415] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2083.695352] Call Trace: [ 2083.695657] dump_stack+0x107/0x167 [ 2083.696082] should_fail.cold+0x5/0xa [ 2083.696520] should_failslab+0x5/0x20 [ 2083.696957] __kmalloc_track_caller+0x79/0x370 [ 2083.697608] ? v9fs_session_init+0xe9/0x1680 [ 2083.698149] ? kernel_text_address+0xf2/0x120 [ 2083.698763] kstrdup+0x36/0x70 [ 2083.699125] v9fs_session_init+0xe9/0x1680 [ 2083.699608] ? lock_release+0x680/0x680 [ 2083.700061] ? find_held_lock+0x2c/0x110 [ 2083.700529] ? kmem_cache_alloc_trace+0x151/0x320 [ 2083.701081] ? v9fs_show_options+0x690/0x690 [ 2083.701685] ? trace_hardirqs_on+0x5b/0x180 02:43:12 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x2000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:43:12 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x4c000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:43:12 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:43:12 executing program 4: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000004840), 0xffffffffffffffff) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000001180), 0x1, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = dup(r4) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_FRAME(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x20, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_FRAME_MATCH={0x4}]}, 0x20}}, 0x0) sendmsg$NL80211_CMD_CONNECT(r1, &(0x7f0000002440)={&(0x7f00000011c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000002400)={&(0x7f0000001200)={0x11d4, r0, 0x10, 0x70bd26, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r6}, @val={0xc, 0x99, {0x0, 0x72}}}}, [@NL80211_ATTR_MAC={0xa, 0x6, @from_mac=@broadcast}, @NL80211_ATTR_USE_MFP={0x8, 0x42, 0x1}, @fils_params=[@NL80211_ATTR_FILS_ERP_RRK={0x1004, 0xfc, "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"}, @NL80211_ATTR_FILS_ERP_RRK={0xac, 0xfc, "eff906b762e90023bea87b77c16441ffb1262da444a5790b1adc8ee91c3cad38c2326bb899cee5b8133aacea684ea7a42bd3be31a04fc8e409b7540c5a18a120c94655460f08426d2f72241795504a591c78d2bb83e3621fda86604a5feca537904fa897c4155f85593fc1701ce55574cf53cfdbde128702730c7bc3689f60de9ce3cf36af94c7db90dc4b6e204c9bcb2f4429d004d51348b7cfc4aa6293c4a15f842510d3fb586a"}, @NL80211_ATTR_FILS_ERP_NEXT_SEQ_NUM={0x6, 0xfb, 0x6}, @NL80211_ATTR_FILS_ERP_REALM={0x19, 0xfa, "7d100cc2b96ff201bf238eae7b8c8ace1652f9dab3"}, @NL80211_ATTR_FILS_ERP_RRK={0x6a, 0xfc, "3f30e51a13b09d3a1d1267a78a19bc964c13db353413ddf5a807c564c7e3a9e0231795ab3bfcfd43951433c9bed022f4fae0eaf69766e61bc39c268f3b31ab351f2e60198444e8e3051947a175dc168be7f1890664dca5081dca99da3e40fce04de6324e9f8f"}, @NL80211_ATTR_FILS_ERP_USERNAME={0xd, 0xf9, "305617334f21dc7062"}, @NL80211_ATTR_FILS_ERP_RRK={0x48, 0xfc, "ad80f575b2c9677056444bae664c8e868defcb556123b2fc52f9bc79b1a916506f784e50b4abc8d6336057ba0793d40c15259b23d681ba376cd6529f8a4b522994747a30"}]]}, 0x11d4}, 0x1, 0x0, 0x0, 0x8000}, 0x0) [ 2083.702259] ? kasan_unpoison_shadow+0x33/0x50 [ 2083.702816] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 02:43:12 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x7a00) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:43:12 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) sendfile(r0, r0, &(0x7f0000000000)=0x9, 0x1ff) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) [ 2083.703408] v9fs_mount+0x79/0x8f0 [ 2083.703422] ? v9fs_write_inode+0x60/0x60 [ 2083.703434] legacy_get_tree+0x105/0x220 [ 2083.703447] vfs_get_tree+0x8e/0x300 [ 2083.703459] path_mount+0x13be/0x20b0 [ 2083.703473] ? strncpy_from_user+0x9e/0x470 [ 2083.703486] ? finish_automount+0xa90/0xa90 [ 2083.703498] ? getname_flags.part.0+0x1dd/0x4f0 [ 2083.703508] ? _copy_from_user+0xfb/0x1b0 [ 2083.703525] __x64_sys_mount+0x282/0x300 02:43:12 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 25) [ 2083.703537] ? copy_mnt_ns+0xa00/0xa00 [ 2083.703551] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2083.703563] ? syscall_enter_from_user_mode+0x1d/0x50 02:43:12 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000000)='msize', &(0x7f00000000c0)='./file1\x00', 0xffffffffffffff9c) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c6d73697a653d3078302830e4303030303030303030316364382c00"]) 02:43:12 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff00000000}}], 0x300, 0x102, 0x0) [ 2083.703578] do_syscall_64+0x33/0x40 [ 2083.703590] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2083.703598] RIP: 0033:0x7f7e97cd8b19 [ 2083.703609] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2083.703615] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2083.703627] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2083.703633] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2083.703639] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2083.703645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2083.703652] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 2083.717690] 9pnet: Insufficient options for proto=fd [ 2083.803124] FAULT_INJECTION: forcing a failure. [ 2083.803124] name failslab, interval 1, probability 0, space 0, times 0 [ 2083.803138] CPU: 1 PID: 25053 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2083.803144] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2083.803147] Call Trace: [ 2083.803161] dump_stack+0x107/0x167 [ 2083.803175] should_fail.cold+0x5/0xa [ 2083.803187] ? create_object.isra.0+0x3a/0xa20 [ 2083.803199] should_failslab+0x5/0x20 [ 2083.803209] kmem_cache_alloc+0x5b/0x310 [ 2083.803222] create_object.isra.0+0x3a/0xa20 [ 2083.803232] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2083.803246] __kmalloc_track_caller+0x177/0x370 [ 2083.803256] ? v9fs_session_init+0xe9/0x1680 [ 2083.803266] ? kernel_text_address+0xf2/0x120 [ 2083.803280] kstrdup+0x36/0x70 [ 2083.803290] v9fs_session_init+0xe9/0x1680 [ 2083.803301] ? lock_release+0x680/0x680 [ 2083.803311] ? find_held_lock+0x2c/0x110 [ 2083.803325] ? kmem_cache_alloc_trace+0x151/0x320 [ 2083.803339] ? v9fs_show_options+0x690/0x690 [ 2083.803355] ? trace_hardirqs_on+0x5b/0x180 [ 2083.803368] ? kasan_unpoison_shadow+0x33/0x50 [ 2083.803379] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2083.803393] v9fs_mount+0x79/0x8f0 [ 2083.803406] ? v9fs_write_inode+0x60/0x60 [ 2083.803417] legacy_get_tree+0x105/0x220 [ 2083.803437] vfs_get_tree+0x8e/0x300 [ 2083.803450] path_mount+0x13be/0x20b0 [ 2083.803463] ? strncpy_from_user+0x9e/0x470 [ 2083.803475] ? finish_automount+0xa90/0xa90 [ 2083.803486] ? getname_flags.part.0+0x1dd/0x4f0 [ 2083.803496] ? _copy_from_user+0xfb/0x1b0 [ 2083.803513] __x64_sys_mount+0x282/0x300 [ 2083.803524] ? copy_mnt_ns+0xa00/0xa00 [ 2083.803537] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2083.803547] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2083.803561] do_syscall_64+0x33/0x40 [ 2083.803573] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2083.803580] RIP: 0033:0x7f7e97cd8b19 [ 2083.803591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2083.803596] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2083.803609] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2083.803615] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2083.803620] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2083.803626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2083.803632] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 2083.805464] 9pnet: p9_fd_create_tcp (25053): problem connecting socket to 127.0.0.1 [ 2083.813610] 9pnet: Insufficient options for proto=fd [ 2083.997745] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2083.998394] print_req_error: 6 callbacks suppressed [ 2083.998405] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2084.000709] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2084.001905] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 2084.003855] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2084.004440] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2084.005630] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2084.005636] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2084.005658] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2084.007927] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 2084.008495] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2084.010749] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2084.011842] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2084.012568] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 2084.013727] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2084.017316] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2084.018566] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2084.018739] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2084.019170] blk_update_request: I/O error, dev sr0, sector 2096901 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2084.021437] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 2084.022581] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2084.024201] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 2084.024790] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2084.039373] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 2084.041090] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 2084.042793] Buffer I/O error on dev loop4, logical block 2096903, async page read 02:43:27 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) fsmount(r0, 0x0, 0x6) 02:43:27 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x68000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:43:27 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x4c000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 2098.534645] 9pnet: Insufficient options for proto=fd 02:43:27 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x80000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:43:27 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffc4653600}}], 0x300, 0x102, 0x0) 02:43:27 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:43:27 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x3000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:43:27 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 26) [ 2098.565981] FAULT_INJECTION: forcing a failure. [ 2098.565981] name failslab, interval 1, probability 0, space 0, times 0 [ 2098.568626] CPU: 1 PID: 25177 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2098.570040] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2098.571745] Call Trace: [ 2098.572298] dump_stack+0x107/0x167 [ 2098.573064] should_fail.cold+0x5/0xa [ 2098.573995] ? create_object.isra.0+0x3a/0xa20 [ 2098.574932] should_failslab+0x5/0x20 [ 2098.575841] kmem_cache_alloc+0x5b/0x310 [ 2098.576699] ? kernel_text_address+0xf2/0x120 [ 2098.577685] create_object.isra.0+0x3a/0xa20 [ 2098.577706] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2098.577730] kmem_cache_alloc_trace+0x151/0x320 [ 2098.577747] ? find_held_lock+0x2c/0x110 [ 2098.577772] p9_client_create+0xaf/0x11c0 [ 2098.577791] ? lock_downgrade+0x6d0/0x6d0 [ 2098.577816] ? p9_client_flush+0x430/0x430 [ 2098.577836] ? trace_hardirqs_on+0x5b/0x180 [ 2098.577857] ? lockdep_init_map_type+0x2c7/0x780 [ 2098.577882] ? __raw_spin_lock_init+0x36/0x110 [ 2098.577907] v9fs_session_init+0x1dd/0x1680 [ 2098.577927] ? lock_release+0x680/0x680 [ 2098.577954] ? kmem_cache_alloc_trace+0x151/0x320 [ 2098.577972] ? v9fs_show_options+0x690/0x690 [ 2098.578000] ? trace_hardirqs_on+0x5b/0x180 [ 2098.578023] ? kasan_unpoison_shadow+0x33/0x50 [ 2098.578044] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 02:43:27 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0}}], 0x300, 0x102, 0x0) 02:43:27 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 27) 02:43:27 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000000)='./file1/file0\x00', 0xc0140, 0x6) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) [ 2098.578069] v9fs_mount+0x79/0x8f0 [ 2098.578091] ? v9fs_write_inode+0x60/0x60 [ 2098.578112] legacy_get_tree+0x105/0x220 [ 2098.578132] vfs_get_tree+0x8e/0x300 [ 2098.578154] path_mount+0x13be/0x20b0 [ 2098.578177] ? strncpy_from_user+0x9e/0x470 [ 2098.578199] ? finish_automount+0xa90/0xa90 [ 2098.578217] ? getname_flags.part.0+0x1dd/0x4f0 02:43:27 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x6c000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 2098.578234] ? _copy_from_user+0xfb/0x1b0 [ 2098.578265] __x64_sys_mount+0x282/0x300 [ 2098.578285] ? copy_mnt_ns+0xa00/0xa00 [ 2098.578308] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2098.578325] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2098.578350] do_syscall_64+0x33/0x40 [ 2098.578371] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2098.578384] RIP: 0033:0x7f7e97cd8b19 [ 2098.578403] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2098.578413] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2098.578434] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2098.578445] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2098.578456] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2098.578467] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2098.578478] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 2098.610485] 9pnet: p9_fd_create_tcp (25177): problem connecting socket to 127.0.0.1 [ 2098.757351] FAULT_INJECTION: forcing a failure. [ 2098.757351] name failslab, interval 1, probability 0, space 0, times 0 [ 2098.757373] CPU: 1 PID: 25295 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2098.757383] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2098.757390] Call Trace: [ 2098.757412] dump_stack+0x107/0x167 [ 2098.757436] should_fail.cold+0x5/0xa [ 2098.757463] should_failslab+0x5/0x20 [ 2098.757484] __kmalloc_track_caller+0x79/0x370 [ 2098.757501] ? p9_client_create+0x41d/0x11c0 [ 2098.757527] kstrdup+0x36/0x70 [ 2098.757546] p9_client_create+0x41d/0x11c0 [ 2098.757567] ? lock_downgrade+0x6d0/0x6d0 [ 2098.757591] ? p9_client_flush+0x430/0x430 [ 2098.757612] ? trace_hardirqs_on+0x5b/0x180 [ 2098.757633] ? lockdep_init_map_type+0x2c7/0x780 [ 2098.757664] ? __raw_spin_lock_init+0x36/0x110 [ 2098.757690] v9fs_session_init+0x1dd/0x1680 [ 2098.757709] ? lock_release+0x680/0x680 [ 2098.757737] ? kmem_cache_alloc_trace+0x151/0x320 [ 2098.757757] ? v9fs_show_options+0x690/0x690 [ 2098.757788] ? trace_hardirqs_on+0x5b/0x180 [ 2098.757811] ? kasan_unpoison_shadow+0x33/0x50 [ 2098.757831] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2098.757856] v9fs_mount+0x79/0x8f0 [ 2098.757878] ? v9fs_write_inode+0x60/0x60 [ 2098.757898] legacy_get_tree+0x105/0x220 [ 2098.757919] vfs_get_tree+0x8e/0x300 [ 2098.757940] path_mount+0x13be/0x20b0 [ 2098.757965] ? strncpy_from_user+0x9e/0x470 [ 2098.757986] ? finish_automount+0xa90/0xa90 [ 2098.758005] ? getname_flags.part.0+0x1dd/0x4f0 [ 2098.758023] ? _copy_from_user+0xfb/0x1b0 [ 2098.758054] __x64_sys_mount+0x282/0x300 [ 2098.758074] ? copy_mnt_ns+0xa00/0xa00 [ 2098.758097] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2098.758116] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2098.758141] do_syscall_64+0x33/0x40 [ 2098.758162] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2098.758176] RIP: 0033:0x7f7e97cd8b19 [ 2098.758195] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2098.758206] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2098.758227] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2098.758239] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2098.758250] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2098.758260] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2098.758271] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 2098.775914] 9pnet: Insufficient options for proto=fd 02:43:27 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 28) 02:43:28 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) [ 2098.906522] FAULT_INJECTION: forcing a failure. [ 2098.906522] name failslab, interval 1, probability 0, space 0, times 0 [ 2098.908980] CPU: 0 PID: 25326 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2098.910352] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2098.911982] Call Trace: [ 2098.912506] dump_stack+0x107/0x167 [ 2098.913251] should_fail.cold+0x5/0xa [ 2098.914030] ? create_object.isra.0+0x3a/0xa20 [ 2098.914931] should_failslab+0x5/0x20 [ 2098.915679] kmem_cache_alloc+0x5b/0x310 [ 2098.916477] ? lock_downgrade+0x6d0/0x6d0 [ 2098.917316] create_object.isra.0+0x3a/0xa20 [ 2098.918195] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2098.919211] __kmalloc_track_caller+0x177/0x370 [ 2098.920120] ? p9_client_create+0x41d/0x11c0 [ 2098.920991] kstrdup+0x36/0x70 [ 2098.921658] p9_client_create+0x41d/0x11c0 [ 2098.922492] ? lock_downgrade+0x6d0/0x6d0 [ 2098.923324] ? p9_client_flush+0x430/0x430 [ 2098.924161] ? trace_hardirqs_on+0x5b/0x180 [ 2098.925002] ? lockdep_init_map_type+0x2c7/0x780 [ 2098.925979] ? __raw_spin_lock_init+0x36/0x110 [ 2098.926939] v9fs_session_init+0x1dd/0x1680 [ 2098.927850] ? lock_release+0x680/0x680 [ 2098.928692] ? kmem_cache_alloc_trace+0x151/0x320 [ 2098.929737] ? v9fs_show_options+0x690/0x690 [ 2098.930667] ? trace_hardirqs_on+0x5b/0x180 [ 2098.931579] ? kasan_unpoison_shadow+0x33/0x50 [ 2098.932533] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2098.933611] v9fs_mount+0x79/0x8f0 [ 2098.934351] ? v9fs_write_inode+0x60/0x60 [ 2098.935232] legacy_get_tree+0x105/0x220 [ 2098.936089] vfs_get_tree+0x8e/0x300 [ 2098.936878] path_mount+0x13be/0x20b0 [ 2098.937700] ? strncpy_from_user+0x9e/0x470 [ 2098.938612] ? finish_automount+0xa90/0xa90 [ 2098.939523] ? getname_flags.part.0+0x1dd/0x4f0 [ 2098.940505] ? _copy_from_user+0xfb/0x1b0 [ 2098.941409] __x64_sys_mount+0x282/0x300 [ 2098.942262] ? copy_mnt_ns+0xa00/0xa00 [ 2098.943092] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2098.944194] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2098.945302] do_syscall_64+0x33/0x40 [ 2098.946091] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2098.947163] RIP: 0033:0x7f7e97cd8b19 [ 2098.947947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2098.951805] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2098.953408] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2098.954897] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2098.956386] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2098.957880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2098.959371] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 02:43:28 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}], 0x300, 0x102, 0x0) 02:43:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = openat$incfs(0xffffffffffffffff, &(0x7f0000000140)='.pending_reads\x00', 0x0, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) r3 = creat(&(0x7f0000000000)='./file2\x00', 0x0) fcntl$setlease(r3, 0x400, 0x1) fcntl$setown(r3, 0x8, 0xffffffffffffffff) close(r3) perf_event_open(&(0x7f0000000240)={0x6, 0x80, 0xe5, 0x5, 0xd0, 0x4, 0x0, 0x10001, 0x400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000200), 0x9}, 0x240, 0x7, 0x0, 0x7, 0x0, 0x7, 0x9, 0x0, 0x2}, 0x0, 0xb, r3, 0x3) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000080)={@remote}, 0x14) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x7, 0x0, 0x0, 0x0, 0x5e, 0x104, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000040), 0xd}}, 0x0, 0x8, 0xffffffffffffffff, 0x1) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r1, 0x80489439, &(0x7f0000000340)) lseek(r2, 0x0, 0x2) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x128) copy_file_range(r4, 0x0, r2, 0x0, 0x200f5ef, 0x0) name_to_handle_at(r0, &(0x7f00000000c0)='./file2\x00', &(0x7f0000000180)=ANY=[@ANYBLOB="1c00200082000000e207000000000000f886000000000000080000000080000003000000"], &(0x7f00000002c0), 0x400) 02:43:28 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x4000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:43:28 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x100000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 2099.160183] 9pnet: p9_fd_create_tcp (25326): problem connecting socket to 127.0.0.1 [ 2099.461890] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2099.463172] print_req_error: 6 callbacks suppressed [ 2099.463192] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2099.467063] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2099.468220] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2099.470670] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2099.471881] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2099.474254] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2099.476560] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 2099.478251] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2099.480505] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 2099.482165] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2099.484409] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 2099.486184] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2099.487377] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2099.489802] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2099.490938] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2099.493306] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2099.494664] blk_update_request: I/O error, dev sr0, sector 2096901 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2099.496931] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2099.498281] blk_update_request: I/O error, dev sr0, sector 2096902 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2099.500543] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2099.506775] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 2099.508392] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 2099.510278] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 2099.511849] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 2099.513737] Buffer I/O error on dev loop4, logical block 2096903, async page read [ 2099.554900] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2099.556319] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 2099.562168] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2099.563507] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 2099.571467] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2099.572852] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2099.574048] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2099.575428] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2099.576595] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2099.577976] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 02:43:43 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:43:43 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) fsmount(r1, 0x1, 0x4) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) recvmsg$unix(r0, &(0x7f0000000000)={&(0x7f00000000c0)=@abs, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000140)=""/39, 0x27}, {&(0x7f0000000380)=""/192, 0xc0}, {&(0x7f0000000180)=""/10, 0xa}, {&(0x7f0000000200)=""/16, 0x10}, {&(0x7f0000000280)=""/53, 0x35}, {&(0x7f0000000440)=""/118, 0x76}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f00000002c0)}], 0x8, &(0x7f0000000700)}, 0x2002) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) 02:43:43 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x200000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:43:43 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x5000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:43:43 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}], 0x300, 0x102, 0x0) 02:43:43 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 29) 02:43:43 executing program 4: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000300)={0xb0, 0x0, 0x800, 0x70bd28, 0x25dfdbfd, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x9}, {0x6, 0x16, 0x6}, {0x5}, {0x6, 0x11, 0x7f}, {0x8, 0xb, 0x10000}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x1}, {0x6, 0x16, 0x3}, {0x5}, {0x6, 0x11, 0x1000}, {0x8, 0xb, 0x1000}}]}, 0xb0}, 0x1, 0x0, 0x0, 0x4080}, 0x24008080) syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) timer_delete(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x0, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(r1, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) timer_gettime(r1, &(0x7f0000000140)) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01, 0x0, 0x0, {0xd}}, 0x14}}, 0x0) read(r0, &(0x7f0000000080)=""/65, 0x41) timer_gettime(r1, &(0x7f0000000080)) timer_create(0x1, &(0x7f0000000100)={0x0, 0x20, 0x4, @tid=0xffffffffffffffff}, &(0x7f0000000180)=0x0) timer_gettime(r2, &(0x7f0000000240)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) 02:43:43 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x74000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 2114.538557] FAULT_INJECTION: forcing a failure. [ 2114.538557] name failslab, interval 1, probability 0, space 0, times 0 [ 2114.541062] CPU: 1 PID: 25448 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2114.542581] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2114.544344] Call Trace: [ 2114.544926] dump_stack+0x107/0x167 [ 2114.545735] should_fail.cold+0x5/0xa [ 2114.546568] should_failslab+0x5/0x20 [ 2114.547373] __kmalloc_track_caller+0x79/0x370 [ 2114.548350] ? p9_client_create+0x51e/0x11c0 [ 2114.548379] kmemdup_nul+0x2d/0xa0 [ 2114.548398] p9_client_create+0x51e/0x11c0 [ 2114.548426] ? p9_client_flush+0x430/0x430 [ 2114.548446] ? trace_hardirqs_on+0x5b/0x180 [ 2114.548468] ? lockdep_init_map_type+0x2c7/0x780 [ 2114.548493] ? __raw_spin_lock_init+0x36/0x110 [ 2114.548518] v9fs_session_init+0x1dd/0x1680 [ 2114.548538] ? lock_release+0x680/0x680 [ 2114.548566] ? kmem_cache_alloc_trace+0x151/0x320 [ 2114.548584] ? v9fs_show_options+0x690/0x690 [ 2114.548612] ? trace_hardirqs_on+0x5b/0x180 [ 2114.548636] ? kasan_unpoison_shadow+0x33/0x50 [ 2114.548657] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2114.548682] v9fs_mount+0x79/0x8f0 [ 2114.548704] ? v9fs_write_inode+0x60/0x60 [ 2114.548725] legacy_get_tree+0x105/0x220 [ 2114.548745] vfs_get_tree+0x8e/0x300 [ 2114.548767] path_mount+0x13be/0x20b0 [ 2114.548790] ? strncpy_from_user+0x9e/0x470 [ 2114.548812] ? finish_automount+0xa90/0xa90 [ 2114.548831] ? getname_flags.part.0+0x1dd/0x4f0 [ 2114.548848] ? _copy_from_user+0xfb/0x1b0 [ 2114.548879] __x64_sys_mount+0x282/0x300 [ 2114.548900] ? copy_mnt_ns+0xa00/0xa00 [ 2114.548924] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2114.548942] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2114.548966] do_syscall_64+0x33/0x40 [ 2114.548988] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2114.549000] RIP: 0033:0x7f7e97cd8b19 [ 2114.549020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2114.549031] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2114.549052] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2114.549062] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2114.549073] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2114.549083] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2114.549107] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 02:43:43 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c}}], 0x300, 0x102, 0x0) [ 2114.605725] 9pnet: Insufficient options for proto=fd [ 2114.938237] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2114.939036] print_req_error: 22 callbacks suppressed [ 2114.939048] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2114.941157] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2114.942518] buffer_io_error: 6 callbacks suppressed [ 2114.942525] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 2114.944784] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2114.945518] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2114.946914] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2114.948336] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 2114.949842] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2114.950571] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2114.951996] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2114.953423] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 2114.954874] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2114.955591] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2114.957396] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2114.958110] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2114.959458] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2114.960767] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 2114.961793] blk_update_request: I/O error, dev loop4, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2114.963211] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 2114.964612] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2114.965800] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2114.966598] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2114.971980] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 2114.973040] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 2114.974061] Buffer I/O error on dev loop4, logical block 2096903, async page read 02:43:59 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:43:59 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}}], 0x300, 0x102, 0x0) 02:43:59 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000340)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d41000000", 0x37, 0xb800}], 0x0, &(0x7f0000011700)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r0 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="0500000000f20000e1176261818f7adb698544c88b34dcb70b0fa7439771e000002a6c75c2000000"]) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r0, 0xf50f, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) ioctl$BTRFS_IOC_SNAP_DESTROY(0xffffffffffffffff, 0x5000940f, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) 02:43:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0xe0ffff) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:43:59 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 30) 02:43:59 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) fsmount(r1, 0x0, 0x6) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) 02:43:59 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x6000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:43:59 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x7a000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 2130.047501] FAULT_INJECTION: forcing a failure. [ 2130.047501] name failslab, interval 1, probability 0, space 0, times 0 [ 2130.049751] CPU: 0 PID: 25586 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2130.051091] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2130.052709] Call Trace: [ 2130.053226] dump_stack+0x107/0x167 [ 2130.053952] should_fail.cold+0x5/0xa [ 2130.054697] ? create_object.isra.0+0x3a/0xa20 [ 2130.055599] should_failslab+0x5/0x20 [ 2130.056349] kmem_cache_alloc+0x5b/0x310 [ 2130.057146] create_object.isra.0+0x3a/0xa20 [ 2130.058033] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2130.059027] __kmalloc_track_caller+0x177/0x370 [ 2130.059924] ? p9_client_create+0x51e/0x11c0 [ 2130.060783] kmemdup_nul+0x2d/0xa0 [ 2130.061482] p9_client_create+0x51e/0x11c0 [ 2130.062330] ? p9_client_flush+0x430/0x430 [ 2130.063167] ? trace_hardirqs_on+0x5b/0x180 [ 2130.064007] ? lockdep_init_map_type+0x2c7/0x780 [ 2130.064957] ? __raw_spin_lock_init+0x36/0x110 [ 2130.065856] v9fs_session_init+0x1dd/0x1680 [ 2130.066701] ? lock_release+0x680/0x680 [ 2130.067504] ? kmem_cache_alloc_trace+0x151/0x320 [ 2130.068460] ? v9fs_show_options+0x690/0x690 [ 2130.069318] ? trace_hardirqs_on+0x5b/0x180 [ 2130.070168] ? kasan_unpoison_shadow+0x33/0x50 [ 2130.071047] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2130.072026] v9fs_mount+0x79/0x8f0 [ 2130.072715] ? v9fs_write_inode+0x60/0x60 [ 2130.073519] legacy_get_tree+0x105/0x220 [ 2130.074311] vfs_get_tree+0x8e/0x300 [ 2130.075030] path_mount+0x13be/0x20b0 [ 2130.075766] ? strncpy_from_user+0x9e/0x470 [ 2130.076595] ? finish_automount+0xa90/0xa90 [ 2130.077422] ? getname_flags.part.0+0x1dd/0x4f0 [ 2130.078341] ? _copy_from_user+0xfb/0x1b0 [ 2130.079151] __x64_sys_mount+0x282/0x300 [ 2130.079936] ? copy_mnt_ns+0xa00/0xa00 [ 2130.080688] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2130.081707] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2130.082703] do_syscall_64+0x33/0x40 [ 2130.083422] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2130.084406] RIP: 0033:0x7f7e97cd8b19 [ 2130.085128] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2130.088668] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2130.090136] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2130.091500] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2130.092872] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2130.094250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2130.095602] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 2130.100034] 9pnet: Insufficient options for proto=fd 02:43:59 executing program 4: msgsnd(0x0, 0x0, 0x3f9, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x20) msgsnd(r0, &(0x7f0000000280)=ANY=[], 0x25, 0x0) msgrcv(r0, &(0x7f0000000380)={0x0, ""/165}, 0xad, 0x3, 0x800) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=""/40}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10, 0x0}, 0x404c008) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r1, &(0x7f0000000600)={&(0x7f00000001c0)={0xa, 0x4e23, 0x80000001, @mcast2, 0x8}, 0x1c, &(0x7f00000005c0)=[{0x0}, {&(0x7f0000000480)}, {&(0x7f0000000540)="7b9e63018581f57911cf5dfc4032974da3357eca76de2cdd64aade83b46955558a7f09f0281974aee9f7ab909861385b57a3379dc4599d323d2a358944b915ae55cca041656b450b3204295d3139d7c7f776e985", 0x54}], 0x3}, 0x4000891) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$TIOCGLCKTRMIOS(0xffffffffffffffff, 0x5456, &(0x7f0000000640)={0xc2b2cbe7, 0x6, 0x8, 0x1001, 0x0, "da013e239cbe9b1499dbfbaf5535f449f4d49a"}) 02:43:59 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}}], 0x300, 0x102, 0x0) 02:43:59 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "8fa26d6492245ab2c4b2804da276d13b80d6eab731469ef9bd0bd6682f9e0f183009df520ebabe821c9b00d346ccc20828be94fe69407a15053824a6258f96486c0bb31ccac6220be6e4d98329e1bc353ffbde84b1a7b5ead8d77596f4037616d5800509dec7554bdb41197e466643fbcba5f2b0809e0a36800cf0c8c10bff5e61e7ccfb75b4a266a9d1310c0fef7649df2905ffa29534d9db1759a2d718d137309c601822cb64a19452b20388f852c4a21013a11c6f094964fc119a918a11dd68ee0c756635919af6fc1f2ba2e26d1f57a88d98226a2443498c8178b3ccb82cae834c01282312063cbe896bfdb6e96a24c116f81389f50032173a92fb17d1", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:43:59 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x7000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:43:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x1000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 2130.296714] 9pnet: p9_fd_create_tcp (25586): problem connecting socket to 127.0.0.1 02:43:59 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EVIOCSKEYCODE(r1, 0x40084504, &(0x7f00000000c0)=[0x6, 0x8]) ioctl$EXT4_IOC_SWAP_BOOT(r1, 0x6611) openat(r1, &(0x7f0000000000)='./file1\x00', 0x0, 0x1a1) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) fsmount(r0, 0x1, 0x8) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wno=\x00\x00', @ANYRESHEX, @ANYBLOB="2c6d8f5a73697a650e3002008000000000003031637238"]) 02:43:59 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0xa7140000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:43:59 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c00}}], 0x300, 0x102, 0x0) 02:43:59 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 31) 02:43:59 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) [ 2130.440085] 9pnet: Insufficient options for proto=fd [ 2130.522811] FAULT_INJECTION: forcing a failure. [ 2130.522811] name failslab, interval 1, probability 0, space 0, times 0 [ 2130.525126] CPU: 0 PID: 25784 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2130.526528] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2130.528202] Call Trace: [ 2130.528741] dump_stack+0x107/0x167 [ 2130.529473] should_fail.cold+0x5/0xa [ 2130.530268] should_failslab+0x5/0x20 [ 2130.531030] __kmalloc_track_caller+0x79/0x370 [ 2130.531942] ? parse_opts.part.0+0x8e/0x340 [ 2130.532818] kstrdup+0x36/0x70 [ 2130.533467] parse_opts.part.0+0x8e/0x340 [ 2130.534307] ? lock_acquire+0x197/0x470 [ 2130.535105] ? p9_fd_show_options+0x1c0/0x1c0 [ 2130.536010] ? __delete_object+0xb3/0x100 [ 2130.536842] ? lock_downgrade+0x6d0/0x6d0 [ 2130.537685] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2130.538733] p9_fd_create_tcp+0xbb/0x4f0 [ 2130.539556] ? p9_fd_create_unix+0x2f0/0x2f0 [ 2130.540458] ? __kasan_slab_free+0x122/0x160 [ 2130.541368] ? __startup_64+0x4/0x3b0 [ 2130.542154] ? p9_client_create+0x798/0x11c0 [ 2130.543032] ? kfree+0xd7/0x340 [ 2130.543697] ? do_raw_spin_unlock+0x4f/0x220 [ 2130.544594] p9_client_create+0x7ff/0x11c0 [ 2130.545446] ? p9_client_flush+0x430/0x430 [ 2130.546310] ? trace_hardirqs_on+0x5b/0x180 [ 2130.547178] ? lockdep_init_map_type+0x2c7/0x780 [ 2130.548131] ? __raw_spin_lock_init+0x36/0x110 [ 2130.549058] v9fs_session_init+0x1dd/0x1680 [ 2130.549940] ? lock_release+0x680/0x680 [ 2130.550751] ? kmem_cache_alloc_trace+0x151/0x320 [ 2130.551714] ? v9fs_show_options+0x690/0x690 [ 2130.552601] ? trace_hardirqs_on+0x5b/0x180 [ 2130.553471] ? kasan_unpoison_shadow+0x33/0x50 [ 2130.554394] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2130.555414] v9fs_mount+0x79/0x8f0 [ 2130.556132] ? v9fs_write_inode+0x60/0x60 [ 2130.556963] legacy_get_tree+0x105/0x220 [ 2130.557799] vfs_get_tree+0x8e/0x300 [ 2130.558549] path_mount+0x13be/0x20b0 [ 2130.559314] ? strncpy_from_user+0x9e/0x470 [ 2130.560183] ? finish_automount+0xa90/0xa90 [ 2130.561049] ? getname_flags.part.0+0x1dd/0x4f0 [ 2130.561985] ? _copy_from_user+0xfb/0x1b0 [ 2130.562832] __x64_sys_mount+0x282/0x300 02:43:59 executing program 4: ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pwrite64(r0, &(0x7f00000000c0), 0x17, 0x10001) fallocate(r0, 0x3, 0x0, 0x18000) r1 = perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="0500000000f20000e1176661818f7adb698544c88b34dcb70b0fa7439771e000002a6c75c2000000"]) fcntl$setown(r1, 0x8, 0xffffffffffffffff) pwrite64(0xffffffffffffffff, &(0x7f0000000100)='n', 0x1, 0x0) [ 2130.563655] ? copy_mnt_ns+0xa00/0xa00 [ 2130.564622] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2130.565701] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2130.566783] do_syscall_64+0x33/0x40 [ 2130.567564] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2130.568652] RIP: 0033:0x7f7e97cd8b19 [ 2130.569419] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2130.573227] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2130.574805] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2130.576226] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2130.577691] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2130.579122] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2130.580564] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 2130.887863] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2130.889012] print_req_error: 6 callbacks suppressed [ 2130.889031] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2130.892747] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2130.893887] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2130.896098] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2130.897225] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2130.899440] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2130.900560] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2130.903019] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2130.905192] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 2130.906759] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2130.908900] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 2130.910475] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2130.912602] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 2130.914161] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2130.916287] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 2130.917962] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2130.919087] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2130.921276] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2130.922417] blk_update_request: I/O error, dev sr0, sector 2096901 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2130.924621] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2130.925846] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2130.933746] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 2130.935344] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 2130.936936] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 2130.938561] Buffer I/O error on dev loop4, logical block 2096903, async page read [ 2131.127306] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2131.128502] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 2131.140848] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2131.141986] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 2131.147865] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2131.149175] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2131.150780] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2131.152905] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2131.154203] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2131.155552] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 02:44:16 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0xffffe000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:44:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11040, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[], 0x98a) readv(r1, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r2 = getpgid(0x0) sched_setattr(r2, &(0x7f00000001c0)={0x38}, 0x0) perf_event_open(0x0, r2, 0x8, 0xffffffffffffffff, 0xb) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x183) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) clone3(&(0x7f0000002340)={0x28000, 0x0, &(0x7f00000000c0), &(0x7f0000000140), {0x28}, &(0x7f0000000180)=""/252, 0xfc, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=[r2, 0xffffffffffffffff], 0x2, {r4}}, 0x58) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x10, r1, 0x729d2000) acct(&(0x7f0000000040)='./file0\x00') unshare(0x48020200) 02:44:16 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}}], 0x300, 0x102, 0x0) 02:44:16 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x34, r0, 0x20, 0x70bd2c, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x9, 0x9}}}}, [@NL80211_ATTR_HE_OBSS_PD={0xc, 0x117, 0x0, 0x1, [@NL80211_HE_OBSS_PD_ATTR_MIN_OFFSET={0x5, 0x1, 0xc}]}]}, 0x34}, 0x1, 0x0, 0x0, 0x8010}, 0x20004804) sendmsg$NL80211_CMD_ABORT_SCAN(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="20000000eb03afb1162e478a7b6318d91070c56fe37b7dbe1abc6561667365328381a759b4d2f640a5af5fb0982734d9f0d7adfa38", @ANYRES16=r0, @ANYBLOB="20002abd7000fcdbdf25720000000c009900010000004a000000"], 0x20}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000000) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f0000000940)=""/102400, 0x19000, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) 02:44:16 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0xa000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:44:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x2000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:44:16 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:44:16 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 32) [ 2146.993610] FAULT_INJECTION: forcing a failure. [ 2146.993610] name failslab, interval 1, probability 0, space 0, times 0 [ 2146.996011] CPU: 1 PID: 25860 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2146.997441] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2146.999168] Call Trace: [ 2146.999714] dump_stack+0x107/0x167 [ 2147.000476] should_fail.cold+0x5/0xa [ 2147.001268] ? create_object.isra.0+0x3a/0xa20 [ 2147.002217] should_failslab+0x5/0x20 [ 2147.003002] kmem_cache_alloc+0x5b/0x310 [ 2147.003840] create_object.isra.0+0x3a/0xa20 [ 2147.004742] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2147.005787] __kmalloc_track_caller+0x177/0x370 [ 2147.006750] ? parse_opts.part.0+0x8e/0x340 [ 2147.007642] kstrdup+0x36/0x70 [ 2147.008297] parse_opts.part.0+0x8e/0x340 [ 2147.009140] ? lock_acquire+0x197/0x470 [ 2147.009965] ? p9_fd_show_options+0x1c0/0x1c0 [ 2147.010878] ? __delete_object+0xb3/0x100 [ 2147.011718] ? lock_downgrade+0x6d0/0x6d0 [ 2147.012567] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2147.013633] p9_fd_create_tcp+0xbb/0x4f0 [ 2147.014464] ? p9_fd_create_unix+0x2f0/0x2f0 [ 2147.015355] ? __kasan_slab_free+0x122/0x160 [ 2147.016248] ? __startup_64+0x4/0x3b0 [ 2147.017025] ? p9_client_create+0x798/0x11c0 [ 2147.017942] ? kfree+0xd7/0x340 [ 2147.017961] ? do_raw_spin_unlock+0x4f/0x220 [ 2147.017988] p9_client_create+0x7ff/0x11c0 [ 2147.020267] ? p9_client_flush+0x430/0x430 [ 2147.021129] ? trace_hardirqs_on+0x5b/0x180 [ 2147.022016] ? lockdep_init_map_type+0x2c7/0x780 [ 2147.022983] ? __raw_spin_lock_init+0x36/0x110 [ 2147.023917] v9fs_session_init+0x1dd/0x1680 [ 2147.024795] ? lock_release+0x680/0x680 [ 2147.025611] ? kmem_cache_alloc_trace+0x151/0x320 [ 2147.026593] ? v9fs_show_options+0x690/0x690 [ 2147.027493] ? trace_hardirqs_on+0x5b/0x180 [ 2147.028366] ? kasan_unpoison_shadow+0x33/0x50 [ 2147.029287] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2147.030331] v9fs_mount+0x79/0x8f0 [ 2147.031052] ? v9fs_write_inode+0x60/0x60 [ 2147.031890] legacy_get_tree+0x105/0x220 [ 2147.032707] vfs_get_tree+0x8e/0x300 [ 2147.033459] path_mount+0x13be/0x20b0 [ 2147.034238] ? strncpy_from_user+0x9e/0x470 [ 2147.035105] ? finish_automount+0xa90/0xa90 [ 2147.035974] ? getname_flags.part.0+0x1dd/0x4f0 [ 2147.036912] ? _copy_from_user+0xfb/0x1b0 [ 2147.037756] __x64_sys_mount+0x282/0x300 [ 2147.038582] ? copy_mnt_ns+0xa00/0xa00 [ 2147.039367] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2147.040420] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2147.041466] do_syscall_64+0x33/0x40 [ 2147.042231] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2147.043260] RIP: 0033:0x7f7e97cd8b19 [ 2147.044008] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2147.047859] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2147.049643] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2147.051329] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2147.053003] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2147.054686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2147.056359] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 02:44:16 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "8fa26d6492245ab2c4b2804da276d13b80d6eab731469ef9bd0bd6682f9e0f183009df520ebabe821c9b00d346ccc20828be94fe69407a15053824a6258f96486c0bb31ccac6220be6e4d98329e1bc353ffbde84b1a7b5ead8d77596f4037616d5800509dec7554bdb41197e466643fbcba5f2b0809e0a36800cf0c8c10bff5e61e7ccfb75b4a266a9d1310c0fef7649df2905ffa29534d9db1759a2d718d137309c601822cb64a19452b20388f852c4a21013a11c6f094964fc119a918a11dd68ee0c756635919af6fc1f2ba2e26d1f57a88d98226a2443498c8178b3ccb82cae834c01282312063cbe896bfdb6e96a24c116f81389f50032173a92fb17d1", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) [ 2147.068474] 9pnet: p9_fd_create_tcp (25860): problem connecting socket to 127.0.0.1 02:44:16 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000}}], 0x300, 0x102, 0x0) [ 2147.103088] 9pnet: Insufficient options for proto=fd 02:44:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x3000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:44:16 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:44:16 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x48000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:44:16 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 33) 02:44:16 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x8000000000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) [ 2147.345793] FAULT_INJECTION: forcing a failure. [ 2147.345793] name failslab, interval 1, probability 0, space 0, times 0 [ 2147.347499] CPU: 0 PID: 25993 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2147.348579] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2147.349888] Call Trace: [ 2147.350305] dump_stack+0x107/0x167 [ 2147.350873] should_fail.cold+0x5/0xa [ 2147.351472] should_failslab+0x5/0x20 [ 2147.352057] __kmalloc_track_caller+0x79/0x370 [ 2147.352762] ? parse_opts.part.0+0x8e/0x340 [ 2147.353437] kstrdup+0x36/0x70 [ 2147.353949] parse_opts.part.0+0x8e/0x340 [ 2147.354589] ? p9_fd_show_options+0x1c0/0x1c0 [ 2147.355184] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2147.355902] ? trace_hardirqs_on+0x5b/0x180 [ 2147.356621] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 2147.357391] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2147.358217] p9_fd_create_tcp+0xbb/0x4f0 [ 2147.358842] ? p9_fd_create_unix+0x2f0/0x2f0 [ 2147.359519] ? __kasan_slab_free+0x122/0x160 [ 2147.360193] ? __startup_64+0x4/0x3b0 [ 2147.360782] ? p9_client_create+0x798/0x11c0 [ 2147.361456] ? kfree+0xd7/0x340 [ 2147.361979] ? do_raw_spin_unlock+0x4f/0x220 [ 2147.362663] p9_client_create+0x7ff/0x11c0 [ 2147.363324] ? p9_client_flush+0x430/0x430 [ 2147.363974] ? trace_hardirqs_on+0x5b/0x180 [ 2147.364534] ? lockdep_init_map_type+0x2c7/0x780 [ 2147.365129] ? __raw_spin_lock_init+0x36/0x110 [ 2147.365682] v9fs_session_init+0x1dd/0x1680 [ 2147.366267] ? lock_release+0x680/0x680 [ 2147.366790] ? kmem_cache_alloc_trace+0x151/0x320 [ 2147.367422] ? v9fs_show_options+0x690/0x690 [ 2147.368016] ? trace_hardirqs_on+0x5b/0x180 [ 2147.368578] ? kasan_unpoison_shadow+0x33/0x50 [ 2147.369164] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2147.369832] v9fs_mount+0x79/0x8f0 [ 2147.370300] ? v9fs_write_inode+0x60/0x60 [ 2147.370845] legacy_get_tree+0x105/0x220 [ 2147.371365] vfs_get_tree+0x8e/0x300 [ 2147.371839] path_mount+0x13be/0x20b0 [ 2147.372340] ? strncpy_from_user+0x9e/0x470 [ 2147.372924] ? finish_automount+0xa90/0xa90 [ 2147.373506] ? getname_flags.part.0+0x1dd/0x4f0 [ 2147.374116] ? _copy_from_user+0xfb/0x1b0 [ 2147.374686] __x64_sys_mount+0x282/0x300 [ 2147.375229] ? copy_mnt_ns+0xa00/0xa00 [ 2147.375751] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2147.376458] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2147.377151] do_syscall_64+0x33/0x40 [ 2147.377645] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2147.378349] RIP: 0033:0x7f7e97cd8b19 [ 2147.378850] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2147.381302] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2147.382325] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2147.383279] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2147.384222] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2147.385098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2147.386030] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 02:44:16 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "8fa26d6492245ab2c4b2804da276d13b80d6eab731469ef9bd0bd6682f9e0f183009df520ebabe821c9b00d346ccc20828be94fe69407a15053824a6258f96486c0bb31ccac6220be6e4d98329e1bc353ffbde84b1a7b5ead8d77596f4037616d5800509dec7554bdb41197e466643fbcba5f2b0809e0a36800cf0c8c10bff5e61e7ccfb75b4a266a9d1310c0fef7649df2905ffa29534d9db1759a2d718d137309c601822cb64a19452b20388f852c4a21013a11c6f094964fc119a918a11dd68ee0c756635919af6fc1f2ba2e26d1f57a88d98226a2443498c8178b3ccb82cae834c01282312063cbe896bfdb6e96a24c116f81389f50032173a92fb17d1", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:44:16 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3665c4}}], 0x300, 0x102, 0x0) 02:44:16 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x0) write$tcp_mem(r1, &(0x7f00000000c0)={0x3, 0x20, 0x1, 0x20, 0x8000}, 0x48) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) openat$cgroup_netprio_ifpriomap(r2, &(0x7f0000000180), 0x2, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xee00, r3, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000140), 0x1410, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, '}\xf5&,-\\%[,.'}}, {@nodevmap}, {@loose}], [{@uid_eq={'uid', 0x3d, r3}}, {@func={'func', 0x3d, 'BPRM_CHECK'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@smackfshat={'smackfshat', 0x3d, 'msize'}}, {@fowner_gt}]}}) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) [ 2147.698763] Process accounting resumed [ 2147.749787] Process accounting resumed [ 2147.778852] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2147.779473] print_req_error: 22 callbacks suppressed [ 2147.779484] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2147.781252] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2147.781873] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2147.783046] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2147.783624] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2147.784802] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2147.785380] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2147.786553] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2147.787149] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2147.788334] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2147.788930] blk_update_request: I/O error, dev sr0, sector 2096901 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2147.790149] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2147.790762] blk_update_request: I/O error, dev sr0, sector 2096902 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2147.791956] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2147.793136] buffer_io_error: 6 callbacks suppressed [ 2147.793143] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 2147.794569] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2147.795751] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 2147.796592] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2147.797769] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 2147.798612] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 2147.799473] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 2147.800332] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 2147.801195] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 2147.803937] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2147.804560] Buffer I/O error on dev loop4, logical block 2096903, async page read 02:44:31 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x4000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:44:31 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x1, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x4c000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000001540)) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') ioctl$FIONREAD(r3, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000140)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r4, 0x6611) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:44:31 executing program 1: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, 0xffffffffffffffff, 0x6, 0x7, 0xffff, 0x8}) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000000)={r1, 0x200, 0x8, 0x7fffffff}) fsconfig$FSCONFIG_CMD_RECONFIGURE(r2, 0x7, 0x0, 0x0, 0x0) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d9ba7bb9ffda1ea97848f50f2c9ac0480000000000000004d1f372176a193eb61d0d13bc2f44d69de9144026f18975361163298af4c9d46c886c7e6142800e1852b2b18528e50211b6a4c4a19c01d99f24d0458a3c47931732fe2660280eeaa60befddcad043f8253196511c3ce8e5cb35753f6", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',msize=0x0000000000001cd8,\x00']) 02:44:31 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 34) 02:44:31 executing program 2: socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x4, 0x3, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c0000001a00010100000000000000000400003b"], 0x1c}}, 0x0) r1 = socket(0x0, 0x3, 0x56a) r2 = syz_open_dev$vcsn(&(0x7f0000000180), 0x100, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x29, 0x0, 0x7, 0x6, 0x0, 0x5576, 0x8310, 0x6, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000080)}, 0x10011, 0x2, 0x5, 0x5, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x0, 0x9}, 0x0, 0x3, r2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x110, 0x3ed, 0x200, 0x70bd2c, 0x25dfdbfb, "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", ["", "", ""]}, 0x110}, 0x1, 0x0, 0x0, 0x8000}, 0x40) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r1, 0x8982, &(0x7f0000000040)={0x2, 'veth1_to_batadv\x00', {0x80000000}, 0x55}) 02:44:31 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}}], 0x300, 0x102, 0x0) 02:44:31 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f00000015c0)='/proc/consoles\x00', 0x0, 0x0) pread64(r0, &(0x7f0000000040)=""/4126, 0x101e, 0x10000000000000) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001080)='/proc/vmallocinfo\x00', 0x0, 0x0) pread64(r1, &(0x7f0000000040)=""/4126, 0x101e, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') readv(r2, &(0x7f0000001600)=[{&(0x7f00000004c0)=""/4096, 0x1000}], 0x1) ioctl$FIONREAD(0xffffffffffffffff, 0x6801, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x100000, &(0x7f0000000440)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) mount$bind(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000340)='./file0/../file0\x00', 0x0, 0x17810, 0x0) umount2(&(0x7f0000000200)='./file0/../file0\x00', 0x0) 02:44:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, 0x0, 0x4000) ftruncate(r0, 0x1000003) dup2(r0, r1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x2e142, 0x0) syz_open_dev$vcsa(&(0x7f0000000140), 0x80000001, 0x212801) r3 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0xffffffff}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) ioctl$PERF_EVENT_IOC_QUERY_BPF(0xffffffffffffffff, 0xc008240a, &(0x7f0000000040)=ANY=[@ANYBLOB="0500000000f20000e1176261818f7adb698544c88b34dcb70b0fa7439771e000002a6c75c2000000"]) readv(0xffffffffffffffff, &(0x7f0000000700)=[{&(0x7f0000000340)=""/90, 0x5a}, {&(0x7f00000003c0)=""/154, 0x9a}, {&(0x7f0000000480)=""/193, 0xc1}, {&(0x7f0000000580)=""/101, 0x65}, {&(0x7f0000000100)=""/47, 0x2f}, {&(0x7f0000000600)=""/245, 0xf5}], 0x6) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r3, 0x4, &(0x7f0000000140)=r4, 0x1) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r4, @out_args}, './file1\x00'}) syz_open_procfs(0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r1, 0xc0709411, &(0x7f0000000180)=ANY=[@ANYRES64=0x0, @ANYBLOB="000000000000000007000000000000000800000000000000000000000000000000000000000000000000000000000000190c000000800000000000000000000000000043820000000000000000000000010000000000000006000000000000001800"/128]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x44a02, 0x0, 0x0, 0x7, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(r1, &(0x7f0000000300)={'#! ', './file0', [], 0xd}, 0xb) [ 2162.344628] FAULT_INJECTION: forcing a failure. [ 2162.344628] name failslab, interval 1, probability 0, space 0, times 0 [ 2162.346986] CPU: 1 PID: 26119 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2162.347812] 9pnet: Insufficient options for proto=fd [ 2162.348380] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2162.348390] Call Trace: [ 2162.348428] dump_stack+0x107/0x167 [ 2162.352363] should_fail.cold+0x5/0xa [ 2162.353136] ? create_object.isra.0+0x3a/0xa20 [ 2162.354074] should_failslab+0x5/0x20 [ 2162.354854] kmem_cache_alloc+0x5b/0x310 [ 2162.355672] create_object.isra.0+0x3a/0xa20 [ 2162.356551] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2162.357602] __kmalloc_track_caller+0x177/0x370 [ 2162.358539] ? match_number+0xaf/0x1d0 [ 2162.359329] kmemdup_nul+0x2d/0xa0 [ 2162.360062] match_number+0xaf/0x1d0 [ 2162.360808] ? match_u64+0x190/0x190 [ 2162.361564] ? __kmalloc_track_caller+0x2c6/0x370 [ 2162.362553] ? memcpy+0x39/0x60 [ 2162.363239] parse_opts.part.0+0x1f3/0x340 [ 2162.364101] ? p9_fd_show_options+0x1c0/0x1c0 [ 2162.365028] ? lock_downgrade+0x6d0/0x6d0 [ 2162.365875] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2162.366935] p9_fd_create_tcp+0xbb/0x4f0 [ 2162.367765] ? p9_fd_create_unix+0x2f0/0x2f0 [ 2162.367785] ? __kasan_slab_free+0x122/0x160 [ 2162.367805] ? __startup_64+0x4/0x3b0 [ 2162.367827] ? p9_client_create+0x798/0x11c0 [ 2162.367845] ? kfree+0xd7/0x340 [ 2162.367864] ? do_raw_spin_unlock+0x4f/0x220 [ 2162.367890] p9_client_create+0x7ff/0x11c0 [ 2162.367918] ? p9_client_flush+0x430/0x430 [ 2162.367939] ? trace_hardirqs_on+0x5b/0x180 [ 2162.367959] ? lockdep_init_map_type+0x2c7/0x780 [ 2162.367986] ? __raw_spin_lock_init+0x36/0x110 [ 2162.368011] v9fs_session_init+0x1dd/0x1680 [ 2162.368030] ? lock_release+0x680/0x680 02:44:31 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() setpriority(0x0, r0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="3400000010000100060000000000000000000000050000000018000015000080487fec864b245e0f3f9be149f83265549b00000004a036dd76f8628be485a1d06133e6a1f11d8b53e8491f46d3c5c6cae007b4a5a48db2bf933e9e1c329f8146159048347f189fd526736470ee1d9fef14fafa9e99121e9643243e61e1fd6b6afa133694ab1ce221a7ba7b929859412b16ee39003f92ab348168f3f14e18684ecaa3ada0a0cf348629ea8d96d816047ede931781c5694c35f620d009723809c02d958d7ea2148ef099a53a4170c9381dfdce18d526b82e590a05df1baca5dcf8bf8d982412a1b024bc2cbb3aaffda6a8a2eb1bf7bb8cc1660d4292be9cb782133934f69640075ef135"], 0x34}}, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000140)) setsockopt$netlink_NETLINK_BROADCAST_ERROR(0xffffffffffffffff, 0x10e, 0x4, &(0x7f0000000000), 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) r2 = socket$inet(0x2, 0x1, 0x0) getsockopt$sock_buf(r2, 0x1, 0x19, 0x0, &(0x7f0000001380)) readv(r2, &(0x7f0000000600), 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xc00) r3 = syz_genetlink_get_family_id$ipvs(0x0, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000001340)=ANY=[@ANYBLOB, @ANYRES32]) sendmsg$IPVS_CMD_GET_SERVICE(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f00000005c0), 0xc, &(0x7f0000000240)={&(0x7f0000000700)=ANY=[@ANYRESOCT, @ANYRES16=r3, @ANYBLOB="010029bd7000fcdbdf25040000004404004e24000014000300000000000000000000000000000000000c0007003000000004000000080005000400000008000b0e73697000060002005a00000038000280060002004e2100000800090000000000080006f54f00000014000100e000000200000000000000000000000008000900090000001c00038008000300000000000800010001000000080001000200000008000400200000004c000280080006000300000005000d00010000000800050005001c283171ff89dec201000800070086000000080009007c000000080004000900000006000f0002000078e0"], 0x100}, 0x1, 0x0, 0x0, 0x4804}, 0x44) [ 2162.368059] ? kmem_cache_alloc_trace+0x151/0x320 [ 2162.368078] ? v9fs_show_options+0x690/0x690 [ 2162.368107] ? trace_hardirqs_on+0x5b/0x180 [ 2162.368131] ? kasan_unpoison_shadow+0x33/0x50 [ 2162.368152] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2162.368178] v9fs_mount+0x79/0x8f0 02:44:31 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000}}], 0x300, 0x102, 0x0) [ 2162.368202] ? v9fs_write_inode+0x60/0x60 [ 2162.368222] legacy_get_tree+0x105/0x220 [ 2162.368243] vfs_get_tree+0x8e/0x300 [ 2162.368265] path_mount+0x13be/0x20b0 [ 2162.368289] ? strncpy_from_user+0x9e/0x470 02:44:31 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_IOC_READY(0xffffffffffffffff, 0x9360, 0xfffffffffffffffd) clone3(&(0x7f00000004c0)={0x200000000, 0x0, &(0x7f0000000080), 0x0, {}, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000480)}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@msize={'msize', 0x3d, 0x1cd8}}]}}) [ 2162.368312] ? finish_automount+0xa90/0xa90 [ 2162.368332] ? getname_flags.part.0+0x1dd/0x4f0 [ 2162.368349] ? _copy_from_user+0xfb/0x1b0 [ 2162.368381] __x64_sys_mount+0x282/0x300 02:44:31 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 35) [ 2162.368403] ? copy_mnt_ns+0xa00/0xa00 [ 2162.368427] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2162.368445] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2162.368470] do_syscall_64+0x33/0x40 [ 2162.368492] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2162.368505] RIP: 0033:0x7f7e97cd8b19 [ 2162.368526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2162.368536] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2162.368558] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2162.368569] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2162.368581] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2162.368592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2162.368604] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 2162.444542] 9pnet: p9_fd_create_tcp (26119): problem connecting socket to 127.0.0.1 [ 2162.560325] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. [ 2162.607976] 9pnet: Insufficient options for proto=fd [ 2162.619346] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.4'. 02:44:31 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000000), &(0x7f0000000080)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=tcp,', {}, 0x2c, {[{@privport}]}}) (fail_nth: 36) [ 2162.622751] FAULT_INJECTION: forcing a failure. [ 2162.622751] name failslab, interval 1, probability 0, space 0, times 0 02:44:31 executing program 0: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) gettid() r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x2, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x96, &(0x7f0000000140)={@random="67bad7e90343", @random="31f52699464f", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x88, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @broadcast}, {0x0, 0x4e20, 0x74, 0x0, @wg=@data={0x4, 0x2, 0x6, "2df70a7da8357c2bfaa461659bef2b316a574f9465b53688a355c624fdbd1d6fa5700c928a8d3b605689eab3c120fe753b9ebfb1947f86720b274bb35f628ab52ee46046e0b265b3d37260cffe50ebc817940e557ad221cefed6e3a0"}}}}}}, 0x0) recvmmsg(r0, &(0x7f00000068c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6c000000}}], 0x300, 0x102, 0x0) [ 2162.622773] CPU: 0 PID: 26256 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2162.622784] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 02:44:31 executing program 4: request_key(0x0, 0x0, 0x0, 0x0) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write$rfkill(r0, &(0x7f00000000c0)={0x0, 0x0, 0x3, 0x1}, 0x8) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_READY(r2, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, r1, {0x7}}, './file0\x00'}) [ 2162.622790] Call Trace: [ 2162.622819] dump_stack+0x107/0x167 [ 2162.622846] should_fail.cold+0x5/0xa [ 2162.622867] ? sock_alloc_inode+0x18/0x1c0 [ 2162.622891] should_failslab+0x5/0x20 [ 2162.622910] kmem_cache_alloc+0x5b/0x310 [ 2162.622930] ? selinux_ipv6_output+0x180/0x180 [ 2162.622950] ? sock_free_inode+0x20/0x20 [ 2162.622968] sock_alloc_inode+0x18/0x1c0 [ 2162.622983] ? sock_free_inode+0x20/0x20 [ 2162.622999] alloc_inode+0x63/0x240 [ 2162.623018] new_inode_pseudo+0x14/0xe0 [ 2162.623036] sock_alloc+0x3c/0x270 [ 2162.623055] __sock_create+0xbd/0x7f0 [ 2162.623074] ? in_aton+0x76/0x120 [ 2162.623099] p9_fd_create_tcp+0x2ab/0x4f0 [ 2162.623120] ? p9_fd_create_unix+0x2f0/0x2f0 [ 2162.623146] ? perf_callchain_user+0x460/0xca0 [ 2162.623167] ? p9_client_create+0x798/0x11c0 [ 2162.623186] ? kfree+0xd7/0x340 [ 2162.623206] ? do_raw_spin_unlock+0x4f/0x220 [ 2162.623232] p9_client_create+0x7ff/0x11c0 [ 2162.623261] ? p9_client_flush+0x430/0x430 [ 2162.623282] ? trace_hardirqs_on+0x5b/0x180 [ 2162.623309] ? lockdep_init_map_type+0x2c7/0x780 [ 2162.623335] ? __raw_spin_lock_init+0x36/0x110 [ 2162.623361] v9fs_session_init+0x1dd/0x1680 [ 2162.623381] ? lock_release+0x680/0x680 [ 2162.623409] ? kmem_cache_alloc_trace+0x151/0x320 [ 2162.623428] ? v9fs_show_options+0x690/0x690 [ 2162.623457] ? trace_hardirqs_on+0x5b/0x180 [ 2162.623481] ? kasan_unpoison_shadow+0x33/0x50 [ 2162.623502] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2162.623529] v9fs_mount+0x79/0x8f0 [ 2162.623552] ? v9fs_write_inode+0x60/0x60 [ 2162.623572] legacy_get_tree+0x105/0x220 [ 2162.623594] vfs_get_tree+0x8e/0x300 [ 2162.623615] path_mount+0x13be/0x20b0 [ 2162.623641] ? strncpy_from_user+0x9e/0x470 [ 2162.623663] ? finish_automount+0xa90/0xa90 [ 2162.623682] ? getname_flags.part.0+0x1dd/0x4f0 [ 2162.623702] ? _copy_from_user+0xfb/0x1b0 [ 2162.623733] __x64_sys_mount+0x282/0x300 [ 2162.623755] ? copy_mnt_ns+0xa00/0xa00 [ 2162.623779] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2162.623798] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2162.623823] do_syscall_64+0x33/0x40 [ 2162.623845] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2162.623859] RIP: 0033:0x7f7e97cd8b19 [ 2162.623879] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2162.623890] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2162.623911] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2162.623922] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2162.623934] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2162.623945] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2162.623957] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 2162.624050] socket: no more sockets [ 2162.624062] 9pnet: p9_fd_create_tcp (26256): problem creating socket [ 2162.743259] FAULT_INJECTION: forcing a failure. [ 2162.743259] name failslab, interval 1, probability 0, space 0, times 0 [ 2162.743281] CPU: 0 PID: 26356 Comm: syz-executor.3 Not tainted 5.10.199 #1 [ 2162.743292] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2162.743298] Call Trace: [ 2162.743320] dump_stack+0x107/0x167 [ 2162.743344] should_fail.cold+0x5/0xa [ 2162.743366] ? create_object.isra.0+0x3a/0xa20 [ 2162.743389] should_failslab+0x5/0x20 [ 2162.743408] kmem_cache_alloc+0x5b/0x310 [ 2162.743438] create_object.isra.0+0x3a/0xa20 [ 2162.743458] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2162.743482] kmem_cache_alloc+0x159/0x310 [ 2162.743503] ? sock_free_inode+0x20/0x20 [ 2162.743522] sock_alloc_inode+0x18/0x1c0 [ 2162.743537] ? sock_free_inode+0x20/0x20 [ 2162.743551] alloc_inode+0x63/0x240 [ 2162.743570] new_inode_pseudo+0x14/0xe0 [ 2162.743588] sock_alloc+0x3c/0x270 [ 2162.743607] __sock_create+0xbd/0x7f0 [ 2162.743625] ? in_aton+0x76/0x120 [ 2162.743650] p9_fd_create_tcp+0x2ab/0x4f0 [ 2162.743670] ? p9_fd_create_unix+0x2f0/0x2f0 [ 2162.743695] ? perf_callchain_user+0x460/0xca0 [ 2162.743722] ? p9_client_create+0x798/0x11c0 [ 2162.743740] ? kfree+0xd7/0x340 [ 2162.743759] ? do_raw_spin_unlock+0x4f/0x220 [ 2162.743785] p9_client_create+0x7ff/0x11c0 [ 2162.743814] ? p9_client_flush+0x430/0x430 [ 2162.743834] ? trace_hardirqs_on+0x5b/0x180 [ 2162.743855] ? lockdep_init_map_type+0x2c7/0x780 [ 2162.743881] ? __raw_spin_lock_init+0x36/0x110 [ 2162.743906] v9fs_session_init+0x1dd/0x1680 [ 2162.743925] ? lock_release+0x680/0x680 [ 2162.743953] ? kmem_cache_alloc_trace+0x151/0x320 [ 2162.743971] ? v9fs_show_options+0x690/0x690 [ 2162.743999] ? trace_hardirqs_on+0x5b/0x180 [ 2162.744023] ? kasan_unpoison_shadow+0x33/0x50 [ 2162.744044] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2162.744069] v9fs_mount+0x79/0x8f0 [ 2162.744092] ? v9fs_write_inode+0x60/0x60 [ 2162.744112] legacy_get_tree+0x105/0x220 [ 2162.744132] vfs_get_tree+0x8e/0x300 [ 2162.744154] path_mount+0x13be/0x20b0 [ 2162.744178] ? strncpy_from_user+0x9e/0x470 [ 2162.744200] ? finish_automount+0xa90/0xa90 [ 2162.744219] ? getname_flags.part.0+0x1dd/0x4f0 [ 2162.744239] ? _copy_from_user+0xfb/0x1b0 [ 2162.744270] __x64_sys_mount+0x282/0x300 [ 2162.744291] ? copy_mnt_ns+0xa00/0xa00 [ 2162.744315] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2162.744334] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2162.744359] do_syscall_64+0x33/0x40 [ 2162.744382] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2162.744394] RIP: 0033:0x7f7e97cd8b19 [ 2162.744415] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2162.744426] RSP: 002b:00007f7e9524e188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2162.744447] RAX: ffffffffffffffda RBX: 00007f7e97debf60 RCX: 00007f7e97cd8b19 [ 2162.744458] RDX: 00000000200000c0 RSI: 0000000020000080 RDI: 0000000020000000 [ 2162.744470] RBP: 00007f7e9524e1d0 R08: 0000000020000100 R09: 0000000000000000 [ 2162.744481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2162.744493] R13: 00007ffc38e6e52f R14: 00007f7e9524e300 R15: 0000000000022000 [ 2162.747124] 9pnet: p9_fd_create_tcp (26356): problem connecting socket to 127.0.0.1 [ 2162.789279] [ 2162.789289] ====================================================== [ 2162.789295] WARNING: possible circular locking dependency detected [ 2162.789305] 5.10.199 #1 Not tainted [ 2162.789311] ------------------------------------------------------ [ 2162.789321] syz-executor.4/26361 is trying to acquire lock: [ 2162.789330] ffff88801b8c8b78 ((work_completion)(&hdev->bg_scan_update)){+.+.}-{0:0}, at: __flush_work+0xdd/0xa90 [ 2162.789381] [ 2162.789381] but task is already holding lock: [ 2162.789388] ffffffff85619468 (rfkill_global_mutex){+.+.}-{3:3}, at: rfkill_fop_write+0xff/0x4b0 [ 2162.789425] [ 2162.789425] which lock already depends on the new lock. [ 2162.789425] [ 2162.789431] [ 2162.789431] the existing dependency chain (in reverse order) is: [ 2162.789436] [ 2162.789436] -> #4 (rfkill_global_mutex){+.+.}-{3:3}: [ 2162.789474] __mutex_lock+0x13d/0x10b0 [ 2162.789488] rfkill_register+0x36/0xa10 [ 2162.789503] hci_register_dev+0x42e/0xc00 [ 2162.789521] __vhci_create_device+0x2c8/0x5c0 [ 2162.789538] vhci_open_timeout+0x38/0x50 [ 2162.789552] process_one_work+0x9a9/0x14b0 [ 2162.789566] worker_thread+0x61d/0x1310 [ 2162.789581] kthread+0x38f/0x470 [ 2162.789596] ret_from_fork+0x22/0x30 [ 2162.789601] [ 2162.789601] -> #3 (&data->open_mutex){+.+.}-{3:3}: [ 2162.789635] __mutex_lock+0x13d/0x10b0 [ 2162.789652] vhci_send_frame+0x63/0xa0 [ 2162.789669] hci_send_frame+0x1b9/0x320 [ 2162.789681] hci_tx_work+0x10af/0x1660 [ 2162.789695] process_one_work+0x9a9/0x14b0 [ 2162.789708] worker_thread+0x61d/0x1310 [ 2162.789723] kthread+0x38f/0x470 [ 2162.789736] ret_from_fork+0x22/0x30 [ 2162.789741] [ 2162.789741] -> #2 ((work_completion)(&hdev->tx_work)){+.+.}-{0:0}: [ 2162.789775] __flush_work+0x105/0xa90 [ 2162.789788] hci_dev_do_close+0x131/0x1240 [ 2162.789802] hci_unregister_dev+0x149/0x430 [ 2162.789817] vhci_release+0x70/0xf0 [ 2162.789834] __fput+0x285/0x980 [ 2162.789849] task_work_run+0xe2/0x1a0 [ 2162.789862] do_exit+0xb6f/0x2600 [ 2162.789874] do_group_exit+0x125/0x310 [ 2162.789887] get_signal+0x4bc/0x22f0 [ 2162.789904] arch_do_signal_or_restart+0x2b7/0x1990 [ 2162.789922] exit_to_user_mode_prepare+0x10f/0x190 [ 2162.789938] syscall_exit_to_user_mode+0x38/0x1e0 [ 2162.789956] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2162.789961] [ 2162.789961] -> #1 (&hdev->req_lock){+.+.}-{3:3}: [ 2162.789995] __mutex_lock+0x13d/0x10b0 [ 2162.790011] bg_scan_update+0x82/0x500 [ 2162.790052] process_one_work+0x9a9/0x14b0 [ 2162.790066] worker_thread+0x61d/0x1310 [ 2162.790081] kthread+0x38f/0x470 [ 2162.790094] ret_from_fork+0x22/0x30 [ 2162.790099] [ 2162.790099] -> #0 ((work_completion)(&hdev->bg_scan_update)){+.+.}-{0:0}: [ 2162.790137] __lock_acquire+0x29e7/0x5b00 [ 2162.790153] lock_acquire+0x197/0x470 [ 2162.790166] __flush_work+0x105/0xa90 [ 2162.790181] __cancel_work_timer+0x368/0x4c0 [ 2162.790198] hci_request_cancel_all+0x73/0x230 [ 2162.790211] hci_dev_do_close+0xd9/0x1240 [ 2162.790225] hci_rfkill_set_block+0x166/0x1a0 [ 2162.790239] rfkill_set_block+0x1fd/0x540 [ 2162.790252] rfkill_fop_write+0x253/0x4b0 [ 2162.790267] vfs_write+0x29a/0xa70 [ 2162.790282] ksys_write+0x1f6/0x260 [ 2162.790299] do_syscall_64+0x33/0x40 [ 2162.790317] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2162.790322] [ 2162.790322] other info that might help us debug this: [ 2162.790322] [ 2162.790327] Chain exists of: [ 2162.790327] (work_completion)(&hdev->bg_scan_update) --> &data->open_mutex --> rfkill_global_mutex [ 2162.790327] [ 2162.790359] Possible unsafe locking scenario: [ 2162.790359] [ 2162.790363] CPU0 CPU1 [ 2162.790369] ---- ---- [ 2162.790373] lock(rfkill_global_mutex); [ 2162.790386] lock(&data->open_mutex); [ 2162.790399] lock(rfkill_global_mutex); [ 2162.790411] lock((work_completion)(&hdev->bg_scan_update)); [ 2162.790425] [ 2162.790425] *** DEADLOCK *** [ 2162.790425] [ 2162.790435] 1 lock held by syz-executor.4/26361: [ 2162.790440] #0: ffffffff85619468 (rfkill_global_mutex){+.+.}-{3:3}, at: rfkill_fop_write+0xff/0x4b0 [ 2162.790479] [ 2162.790479] stack backtrace: [ 2162.790495] CPU: 1 PID: 26361 Comm: syz-executor.4 Not tainted 5.10.199 #1 [ 2162.790505] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2162.790510] Call Trace: [ 2162.790527] dump_stack+0x107/0x167 [ 2162.790547] check_noncircular+0x263/0x2e0 [ 2162.790564] ? register_lock_class+0xbb/0x17b0 [ 2162.790581] ? print_circular_bug+0x470/0x470 [ 2162.790604] ? find_first_zero_bit+0x94/0xb0 [ 2162.790623] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 2162.790643] __lock_acquire+0x29e7/0x5b00 [ 2162.790670] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2162.790686] ? SOFTIRQ_verbose+0x10/0x10 [ 2162.790703] ? lock_chain_count+0x20/0x20 [ 2162.790720] ? mark_lock+0xf5/0x2df0 [ 2162.790740] lock_acquire+0x197/0x470 [ 2162.790755] ? __flush_work+0xdd/0xa90 [ 2162.790774] ? lock_release+0x680/0x680 [ 2162.790789] ? __flush_work+0x78c/0xa90 [ 2162.790806] ? lock_downgrade+0x6d0/0x6d0 [ 2162.790828] __flush_work+0x105/0xa90 [ 2162.790843] ? __flush_work+0xdd/0xa90 [ 2162.790859] ? lock_chain_count+0x20/0x20 [ 2162.790877] ? queue_delayed_work_on+0xe0/0xe0 [ 2162.790892] ? mark_lock+0xf5/0x2df0 [ 2162.790910] ? mark_lock+0xf5/0x2df0 [ 2162.790928] ? lock_chain_count+0x20/0x20 [ 2162.790946] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 2162.790964] ? lock_chain_count+0x20/0x20 [ 2162.790980] ? lock_acquire+0x197/0x470 [ 2162.790995] ? rfkill_send_events+0x1e8/0x390 [ 2162.791015] ? mark_held_locks+0x9e/0xe0 [ 2162.791036] __cancel_work_timer+0x368/0x4c0 [ 2162.791052] ? try_to_grab_pending+0xe0/0xe0 [ 2162.791073] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2162.791088] ? cancel_delayed_work+0x24d/0x2b0 [ 2162.791102] ? trace_hardirqs_on+0x5b/0x180 [ 2162.791119] ? cancel_delayed_work+0x1b8/0x2b0 [ 2162.791136] ? cancel_delayed_work_sync+0x20/0x20 [ 2162.791157] hci_request_cancel_all+0x73/0x230 [ 2162.791172] hci_dev_do_close+0xd9/0x1240 [ 2162.791189] ? rfkill_set_block+0x18f/0x540 [ 2162.791204] ? hci_dev_open+0x350/0x350 [ 2162.791222] ? mark_held_locks+0x9e/0xe0 [ 2162.791241] hci_rfkill_set_block+0x166/0x1a0 [ 2162.791256] ? hci_power_off+0x20/0x20 [ 2162.791270] rfkill_set_block+0x1fd/0x540 [ 2162.791289] rfkill_fop_write+0x253/0x4b0 [ 2162.791305] ? rfkill_sync_work+0xa0/0xa0 [ 2162.791325] ? security_file_permission+0x24e/0x570 [ 2162.791345] ? rfkill_sync_work+0xa0/0xa0 [ 2162.791360] vfs_write+0x29a/0xa70 [ 2162.791380] ksys_write+0x1f6/0x260 [ 2162.791398] ? __ia32_sys_read+0xb0/0xb0 [ 2162.791418] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2162.791434] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2162.791454] do_syscall_64+0x33/0x40 [ 2162.791474] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2162.791486] RIP: 0033:0x7f92b183ab19 [ 2162.791507] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2162.791517] RSP: 002b:00007f92aedb0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 2162.791535] RAX: ffffffffffffffda RBX: 00007f92b194df60 RCX: 00007f92b183ab19 [ 2162.791546] RDX: 0000000000000008 RSI: 00000000200000c0 RDI: 0000000000000003 [ 2162.791556] RBP: 00007f92b1894f6d R08: 0000000000000000 R09: 0000000000000000 [ 2162.791567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 2162.791578] R13: 00007ffc9e27471f R14: 00007f92aedb0300 R15: 0000000000022000 [ 2162.795911] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2162.795942] print_req_error: 6 callbacks suppressed [ 2162.795961] blk_update_request: I/O error, dev sr0, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2162.796046] blk_update_request: I/O error, dev loop4, sector 2096896 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2162.796072] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 2162.796081] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2162.796115] blk_update_request: I/O error, dev sr0, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2162.796175] blk_update_request: I/O error, dev loop4, sector 2096897 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2162.796189] Buffer I/O error on dev loop4, logical block 2096897, async page read [ 2162.796233] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2162.796266] blk_update_request: I/O error, dev sr0, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2162.796326] blk_update_request: I/O error, dev loop4, sector 2096898 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2162.796340] Buffer I/O error on dev loop4, logical block 2096898, async page read [ 2162.796361] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2162.796395] blk_update_request: I/O error, dev sr0, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2162.796446] blk_update_request: I/O error, dev loop4, sector 2096899 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2162.796458] Buffer I/O error on dev loop4, logical block 2096899, async page read [ 2162.796492] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2162.796524] blk_update_request: I/O error, dev sr0, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2162.796580] blk_update_request: I/O error, dev loop4, sector 2096900 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 2162.796592] Buffer I/O error on dev loop4, logical block 2096900, async page read [ 2162.796624] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2162.796798] Buffer I/O error on dev loop4, logical block 2096901, async page read [ 2162.796821] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2162.796923] Buffer I/O error on dev loop4, logical block 2096902, async page read [ 2162.796933] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2162.796994] Buffer I/O error on dev loop4, logical block 2096903, async page read [ 2163.539842] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2163.541099] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2163.542307] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2163.543483] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2163.544695] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2163.545866] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2163.547057] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2163.548233] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 2163.550830] Buffer I/O error on dev loop4, logical block 2096896, async page read [ 2163.552400] Buffer I/O error on dev loop4, logical block 2096897, async page read VM DIAGNOSIS: 02:44:32 Registers: info registers vcpu 0 RAX=0000000000000038 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822ca1d1 RDI=ffffffff879e81e0 RBP=ffffffff879e81a0 RSP=ffff88804fc078d0 R8 =0000000000000001 R9 =0000000000000003 R10=0000000000000000 R11=0000000000000001 R12=0000000000000038 R13=0000000000000038 R14=ffffffff879e81a0 R15=dffffc0000000000 RIP=ffffffff822ca228 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f6ab43ac700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f5c3992d4b8 CR3=000000003718a000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=0000ff0000000000ff00000000000000 XMM01=000001000000000001ff000000000000 XMM02=7463656a6e695f31313230385f7a7973 XMM03=00007f6ab6f1d7c800007f6ab6f1d7c0 XMM04=ffffffffffffffffffffffff00000000 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000000 RBX=ffff88801779fde8 RCX=00000000000001fc RDX=1ffff110092e3916 RSI=ffff88801a602020 RDI=ffff888050ef2020 RBP=ffff88804e751800 RSP=ffff88801779fbe0 R8 =0000000000000000 R9 =ffffffff856725cf R10=0000000000000000 R11=0000000000000001 R12=ffff88804971b480 R13=000000000001a602 R14=000000000000605d R15=ffffea000143bc80 RIP=ffffffff82016ca7 RFL=00000286 [--S--P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0000 0000000000000000 00000000 00000000 DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f5b4ce258c0 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055ee744d84e0 CR3=000000004b2bc000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=ffffffffffffffffffffffff00000000 XMM01=0000303a372f6b636f6c622f7665642f XMM02=00ffff00000000000000000000000000 XMM03=0000000000ff0000000000ff000000ff XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=000055ee745113d0000055ee745113b0 XMM06=000055ee745166d00000000300000002 XMM07=00000000000000000000000000000000 XMM08=f00000303a372f6b636f6c622f766564 XMM09=00000000000000000000000000000000 XMM10=00000000200020000000000020000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000