0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, r0, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, r0, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, r0, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1, r0}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, 0xffffffffffffffff, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, r0, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r9, 0x0, 0x100000001) 17:27:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:27:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:27:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000202000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:27:42 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:27:42 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:27:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:27:42 executing program 0: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000040)={0x1c, 0x1, 0x1, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@CTA_ID={0x8, 0xc, 0x1, 0x0, 0x3}]}, 0x1c}}, 0x6044040) sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x94, 0x15, 0x100, 0x70bd27, 0x25dfdbfe, {0x3, 0x76}, [@INET_DIAG_REQ_BYTECODE={0x7d, 0x1, "605116dcc607b64e1824899a95a5a461c1da750ad802f61803a8d30f3509cdff77d6de4648a9ddd0ff5b2cafeb7e1c0d44837c5897e92ede2906eca1b2fff75c174c30970cc0ba7a77369ac5c0b7968475cd83d289f7d3e13497516c5a2d39efe995f3191608471465ac76cb43729e93b3624c90bc00843a6c"}]}, 0x94}}, 0x24000000) sendmsg$NBD_CMD_DISCONNECT(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x6c, 0x0, 0x402, 0x70bd26, 0x25dfdbfd, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x100}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SIZE_BYTES={0xc}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x923}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x102}]}, 0x6c}}, 0x24000014) 17:27:42 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:27:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000302000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:27:42 executing program 0: ftruncate(0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x115142, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x6}}, './file1\x00'}) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r4) openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) 17:27:42 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:27:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:27:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:27:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000402000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:27:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:06 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:06 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:06 executing program 2: ftruncate(0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) mq_notify(0xffffffffffffffff, 0x0) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r1, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, r0, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, r0, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, r0, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1, r0}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, 0xffffffffffffffff, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, r0, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r9, 0x0, 0x100000001) 17:28:06 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000502000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:28:06 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) r4 = dup(r3) mq_notify(r4, 0x0) r5 = openat$cgroup_netprio_ifpriomap(r1, &(0x7f0000000080), 0x2, 0x0) dup2(r4, r5) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) write$binfmt_elf64(r1, &(0x7f0000000580)=ANY=[@ANYRESOCT, @ANYRES32, @ANYBLOB="c96f19de8c5de4832662090e02f6010ca2ecf8c44efb47a796d74f9d53502a56d410c7492a47e039fa8aaf04d1de88c2529cd64bce7706b565449daaa5d23d207e471fbadde1435500d083c6edad3927d1775624a43e07689f7bbd821174b429d5342d41e33fc112d7333e764182076079a2acff4c925cb022"], 0xfdef) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x3, 0x3, 0x8000008000) 17:28:06 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) [ 1956.031405] 9pnet: Insufficient options for proto=fd 17:28:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000602000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:28:06 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:28:06 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:06 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:06 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000702000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:28:06 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 1956.240299] 9pnet: Insufficient options for proto=fd 17:28:06 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:06 executing program 0: prctl$PR_GET_NO_NEW_PRIVS(0x27) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x40000, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, 0x12, r1, 0x8000000) clock_gettime(0x0, &(0x7f0000000080)) r2 = pidfd_getfd(r1, r1, 0x0) ioctl$HDIO_GETGEO(r2, 0x301, &(0x7f00000000c0)) mq_open(&(0x7f0000000100)='\x81o\xc5\x82\xcb\xfd|w\t3\xc0\xb1\aW\xc1rK', 0x40, 0x102, &(0x7f0000000180)={0x8, 0x6, 0x0, 0xffff}) waitid$P_PIDFD(0x3, r1, &(0x7f00000001c0), 0x0, &(0x7f0000000240)) prctl$PR_GET_NO_NEW_PRIVS(0x27) getsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) openat$full(0xffffffffffffff9c, &(0x7f00000003c0), 0x2, 0x0) openat$cgroup(r1, &(0x7f00000017c0)='syz0\x00', 0x200002, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sync() 17:28:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:21 executing program 2: ftruncate(0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) r2 = dup(0xffffffffffffffff) mq_notify(r2, 0x0) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r1, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, r0, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, r0, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, r0, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1, r0}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r2, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, r0, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r9, 0x0, 0x100000001) 17:28:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:21 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 17:28:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000802000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:28:21 executing program 0: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/power/resume', 0x422b02, 0x0) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) dup(r3) copy_file_range(r1, &(0x7f0000000000)=0x6, r3, 0x0, 0xbbb, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) write$bt_hci(r0, &(0x7f0000000040)=ANY=[], 0xfdef) 17:28:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) [ 1970.775381] 9pnet: Insufficient options for proto=fd 17:28:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001802000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:28:21 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 17:28:21 executing program 0: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000180), 0x40800, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) r4 = getpgrp(0x0) pidfd_open(r4, 0x0) sched_setaffinity(r4, 0x8, &(0x7f0000000000)=0x5) mq_notify(r3, 0x0) r5 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) ioctl$SNAPSHOT_FREE_SWAP_PAGES(r5, 0x3309) ioctl$CDROM_LOCKDOOR(r3, 0x5329, 0x0) ioctl$CDROMSUBCHNL(r0, 0x5392, 0x0) 17:28:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001c02000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:28:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:21 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 17:28:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:28:36 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003f02000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:28:36 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:36 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:36 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:36 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:36 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:28:36 executing program 2: ftruncate(0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) r2 = dup(0xffffffffffffffff) mq_notify(r2, 0x0) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r1, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, r0, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, r0, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, r0, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1, r0}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r2, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, r0, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r9, 0x0, 0x100000001) 17:28:36 executing program 0: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r4, 0x0, 0x0}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) io_uring_enter(r1, 0x8058ab, 0x0, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0xb475e86990fa277e, 0xffffffffffffffff, 0x0) r6 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x8a00, 0x0) syz_io_uring_setup(0x630b, &(0x7f0000000140)={0x0, 0xa2d1, 0x10, 0x3, 0x209, 0x0, r1}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000001c0)=0x0, &(0x7f0000000240)) r8 = getpgrp(0x0) r9 = pidfd_open(r8, 0x0) r10 = dup(r9) mq_notify(r10, 0x0) syz_io_uring_submit(r7, r3, &(0x7f0000000280)=@IORING_OP_SPLICE={0x1e, 0x3, 0x0, @fd_index=0x8, 0x4, {0x0, r10}, 0xbf4, 0x1, 0x1, {0x0, 0x0, r6}}, 0x2) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r6, 0x2405, r0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1986.652163] 9pnet: Insufficient options for proto=fd [ 1986.663414] 9pnet: Insufficient options for proto=fd 17:28:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006b02000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:28:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:37 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000048002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 1986.859867] 9pnet: Insufficient options for proto=fd 17:28:37 executing program 0: sendmsg$IPVS_CMD_SET_CONFIG(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[@ANYBLOB="a4000000", @ANYRES16=0x0, @ANYBLOB="080027bd7000fddbdf250c0000000800050007000000080005000200000040000180080008030000000008000500000000001400030000000000000000000000ffff7f0000010800080004000000080005000500000038000180060004004e22000008000800030000000800090059000000060001000a00000006000100020000000c0007000800000040000000"], 0xa4}, 0x1, 0x0, 0x0, 0x10}, 0x44000) setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x4046a2, 0x0) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = dup(0xffffffffffffffff) mq_notify(r1, 0x0) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000400)=0x0) sendmsg$nl_generic(r1, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000480)={&(0x7f0000000540)=ANY=[@ANYBLOB="ff0000000000000029bd7000fd9bdf251800fd2d706b68ff3c9d9e79d811ed6c425929e93533acfc0648e43fb69325e69a886e630f9eb4770ef371f39d0ab44dd243bf3378d1e7997b1102000000000000ba601825b8d548bdb651f57322314bb4f865d559db731646bb0031dd597816b982e59ebc2c3a0e15d8675ec41733e158593b3d919d0150955636017588df4af6c6ac7a984c4ba7c389bbe91d0665f41bdb863ec3284806a0552c14d000"/189, @ANYRES32=r2, @ANYBLOB="14000e0020010000000000000000000000000002"], 0x34}, 0x1, 0x0, 0x0, 0x8084}, 0x4c880) ftruncate(r0, 0x1000003) r3 = syz_open_dev$sg(&(0x7f0000000080), 0x5, 0x0) getsockopt$IPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x43, &(0x7f0000000180)={'IDLETIMER\x00'}, &(0x7f00000001c0)=0x1e) openat$full(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r4 = signalfd4(r3, &(0x7f0000000240)={[0x5]}, 0x8, 0x800) ioctl$KDSETLED(r4, 0x4b32, 0x8) dup2(0xffffffffffffffff, r3) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{0x0, 0x4}, {0x5}]}, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0xfffffffffffffff7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) [ 1986.900550] 9pnet: Insufficient options for proto=fd 17:28:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:37 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) [ 1987.055500] 9pnet: Insufficient options for proto=fd [ 1987.126681] 9pnet: Insufficient options for proto=fd [ 2002.396255] 9pnet: Insufficient options for proto=fd 17:28:52 executing program 2: ftruncate(0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) r2 = dup(0xffffffffffffffff) mq_notify(r2, 0x0) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r1, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, r0, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, r0, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, r0, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1, r0}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r2, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, r0, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r9, 0x0, 0x100000001) 17:28:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20ffffff8c02000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:28:52 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:28:52 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:52 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)={0x1c, 0x5e, 0xc21, 0x0, 0x0, {0x0, 0x2}, [@generic="0200000000"]}, 0x1c}}, 0x0) syncfs(r0) fallocate(0xffffffffffffffff, 0x8, 0x0, 0x8000) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000002800)={0x0, 0x0, &(0x7f0000000980)={&(0x7f0000000900)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYBLOB="080000000c00018008a4851c", @ANYRES32=0x0, @ANYBLOB="04000280"], 0x24}}, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000100), 0x3f, 0x2400) write$binfmt_script(r2, &(0x7f00000002c0)={'#! ', './file1', [{0x20, '^{!'}, {0x20, '{'}], 0xa, "20b8d9ad6cd5455176dd6062c2628817b59e81925bf50627542cfba88be7a7f4f5ac4c51a9ef22ae4d9cd7c8bb20e2a215f819f995fb913de0c617adbfd0ca8bf2a0b89d6faeabe55008e242f1865363d50822c1fdc8a2843ab42d61e4a4f87aa4bda3a700b48e80b67824756deff1cf46d92d5c91e2f71bd1173b38f58ce2ffa348a624aaff037c2707ba21acc997fa293d83223efe36"}, 0xa8) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000900)=ANY=[@ANYBLOB="140000005200c5d50022844574da2a4892000200"], 0x14}}, 0x0) write$binfmt_script(r3, &(0x7f0000000080)={'#! ', './file1', [{0x20, 'syz_tun\x00'}, {0x20, 'syz_tun\x00'}, {0x20, 'syz_tun\x00'}, {0x20, 'syz_tun\x00'}, {}, {0x20, '{'}, {0x20, ']*-.)'}, {0x20, '[{\x9f)t-!+\xa2!\''}, {0x20, 'b'}], 0xa, "5fd0837aba86b27953374b86027e9c3e2caa465a13482b8ca23eafa18323b0d2f63c5d732efd328fb0c0c67949057113dcee"}, 0x78) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syncfs(r1) 17:28:52 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:52 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffffff602000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:28:52 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:52 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2002.444769] 9pnet: Insufficient options for proto=fd 17:28:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:52 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:28:52 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2002.551918] 9pnet: Insufficient options for proto=fd [ 2002.571090] 9pnet: Insufficient options for proto=fd 17:28:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffffdfc02000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:29:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20fffffffe02000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:29:08 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:29:08 executing program 0: r0 = dup(0xffffffffffffffff) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x8001}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000000140)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed410000000800001c00000000000000e0f4655f000000000000040004", 0x1d, 0x20fd}], 0x1, &(0x7f00000001c0)={[{@jqfmt_vfsv0}]}) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r0, 0x80089419, &(0x7f0000000180)) 17:29:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2017.957119] 9pnet: Insufficient options for proto=fd 17:29:08 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:29:08 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:29:08 executing program 2: ftruncate(0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = pidfd_open(0x0, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r1, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, r0, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, r0, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, r0, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1, r0}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, r0, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r10, 0x0, 0x100000001) 17:29:08 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2017.983481] 9pnet: Insufficient options for proto=fd 17:29:08 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:29:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:29:08 executing program 0: ioctl$BTRFS_IOC_QUOTA_CTL(0xffffffffffffffff, 0xc0109428, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, @out_args}, './mnt\x00'}) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000180), 0x180, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2, {r0}}, './mnt\x00'}) pread64(0xffffffffffffffff, &(0x7f0000000340)=""/70, 0x46, 0x0) r6 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="6d706f6c3d7072656665722c00be8312e29221682e2a95562e3d4b2ccedcabc3705e60bd006ecc4a016e9f56088ea35514b56add106ab1998b6b5f8ed6473d5db0366312ae5740fff6c9e9c475b7c8d5f887bdf48d5fbe9cc26bfb8479b8ba2dcc227e85cb4fddf58ffa216517b550e58dc027f999dd10a05f98353adfb482045ea0db943d"]) mknodat$loop(r6, 0x0, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) add_key$fscrypt_v1(0x0, &(0x7f00000001c0)={'fscrypt:', @desc4}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, &(0x7f0000000300)=@secondary) fcntl$getown(r0, 0x9) setsockopt$inet6_tcp_TCP_MD5SIG(r5, 0x6, 0xe, &(0x7f0000000200)={@in={{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x0, 0x0}}}, 0x0, 0x0, 0x3b, 0x0, "28624b46489a40c147cba2d9e3550e7b96b4279b7eb3a6d198251624357dfbc576cb48c6bb6db857fbe8ac152453420f7d822e870b503cfe2e26300f8982f7eab304e3ef8d416da864caa6a43c1c20e3"}, 0xd8) fstat(r6, &(0x7f0000000400)) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r7}) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000000)={@private0, 0x3e, r7}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000480), &(0x7f00000004c0)=0xc) [ 2018.018339] 9pnet: Insufficient options for proto=fd 17:29:08 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:29:08 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:29:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000f0ffff02000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:29:08 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:29:08 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:29:08 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) [ 2018.204652] 9pnet: Insufficient options for proto=fd 17:29:08 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:29:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20fcfdffff02000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:29:08 executing program 0: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) creat(0x0, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) unshare(0x0) unshare(0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000100), 0x100000000, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1ff, 0x8, 0x0, 0x5}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) openat$autofs(0xffffffffffffff9c, 0x0, 0x0, 0x0) 17:29:08 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:29:08 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 17:29:08 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2018.369109] 9pnet: Insufficient options for proto=fd 17:29:26 executing program 0: sendmsg$NL80211_CMD_TESTMODE(0xffffffffffffffff, 0x0, 0x8001) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x28, 0x18, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, 0x0, 0x0, @pid}, @nested={0xc, 0x8, 0x0, 0x1, [@typed={0x8, 0xc, 0x0, 0x0, @fd}]}]}, 0x28}}, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f00000006c0)=@abs, 0x6e, &(0x7f0000000780)=[{&(0x7f0000000080)=""/28, 0x1c}, {&(0x7f0000000740)=""/17, 0x11}], 0x2, &(0x7f00000007c0)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x118}, 0x4002) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000980), r0) sendmsg$DEVLINK_CMD_SB_PORT_POOL_GET(r1, &(0x7f0000000a80)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000a40)={&(0x7f00000009c0)={0x48, r4, 0x400, 0x70bd28, 0x25dfdbff, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x6fc32304}, {0x6, 0x11, 0x5}}]}, 0x48}}, 0x20004004) sendmsg$nl_generic(r0, &(0x7f0000000300)={&(0x7f0000000000), 0xc, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="180000003500001300000000fcdbdf250800000004008d00"], 0x18}, 0x1, 0x0, 0x0, 0x8001}, 0x4000) ioctl$sock_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000280)) socket$netlink(0x10, 0x3, 0x0) accept(0xffffffffffffffff, &(0x7f0000000600)=@can, &(0x7f0000000680)=0x80) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000580)={&(0x7f0000000380)=ANY=[@ANYBLOB="cc010000", @ANYRES16=0x0, @ANYBLOB="00027e080000fddbdf25890000000c0099000500000061000000ac011d8048000080060005006f00000006000500970000000c000200ee0000000000000005000700af0000000c00020005000000000000000c000300f8ffff6c03ffffff05000a0000000000600100804c010d804c0003803d0002000f4a452915371b250e152748170311411e4e49414d4f212449430e05313b2e0346314a2d38061240194819410d3b2017422649453810414a2a00000005000400010000004800018014000300ab51ff00090003003500ff01ff0f0100080002003a4903481400030006000300090000010004ff0717008100140003000200ff0f4000080040fe050002000700a8000080240001001b3f0624606c03040a063248480c0b6b060536062406186c60481b391601050604000100460002002410003d493d04271e3a342f0a011635032a0e12442b432e09562b3b0f403c2119492c450518293b38053c0c085102170a4e09280a2d141a060b120d183e4a48294200003400020025570a4e111d404d4500093e1e2a091b213109452f3f2e094657101f39012820402737060e21283c491d4522291048540c000180050004000200000005000a000000000005000a0000000000"], 0x1cc}, 0x1, 0x0, 0x0, 0xc1}, 0x200040c0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000140)=ANY=[@ANYRESDEC, @ANYRES64], 0x5c000) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f00000002c0)=ANY=[@ANYRESHEX, @ANYRESDEC, @ANYRES32]) getsockopt$IP_VS_SO_GET_VERSION(0xffffffffffffffff, 0x0, 0x480, &(0x7f0000000140), &(0x7f0000000180)=0x40) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) copy_file_range(r2, &(0x7f0000000ac0)=0x4, r3, &(0x7f0000000b00)=0x2, 0x6, 0x0) [ 2035.863042] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=53 sclass=netlink_route_socket pid=14818 comm=syz-executor.0 17:29:26 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:29:26 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:29:26 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:29:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="208cffffff02000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:29:26 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:29:26 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 17:29:26 executing program 2: ftruncate(0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = pidfd_open(0x0, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r1, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, r0, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, r0, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, r0, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1, r0}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, r0, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r10, 0x0, 0x100000001) 17:29:42 executing program 2: ftruncate(0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = pidfd_open(0x0, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r1, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, r0, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, r0, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, r0, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1, r0}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, r0, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r10, 0x0, 0x100000001) 17:29:42 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:29:42 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:29:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:29:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20f6ffffff02000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:29:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 17:29:42 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:29:42 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x513003, 0x0) ioctl$BTRFS_IOC_INO_PATHS(r0, 0xc0389423, &(0x7f0000000100)={0xbccd3b6, 0x18, [0xff1, 0x6, 0x8, 0x6], &(0x7f00000000c0)=[0x0, 0x0, 0x0]}) r1 = socket$netlink(0x10, 0x3, 0x12) sendmsg$nl_generic(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="280000002c00010d000000000000e4ffffffffffffffffff"], 0x28}}, 0x0) 17:29:42 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 17:29:43 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20feffffff02000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:29:43 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:29:43 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) [ 2052.891868] 9pnet: Insufficient options for proto=fd 17:29:43 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 17:29:43 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x10}, 0x400c0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x4f4f, &(0x7f00000005c0)={0x0, 0x8043}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000100)=0x0, &(0x7f00000001c0)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x0, 0x0, r3, 0x0, &(0x7f0000000400)={0x0, 0x0, 0x0}, 0x0, 0x24004804}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) syz_io_uring_submit(r5, r2, &(0x7f00000002c0)=@IORING_OP_RECVMSG={0xa, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x103}, 0x80000001) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r6 = syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000140), &(0x7f0000002580)) r7 = syz_io_uring_setup(0x4ffd, &(0x7f0000000200)={0x0, 0x0, 0x1}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000280)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r6, 0x7, &(0x7f0000000500), 0x1) dup2(r7, 0xffffffffffffffff) syz_io_uring_setup(0x5140, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x2, 0x0, 0x0, r6}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000440), &(0x7f0000000080)=0x0) r9 = timerfd_create(0x9, 0x80400) fcntl$setown(r9, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000001800)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) syz_io_uring_setup(0x261c, &(0x7f0000000640)={0x0, 0xd5d, 0x1, 0x1, 0x25e}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000180), &(0x7f00000006c0)) syz_io_uring_submit(r4, r8, &(0x7f0000000040)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x5, 0x0, 0x8, 0x3, &(0x7f0000000300)="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", 0x1}, 0x8001) 17:29:43 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:29:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:29:59 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:29:59 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}]}}) 17:29:59 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 17:29:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000001000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:29:59 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:29:59 executing program 2: ftruncate(0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, r0, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, r0, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, r0, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1, r0}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, r0, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r10, 0x0, 0x100000001) 17:29:59 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000237}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r1, &(0x7f00000000c0)="fe", 0x1, 0x0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x40) fadvise64(r1, 0x0, 0x1, 0x4) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000011c0)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000001640)={'batadv_slave_1\x00', 0x0}) sendmmsg$inet(r2, &(0x7f0000002e80)=[{{&(0x7f0000000140)={0x2, 0x4e21, @empty}, 0x10, &(0x7f0000001180)=[{&(0x7f0000000180)="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", 0x1000}], 0x1, &(0x7f0000001200)=[@ip_retopts={{0x34, 0x0, 0x7, {[@lsrr={0x83, 0x7, 0x95, [@private=0xa010101]}, @timestamp_addr={0x44, 0xc, 0x59, 0x1, 0x7, [{@rand_addr=0x64010102, 0x5c6b}]}, @ssrr={0x89, 0xb, 0x6, [@remote, @multicast1]}, @ra={0x94, 0x4}, @end, @noop]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r3, @initdev={0xac, 0x1e, 0x0, 0x0}, @multicast2}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xfff}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x20}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @multicast2, @loopback}}}], 0xa8}}, {{&(0x7f00000012c0)={0x2, 0x4e20, @private=0xa010101}, 0x10, &(0x7f00000015c0)=[{&(0x7f0000001300)="328558b3a33c5ab8f9077f0872fb043a4fede2183de6a0c6ea69d76e8968c3dac816c7baef54feb778000cbaf5878c05592ad801b92e916f0b2d0b3de08a648c492590cd4240338824c3d3775ff727d491bb3ce0b99b2b96a007a8457d6ca974ed0bd1e9f7202cc321211b40bcf8958ca733ca586e814c43270f285afe2ee7b7", 0x80}, {&(0x7f0000001380)="1acb21d450c9a47dbf130759fd785143da825ecb27d7c59fad9db38412534b79f3b48280d4ad0b8dcd0f01052ca5a66d93e1a678ca9f9eb0bc8639cb12e20a62deacebac368a117824f00907f3a59e1803f72583c8f37b3dd88ee7d4b39b5e2cf6425f363a00587f4b5c56a751e135364bbce0e06a9afa91041f33dbf9246dc41be32566a90cdb83bd968c70ad257eba60ba9e69a9a801285cc3e33404fbe0b0dc0ea8df9a6eb41c939e4bba02802ee4fd7be8ef2553d6a70ead6e1ba7188dc4230a41dcbd37c03382c9601d7989c1cc35193a620278879750c25324481f0b", 0xdf}, {&(0x7f0000001480)="6410e3b3b796ec340398e876b1b12188057f101ea07eec78f5c7511160aae4c8a1e59186b79c112ee2569850e065f5132f854d70f7c971fad4c5ca0aeb6c41d69258ebbfb7006bc42e49bd813a5ac42f462122152bfe999daee814a79143457fa5e73bd354", 0x65}, {&(0x7f0000001e00)="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", 0x1000}, {&(0x7f0000001500)="3049128761858efd62eced9282871be1091a511d22f6a63babfa331cd091881d620fe9ccd9168d871201cb590b4bad052b09886faf2bcf744378bdc7d0da00c146da20a84c7b586dea38cd8cee71c20be6d426fbe516", 0x56}, {&(0x7f0000001580)}], 0x6, &(0x7f0000001680)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @loopback, @rand_addr=0x64010100}}}, @ip_retopts={{0x18, 0x0, 0x7, {[@generic={0x82, 0x4, "aab7"}, @noop]}}}, @ip_retopts={{0x78, 0x0, 0x7, {[@rr={0x7, 0x1b, 0x9c, [@private=0xa010102, @private=0xa010100, @remote, @rand_addr=0x64010100, @multicast1, @initdev={0xac, 0x1e, 0x1, 0x0}]}, @timestamp_addr={0x44, 0x4c, 0x1e, 0x1, 0x4, [{@remote, 0x9f4d}, {@empty, 0x7}, {@loopback, 0x1ff}, {@multicast1, 0x400}, {@broadcast, 0x6534}, {@private=0xa010102, 0x200}, {@local, 0x87bd}, {@loopback, 0x7}, {@loopback, 0x5}]}]}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xf6b}}, @ip_retopts={{0x8c, 0x0, 0x7, {[@lsrr={0x83, 0xb, 0xe3, [@dev={0xac, 0x14, 0x14, 0x1d}, @rand_addr=0xffff]}, @ssrr={0x89, 0x13, 0xe4, [@dev={0xac, 0x14, 0x14, 0x30}, @local, @private=0xa010102, @empty]}, @rr={0x7, 0x23, 0xe2, [@local, @broadcast, @initdev={0xac, 0x1e, 0x0, 0x0}, @local, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote, @multicast2]}, @timestamp_addr={0x44, 0x1c, 0xe3, 0x1, 0x1, [{@loopback, 0x10001}, {@empty, 0x9604}, {@remote, 0x1}]}, @noop, @lsrr={0x83, 0x1b, 0x74, [@private=0xa010102, @local, @broadcast, @dev={0xac, 0x14, 0x14, 0x10}, @loopback, @private=0xa010100]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private=0xa010101, @loopback}}}, @ip_tos_int={{0x14, 0x0, 0x1, 0xd6}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x80}}], 0x1c0}}, {{&(0x7f0000001840)={0x2, 0x4e20, @broadcast}, 0x10, &(0x7f0000002e00)=[{&(0x7f0000001880)="654d442b131c17eda4ac27869847a1babdac5c2b323c3e490ebc7824a823e61080b2c9f62a2f3051a9f1405ed9e57207c9c9139f6998cfc6ac3a3b9379b6d5d9ba1e4a5db93a96079f0331384f69f31684226fc17fd956dd721c6fe69132dc007d8e2a61023be2fd4944c8a26f306c68e7b7999f9fce962d7fda68fddac7ecf4704c158a6945fa30cecf14dca4f7020b72cbb0e3f7c5e205dde9e9f37d052275bdf4fa494fd6ddaa79b3e65d8385ecf2513dcc4544f6b5", 0xb7}, {&(0x7f0000001940)="4b976f36b7fbf29deadf3821be09410df4f2a40f6ed99fff2ec1860f866cae0b4732c9918828fd51fbf65901102ffab1be80cf2bd8ee4e2cca3cadef8e786d5ad7b55afafdca2e98d1d2ac3b0fcb29d03aff188aafae0d8d4aa262836ac6120595fc93ef3714c0b4766313fbe2252b44095cbce1ff77b4e36361016ee120157a9562ce1de8c24e974a17c3c487b8ad50e3e0db05c8ccc807dfc853487a9279004a1f93b1ff853a9c4fca0c", 0xab}, {&(0x7f0000001a00)="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", 0xfc}, {&(0x7f0000001b00)="1e3fa086e367346cbd3197c781074ac06bb9146d02df581ac7a4de24db9bfec30cd946180a7f7bf303cd196fd5d79a92d6894c0cf293", 0x36}, {&(0x7f0000001b40)="ec8fe2c79dd26306861202b1c0aee3ccda5b2eb8fecf0d07f83a09411714dd65eafbaf9e8cfcebac34260208c15125e22d836a4daf502c2caf081fb1833e0e04c8c482e17771aed1cab0723a02eca1a2e71870477fdc96953b6e027d3413a421a4447863219eac281ef1690bc42daa46e4d7aee5426380591f3ec13983dd76be905172b2a76487f19dc69d564ef5f6a3b226795f8fdab07574e46592fc9a3f7408dff1c6c0299bc0b928b972fdac513d4834224e96de489189ff48c75633055af7a4b571b2c7f8971e1cb204665c66c9ba65b095764e324924d49d1ad29e492c71a8fada7de96febb0c27029e4", 0xed}, {&(0x7f0000001c40)="aa0840254a7d1fd9866fa9e727683e429a183133995e5240276c2ce8f75c05b1f5cb5736101764dd07d1329663c0331d682a263a2f5ccbaa5052f67b4b5e06f2949c677d10eee4f16564c00bf4fa562cb299c23419d99f3da528e583bfb60c538ad726be3edff48f9c2d072c064aa48d0e203ce97713b761b8eb533b5a1c6f747040959351838e0a88b7824ec9bea2941092b868e5ee38217bf6fa1454185925b60883e92faa60238733d187eb7d115d3002df73f0472d3485741457c1614b89a41c2ab3c96f94a6cd4167fa2af2", 0xce}], 0x6, &(0x7f0000001d40)=[@ip_tos_u8={{0x11, 0x0, 0x1, 0x1}}, @ip_tos_int={{0x14, 0x0, 0x1, 0x7}}], 0x30}}], 0x3, 0x4000000) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x5, 0x4, 0x0, 0x2, 0x0, 0x9, 0x20402, 0x802ad94fc632de1a, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3611, 0x0, @perf_config_ext={0xfffffffffffffffb, 0x1}, 0x8000, 0x1, 0x81, 0x3, 0x7, 0x222c, 0x4000, 0x0, 0x0, 0x0, 0x5}, 0xffffffffffffffff, 0x10, r0, 0xa) setsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000100)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, 0x14) [ 2069.408336] 9pnet: Insufficient options for proto=fd 17:29:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200002000002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:29:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:29:59 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2069.522911] 9pnet: Insufficient options for proto=fd 17:29:59 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2069.547450] 9pnet: Insufficient options for proto=fd 17:29:59 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2069.600006] 9pnet: Insufficient options for proto=fd 17:30:16 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:30:16 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:30:16 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:30:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:30:16 executing program 2: ftruncate(0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, r0, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, r0, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, r0, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1, r0}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, r0, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r10, 0x0, 0x100000001) 17:30:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200003000002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:30:16 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}]}}) 17:30:16 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f00000001c0)={0x7f, 0x8, 0x1, 'queue1\x00', 0x3}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000080)) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0xc0a85320, &(0x7f0000000100)={0x80}) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x32, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r3, 0xc0a85320, &(0x7f0000000100)={0x80}) r4 = dup3(r2, r3, 0x0) r5 = openat(r4, &(0x7f0000000280)='./file0\x00', 0x101000, 0x2c0) ioctl$RTC_VL_READ(r5, 0x80047013, &(0x7f00000002c0)) ioctl$TIOCL_SETVESABLANK(r4, 0x541c, &(0x7f0000000180)) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x80000) ioctl$TIOCCONS(r6, 0x541d) r7 = accept(0xffffffffffffffff, 0x0, 0x0) connect$bt_l2cap(r7, &(0x7f0000001700)={0x1f, 0x0, @none, 0x0, 0x2}, 0xe) getsockopt$bt_l2cap_L2CAP_LM(r1, 0x6, 0x3, &(0x7f00000003c0), &(0x7f0000001600)=0x4) [ 2085.873453] 9pnet: Insufficient options for proto=fd [ 2085.890941] 9pnet: Insufficient options for proto=fd 17:30:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200004000002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:30:16 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:30:16 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:30:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) [ 2085.968107] 9pnet: Insufficient options for proto=fd 17:30:16 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2086.011516] 9pnet: Insufficient options for proto=fd 17:30:16 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:30:16 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:30:16 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:30:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200005000002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2086.084588] 9pnet: Insufficient options for proto=fd 17:30:16 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:30:16 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:30:16 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200006000002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:30:16 executing program 2: ftruncate(0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, 0xffffffffffffffff, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, r0, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, r0, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, r0, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1, r0}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, r0, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r10, 0x0, 0x100000001) [ 2086.253235] 9pnet: Insufficient options for proto=fd 17:30:32 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}]}}) 17:30:32 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:30:32 executing program 2: ftruncate(0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) r4 = dup(r3) mq_notify(r4, 0x0) r5 = getpgrp(0x0) r6 = pidfd_open(r5, 0x0) r7 = dup(r6) mq_notify(r7, 0x0) r8 = getpgrp(0x0) r9 = pidfd_open(r8, 0x0) r10 = dup(r9) mq_notify(r10, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r1, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, r0, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, r0, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, r0, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1, r0}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r4, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r7}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, r0, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r10}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f0000000040)=0x1) r11 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r11, 0x0, 0x100000001) 17:30:32 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200007000002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:30:32 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:30:32 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:30:32 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:30:32 executing program 0: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x0, &(0x7f0000000040)}) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r0, 0x80286722, &(0x7f00000005c0)={&(0x7f0000000580)=""/64, 0x40, 0x4, 0x1}) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) chdir(0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r1) mount$9p_unix(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x800000, &(0x7f00000002c0)={'trans=unix,', {[{@nodevmap}, {@version_u}, {@version_9p2000}], [{@smackfstransmute={'smackfstransmute', 0x3d, 'ext4\x00'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '}\\'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}}) setresuid(0xffffffffffffffff, 0x0, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) r2 = epoll_create(0x7ffd) pwritev2(r1, &(0x7f00000001c0)=[{&(0x7f0000000340)="c784bfbe55d6d46525abd1b978037cd3fbbd387d6e4087e8fd2346216f99ceabb0298ab21b79bda7a4f9e36d9ec390a1e67ba19fdec8dbe9167fe83dd93bb8841bb09cc22c6b5038825a6f1fde218f3c30c3318bbf43a0eea1cf177bdf68b9111ae8299ba87e52621d21e938e9fb5bde7b2ad3f96dd4748d20f875a0495f4f86dd69a288f2496a6683f0cd1d804b517598b398374c2b28d538373454cfc333a9b5727a7d8dd04bbae0b6be6023d2c07653f690df26a92f170ec285fbf374de89b32cb4e1803c4a6fbf5e0c19a4283de204aa02ddc693f1df11436fd699446e3dff3546b3bb211328aebeb5dad140b1", 0xef}, {&(0x7f0000000440)="52a517b036077e44856fbd358ad48f5a781ba8883814fcef0daf0a2917f5da774730e839b5a434d0b312dfc2809cac812ce26496a8c52b983b775508f721ecd795b69a13d5c35999c43ba4aedbf57fed4cd43542890e077ea90f770997842f6c03933e77c9572a16f6d79dee0f732e9528f196b43ef61b5369d9b0f841584ec0100f1e67355fb6a8f810f727da506d1858db26741e191a2f19b289c07207e89654f6c34c66dadbf33062b0d1cfe080216a1a8615eacb6949c9edbcb4b26bcb30697491e1e8a4df97bf4249", 0xcb}, {&(0x7f0000000100)="9ada296267122741753ec4656fe4bc0bbe39a0c838429e95f8637b36cc6d97d2", 0x20}], 0x3, 0xa0000, 0x80000, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6}]}) readv(r2, &(0x7f0000000100), 0x1000000000000073) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20d315) [ 2102.748538] 9pnet: Insufficient options for proto=fd [ 2102.752443] 9pnet: p9_fd_create_unix (14997): problem connecting socket: ./file0: -2 17:30:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:30:33 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:30:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200008000002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:30:33 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:30:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200018000002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2102.947831] audit: type=1326 audit(1694712633.229:42): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14996 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7faf7497bb19 code=0x0 [ 2102.956941] 9pnet: Insufficient options for proto=fd [ 2103.001280] 9pnet: p9_fd_create_unix (15019): problem connecting socket: ./file0: -2 [ 2103.014150] audit: type=1326 audit(1694712633.296:43): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=14996 comm="syz-executor.0" exe="/syz-executor.0" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7faf7497bb19 code=0x0 17:30:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20001c000002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:30:33 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:30:33 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) [ 2103.172557] 9pnet: Insufficient options for proto=fd 17:30:49 executing program 2: ftruncate(0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) r4 = dup(r3) mq_notify(r4, 0x0) r5 = getpgrp(0x0) r6 = pidfd_open(r5, 0x0) r7 = dup(r6) mq_notify(r7, 0x0) r8 = getpgrp(0x0) r9 = pidfd_open(r8, 0x0) r10 = dup(r9) mq_notify(r10, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r1, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, r0, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, r0, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, r0, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1, r0}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r4, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r7}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, r0, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r10}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f0000000040)=0x1) r11 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r11, 0x0, 0x100000001) 17:30:49 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:30:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20006b000002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:30:49 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@obj_type}]}}) 17:30:49 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:30:49 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}]}}) 17:30:49 executing program 0: add_key(&(0x7f0000000000)='id_resolver\x00', &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8982, 0x0) pidfd_getfd(r0, r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) r4 = dup(r3) mq_notify(r4, 0x0) write$9p(r4, &(0x7f00000000c0)="aaaa44078d55b3a375d911c19152f51b7b1d627916f1eca271ecc552d6a382979aa4ff2d3fffaa328633e0ecc8a1", 0x2e) r5 = getpgrp(0x0) r6 = pidfd_open(r5, 0x0) dup(r6) ioctl$BTRFS_IOC_SEND(0xffffffffffffffff, 0x40489426, &(0x7f0000000180)={{r6}, 0x8, &(0x7f0000000140)=[0x5, 0xa5, 0x4, 0xffffffff, 0x3, 0x0, 0x5, 0x80000001], 0x101, 0x5, [0x81, 0x51854755, 0x2, 0x7fffffff]}) 17:30:49 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2119.247222] cgroup: fork rejected by pids controller in /syz4 [ 2119.254039] 9pnet: Insufficient options for proto=fd 17:30:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000f0000002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:30:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000840), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000005c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="050000000000000000000200000008000300", @ANYRES32=r2, @ANYBLOB='\b\x00%'], 0x2c}}, 0x0) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = dup(r4) bind$netlink(r0, &(0x7f0000000180)={0x10, 0x0, 0x25dfdbfd, 0x200000}, 0xc) mq_notify(r5, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) sendmsg$NL80211_CMD_SET_CHANNEL(r5, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x28, r6, 0x2, 0x70bd28, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x0, 0x10}}}}, [@NL80211_ATTR_CENTER_FREQ2={0x8, 0xa1, 0x2}]}, 0x28}, 0x1, 0x0, 0x0, 0x24008000}, 0x40000) 17:30:49 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:30:49 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:30:49 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}]}}) 17:30:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000030002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2119.379627] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2119.394884] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:30:49 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200080040002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2119.435503] 9pnet: Insufficient options for proto=fd 17:31:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000050002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:31:04 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:31:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:31:04 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@obj_type}]}}) 17:31:04 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}]}}) 17:31:04 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:31:04 executing program 2: ftruncate(0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) r4 = dup(r3) mq_notify(r4, 0x0) r5 = getpgrp(0x0) r6 = pidfd_open(r5, 0x0) r7 = dup(r6) mq_notify(r7, 0x0) r8 = getpgrp(0x0) r9 = pidfd_open(r8, 0x0) r10 = dup(r9) mq_notify(r10, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r1, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, r0, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, r0, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, r0, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1, r0}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r4, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r7}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, r0, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r10}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r0, 0x40046210, &(0x7f0000000040)=0x1) r11 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r11, 0x0, 0x100000001) 17:31:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2134.016401] 9pnet: Insufficient options for proto=fd 17:31:04 executing program 0: r0 = syz_io_uring_setup(0x6153, &(0x7f0000000180)={0x0, 0x3aae, 0x0, 0x3}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r4}}, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r5, &(0x7f0000000080)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000001c0)="4bc702854e3954b59347985ccc868289d3fe483d2c0900a2a1d12e33a66529e1f276fef452632dfa3c004ce3be84a5f66c29cd4ec39ae5206562fbc9ea3c0dbbebc22e628e147b0e9631f19b0ce0a48e0e675b2da3442226b898f1ddf8eabf133ab4a9cb0999c2ee1d3bd36d089b0d8e97ea00d4c5f6ad14dce058d595aacba2d587ff5eacd81b71a73f53ed276d1f3b3384bb2bfba4e0f37302e690df9e7024378ac754ac0576f996f3ee53d1034c7720767ddf2625817532f7ae89103367b73a36152b84c38bc227ba9e9ff48bcfe027585cf14bff37a888", 0xff41}], 0x1}}], 0x1, 0x0) r6 = syz_io_uring_setup(0x4d53, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) accept4$inet6(r5, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000300)=0x1c, 0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) r10 = io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r9, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r10}}, 0x0) r11 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r8, &(0x7f00000002c0)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r5, 0x0, &(0x7f00000000c0)="64e9b6f506739b4c02f57c731d94884da1949f436f41b23fb1da7bf770ad632ed25b4d36a2e7f1b5ff6e25553eb571dcba4816c6f2d357394c90e487871a41e2ac06fb2ea29cb85b36cb68eeffa3db5ef09c3ab5664cbb00266c57bb639528cbd837f1f098286c916ecf3eb1b0f19a4788288cdda5d2bc169a02057aaa82fbc96c7bfb37b6f421c26e9f6e017f577637ff6da05988e47e195a94ef055a3e3d64072208e339c96ed0bd578c36468046d46eb707b944b2b8708a65e7da7997a926f87d8bde1247d76cccc5e4b763e35db02381547397b46c47b33be528b7", 0xdd, 0x80, 0x1, {0x0, r11}}, 0x81) r12 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r1, r8, &(0x7f0000000000)=@IORING_OP_WRITE_FIXED={0x5, 0x0, 0x2004, @fd_index=0x8, 0x81, 0x6, 0xe02, 0x10, 0x1, {0x3, r12}}, 0x4) r13 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f00000000c0), r13) 17:31:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000060002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:31:04 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:31:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:31:04 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@obj_type}]}}) 17:31:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000070002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:31:04 executing program 0: r0 = syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NLBL_CALIPSO_C_ADD(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x22400000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x34, r0, 0x8, 0x70bd2a, 0x25dfdbfe, {}, [@NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_MTYPE={0x8}, @NLBL_CALIPSO_A_DOI={0x8}]}, 0x34}, 0x1, 0x0, 0x0, 0x800}, 0x4800) r1 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) sendmsg$nl_generic(r1, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000000c0)={0x24, 0x22, 0x69844ea0a6ddcd11, 0x0, 0x0, {}, [@typed={0xd, 0x0, 0x0, 0x0, @str='[}\xef(.,)(\x00'}]}, 0x24}}, 0x0) [ 2134.178108] 9pnet: Insufficient options for proto=fd 17:31:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000180002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:31:04 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}]}}) 17:31:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}]}}) 17:31:23 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:31:23 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:31:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:31:23 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2c0000002e00274e0000000000000000000000000400002a001400"/44], 0x2c}}, 0x0) 17:31:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000001c0002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:31:23 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@obj_type}]}}) 17:31:23 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) [ 2152.935622] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.0'. 17:31:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000200002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:31:23 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x400000}, 0x0, 0xbce}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x1000000000000, 0xfffffffffffffff9, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000002f00)='./file0/../file0\x00', 0x0, 0x1d3004, 0x0) lstat(&(0x7f0000000240)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x20, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)=@nfc_llcp={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "473d7fcc115d845089a8e3eefc4327c35d5f4c097347fb24dc13ef0e12d6bc7370068cf4ada46207f33a62ea0b5e364eee2b1dc94c1742ea96765c683f90df"}, 0x80, &(0x7f0000000300)=[{&(0x7f00000000c0)="d9", 0x1}], 0x1}, 0x0) stat(&(0x7f0000001cc0)='.\x00', 0x0) setresuid(0xffffffffffffffff, 0x0, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000003c0)=ANY=[@ANYBLOB="dd1bbc5258f9ba00f95eddbe06af95d2b8ab89cd13008782e25115172e4da9365ae7c1895ac608dd53084438986da54fa098debdba", @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYBLOB="25764d654aa4918891d3e200000000000000"]) syz_genetlink_get_family_id$gtp(&(0x7f0000000200), 0xffffffffffffffff) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file0/../file0/file0\x00', 0x10000, 0x9e) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x10, 0xffffffffffffffff, 0x8000000) lstat(&(0x7f0000000180)='./file0/../file0/file0\x00', &(0x7f0000000280)) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000000800)='./file0/../file0\x00', 0x0, &(0x7f0000000880)=""/178, 0xb2) 17:31:23 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:31:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000003f0002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:31:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}]}}) 17:31:23 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@obj_type}]}}) 17:31:23 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:31:23 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:31:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000006b0002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2153.400612] EXT4-fs (sda): re-mounted. Opts: (null) 17:31:23 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) [ 2153.414975] EXT4-fs (sda): re-mounted. Opts: (null) 17:31:23 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:31:23 executing program 2: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:31:23 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@obj_type}]}}) 17:31:23 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@obj_type}]}}) 17:31:23 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200004800002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:31:37 executing program 0: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:31:37 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:31:37 executing program 2: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:31:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:31:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000f00002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:31:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:31:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:31:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@obj_type}]}}) 17:31:53 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@obj_type}]}}) 17:31:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:31:53 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:31:53 executing program 2: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:31:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) pread64(0xffffffffffffffff, &(0x7f0000000040)=""/4126, 0x101e, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f0000000240)="01", 0x1) close(r1) r2 = openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) write$binfmt_elf32(r2, &(0x7f0000000080)=ANY=[@ANYBLOB="7f454c460000000000000000000000000200060000000000000000003800000000000000000000000000200001000000000000000000"], 0x58) close(r2) pipe2$9p(&(0x7f0000001080), 0x4000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = dup(r4) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x4}}, './file1\x00'}) write$P9_RSTATFS(r6, &(0x7f00000010c0)={0x43, 0x9, 0x1, {0xb16f, 0x1000, 0xeaf7, 0x5, 0xa027, 0x10000, 0x8000, 0x5, 0x6}}, 0x43) mq_notify(r5, 0x0) ioctl$BLKRRPART(r5, 0x125f, 0x0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 17:31:53 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:31:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:31:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000003000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:31:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000004000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:31:53 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:31:54 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:31:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000006000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:31:54 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:31:54 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:31:54 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:32:11 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:32:11 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:32:11 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:32:11 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:32:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000007000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:32:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:32:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:32:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = mmap$IORING_OFF_CQ_RING(&(0x7f0000004000/0x4000)=nil, 0x4000, 0x2, 0x4010, r0, 0x8000000) r3 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r3, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000000080)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000001c0)="4bc702854e3954b59347985ccc868289d3fe483d2c0900a2a1d12e33a66529e1f276fef452632dfa3c004ce3be84a5f66c29cd4ec39ae5206562fbc9ea3c0dbbebc22e628e147b0e9631f19b0ce0a48e0e675b2da3442226b898f1ddf8eabf133ab4a9cb0999c2ee1d3bd36d089b0d8e97ea00d4c5f6ad14dce058d595aacba2d587ff5eacd81b71a73f53ed276d1f3b3384bb2bfba4e0f37302e690df9e7024378ac754ac0576f996f3ee53d1034c7720767ddf2625817532f7ae89103367b73a36152b84c38bc227ba9e9ff48bcfe027585cf14bff37a888", 0xd9}], 0x1}}], 0x1, 0x800) r4 = syz_io_uring_setup(0x4d53, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) accept4$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, &(0x7f0000000300)=0x1c, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) r8 = io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r8}}, 0x0) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r6, &(0x7f00000002c0)=@IORING_OP_SEND={0x1a, 0x0, 0x0, r3, 0x0, &(0x7f00000000c0)="64e9b6f506739b4c02f57c731d94884da1949f436f41b23fb1da7bf770ad632ed25b4d36a2e7f1b5ff6e25553eb571dcba4816c6f2d357394c90e487871a41e2ac06fb2ea29cb85b36cb68eeffa3db5ef09c3ab5664cbb00266c57bb639528cbd837f1f098286c916ecf3eb1b0f19a4788288cdda5d2bc169a02057aaa82fbc96c7bfb37b6f421c26e9f6e017f577637ff6da05988e47e195a94ef055a3e3d64072208e339c96ed0bd578c36468046d46eb707b944b2b8708a65e7da7997a926f87d8bde1247d76cccc5e4b763e35db02381547397b46c47b33be528b7", 0xdd, 0x80, 0x1, {0x0, r9}}, 0x81) r10 = dup(0xffffffffffffffff) mq_notify(r10, 0x0) setsockopt$sock_int(r10, 0x1, 0x7, &(0x7f0000000340)=0x7, 0x4) syz_io_uring_submit(r2, r6, &(0x7f0000000140)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, {0x1}}, 0x101) sendmmsg$inet6(r1, &(0x7f0000000040)=[{{&(0x7f0000000000)={0x2, 0x4e23, 0x0, @empty}, 0x80, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="10", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000008c0)="7f", 0x1}], 0x1}}], 0x28, 0x8080) 17:32:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000f000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:32:11 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:32:11 executing program 0: setsockopt$inet_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x0, 0x2a, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x47e2, 0x4) r1 = socket$nl_generic(0x10, 0x3, 0x10) fallocate(0xffffffffffffffff, 0x0, 0x806, 0x0) ftruncate(r0, 0x1000003) fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f0000000200)='security.capability\x00', &(0x7f0000000240)='./file0\x00', 0xffffffffffffffff) ioctl$SG_GET_LOW_DMA(0xffffffffffffffff, 0x227a, 0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000280)={0x1, 0x4, 0xfffffffffffffffa, 0xfffffffffffffffc}) getpgrp(0x0) fcntl$lock(0xffffffffffffffff, 0x25, 0x0) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYBLOB="2c7dc0763a866f3d7ef4522b9e990daa31b556143d0a6fb09e90138d3c912da3e9b0aac033f0810000000000000068475b64f3866102988d0b7f3803e3ed09814bd04c5fe425aa2448761af4a2b35f70a9abcb0764fd378b39894f00a1d7ecbbafedd8edc5200f1dcd787d0643678edd8606834015377114000000000000000000000000734081d1ca9a08573dfe0a66713a9eeacea2277295f3996e10c0332b161102f190b4229982ac7572466b8a37", @ANYRESHEX=r2, @ANYBLOB=',cachetag=\x00,version=9p2000.L,fowner', @ANYRESDEC, @ANYBLOB=',fsmagic=0x000000000000ffff,smackfstransmute=security.capability\x00,\x00']) dup2(r0, r1) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2, 0x14, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000480)={'batadv_slave_0\x00', 0x0}) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r1, &(0x7f0000000680)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x64, 0x0, 0x10, 0x70bd26, 0x25dfdbfb, {}, [@MPTCP_PM_ATTR_ADDR={0x2c, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x2}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x7}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x4}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x5}]}, @MPTCP_PM_ATTR_ADDR={0x14, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FLAGS={0x8, 0x6, 0x3}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x2}]}, 0x64}, 0x1, 0x0, 0x0, 0x440c4}, 0x8001) write$binfmt_script(r1, &(0x7f00000004c0)={'#! ', './file0', [{}, {0x20, 'security.capability\x00'}, {0x20, 'version=9p2000.L'}, {}, {0x20, 'wfdno'}, {0x20, '('}], 0xa, "47380174472a0bdc54c3cf106ccc013c87b54931ebb29da1aa9bcf282cec06d9143ddb55731897830290dbe2a583776ba7938903ac3d784242ae4a55f5662516f4496378b29d41f612431fb44da1fcc9161d7e83da59651b0d40b82371cad4c35a6490ac0d021f1ec071cd9e1a482b5ce846cb304fce7b10b9e8a545cca776483f239918d5b23b655f2340213eee16db0898ec4657fde4f41f5d583bfadc915783a653b48b2989bd48804e9b09c488a7"}, 0xeb) 17:32:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000020002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:32:11 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2201.212108] 9pnet: Insufficient options for proto=fd 17:32:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2201.297664] 9pnet: Insufficient options for proto=fd 17:32:11 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:32:11 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) [ 2201.440534] perf: interrupt took too long (7776 > 7761), lowering kernel.perf_event_max_sample_rate to 25000 17:32:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:32:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000030002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:32:25 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2214.756554] 9pnet: Insufficient options for proto=fd 17:32:25 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:32:25 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:32:25 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x13, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwritev(r0, &(0x7f0000001140)=[{&(0x7f0000000080)="f2", 0x1}], 0x1, 0x0, 0x0) syz_io_uring_setup(0x5bc3, &(0x7f0000000140)={0x0, 0xce32, 0x0, 0x3, 0xfb, 0x0, r0}, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000000), &(0x7f00000000c0)) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, 0x0) close(0xffffffffffffffff) creat(&(0x7f0000000040)='./file1\x00', 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$GIO_FONTX(0xffffffffffffffff, 0x4b6b, 0x0) 17:32:25 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:32:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:32:25 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2214.832960] 9pnet: Insufficient options for proto=fd 17:32:25 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:32:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000040002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:32:25 executing program 0: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x2, 0x3, 0x0, 0x0, 0x5, '`\x00\x00\x00\x00\x00\x00@\x00', 0xed}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) flock(r1, 0x2) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0xfffffffc, 0x0, 0x0, 0x1cf}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x7fff) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x6003, @fd_index=0x8, 0xa075, 0x0, 0x0, 0x2, 0x1, {0x0, r2}}, 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @loopback}, &(0x7f00000000c0)=0xc) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r3, r0, 0x0) [ 2214.932052] 9pnet: Insufficient options for proto=fd 17:32:25 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:32:25 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) [ 2214.966092] device veth0_vlan entered promiscuous mode 17:32:25 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) [ 2215.027070] device veth0_vlan entered promiscuous mode 17:32:25 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000050002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:32:25 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:32:40 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:32:40 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:32:40 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:32:40 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:32:40 executing program 0: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x2, 0x3, 0x0, 0x0, 0x5, '`\x00\x00\x00\x00\x00\x00@\x00', 0xed}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) flock(r1, 0x2) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0xfffffffc, 0x0, 0x0, 0x1cf}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x7fff) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000440)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x6003, @fd_index=0x8, 0xa075, 0x0, 0x0, 0x2, 0x1, {0x0, r2}}, 0x1) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000080)={0x0, @loopback}, &(0x7f00000000c0)=0xc) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r3, r0, 0x0) 17:32:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000060002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:32:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 1) 17:32:40 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 1) [ 2230.260100] FAULT_INJECTION: forcing a failure. [ 2230.260100] name failslab, interval 1, probability 0, space 0, times 0 [ 2230.262604] CPU: 1 PID: 16292 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2230.263999] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2230.265652] Call Trace: [ 2230.266191] dump_stack+0x107/0x167 [ 2230.266925] should_fail.cold+0x5/0xa [ 2230.267704] should_failslab+0x5/0x20 [ 2230.268466] __kmalloc_track_caller+0x79/0x370 [ 2230.269398] ? strndup_user+0x74/0xe0 [ 2230.270168] memdup_user+0x22/0xd0 [ 2230.270900] strndup_user+0x74/0xe0 [ 2230.271631] __x64_sys_mount+0x133/0x300 [ 2230.272467] ? copy_mnt_ns+0xa00/0xa00 [ 2230.273296] do_syscall_64+0x33/0x40 [ 2230.274057] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2230.275073] RIP: 0033:0x7f3da67ebb19 [ 2230.275807] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2230.279447] RSP: 002b:00007f3da3d61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2230.280942] RAX: ffffffffffffffda RBX: 00007f3da68fef60 RCX: 00007f3da67ebb19 [ 2230.282353] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2230.283752] RBP: 00007f3da3d611d0 R08: 0000000020000280 R09: 0000000000000000 [ 2230.285168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2230.286569] R13: 00007ffdf73094ff R14: 00007f3da3d61300 R15: 0000000000022000 [ 2230.299947] FAULT_INJECTION: forcing a failure. [ 2230.299947] name failslab, interval 1, probability 0, space 0, times 0 [ 2230.302430] CPU: 1 PID: 16298 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2230.303791] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2230.305442] Call Trace: [ 2230.305985] dump_stack+0x107/0x167 [ 2230.306726] should_fail.cold+0x5/0xa [ 2230.307513] should_failslab+0x5/0x20 [ 2230.308286] __kmalloc_track_caller+0x79/0x370 [ 2230.309227] ? strndup_user+0x74/0xe0 [ 2230.310013] memdup_user+0x22/0xd0 [ 2230.310740] strndup_user+0x74/0xe0 [ 2230.311487] __x64_sys_mount+0x133/0x300 [ 2230.312306] ? copy_mnt_ns+0xa00/0xa00 [ 2230.313130] do_syscall_64+0x33/0x40 [ 2230.313890] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2230.314912] RIP: 0033:0x7fcacacb3b19 [ 2230.315662] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2230.319282] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2230.320822] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2230.322274] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2230.323704] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2230.325139] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2230.326575] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 17:32:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000070002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:32:40 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, 0x0, &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2230.348228] device veth0_vlan entered promiscuous mode 17:32:40 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:32:40 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:32:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 2) [ 2230.561323] FAULT_INJECTION: forcing a failure. [ 2230.561323] name failslab, interval 1, probability 0, space 0, times 0 [ 2230.563685] CPU: 1 PID: 16412 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2230.565123] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2230.566836] Call Trace: [ 2230.567394] dump_stack+0x107/0x167 [ 2230.568155] should_fail.cold+0x5/0xa [ 2230.568946] ? create_object.isra.0+0x3a/0xa20 [ 2230.569914] should_failslab+0x5/0x20 [ 2230.570689] kmem_cache_alloc+0x5b/0x310 [ 2230.571528] create_object.isra.0+0x3a/0xa20 [ 2230.572421] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2230.573470] __kmalloc_track_caller+0x177/0x370 [ 2230.574408] ? strndup_user+0x74/0xe0 [ 2230.575200] memdup_user+0x22/0xd0 [ 2230.575926] strndup_user+0x74/0xe0 [ 2230.576675] __x64_sys_mount+0x133/0x300 [ 2230.577510] ? copy_mnt_ns+0xa00/0xa00 [ 2230.578337] do_syscall_64+0x33/0x40 [ 2230.579096] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2230.580134] RIP: 0033:0x7f3da67ebb19 [ 2230.580890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2230.584598] RSP: 002b:00007f3da3d61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2230.586534] RAX: ffffffffffffffda RBX: 00007f3da68fef60 RCX: 00007f3da67ebb19 [ 2230.588010] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2230.589624] RBP: 00007f3da3d611d0 R08: 0000000020000280 R09: 0000000000000000 [ 2230.591075] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2230.592525] R13: 00007ffdf73094ff R14: 00007f3da3d61300 R15: 0000000000022000 17:32:56 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 3) 17:32:56 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:32:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 1) 17:32:56 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:32:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000080002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:32:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 2) 17:32:56 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_ADD_DEV(r0, 0x5000940a, &(0x7f00000005c0)={{r1}, "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"}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x80) ftruncate(r2, 0x1000004) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) sendfile(r3, r2, 0x0, 0xb052) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)=@v1={0x1000000, [{0x4bf, 0x2}]}, 0xc, 0x3) lseek(0xffffffffffffffff, 0x0, 0x0) openat(r2, &(0x7f0000000000)='./file0\x00', 0x800, 0x248) read(0xffffffffffffffff, &(0x7f0000000380)=""/215, 0xd7) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r4, 0x29, 0x30, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x90) r5 = getpgrp(0x0) r6 = pidfd_open(r5, 0x0) r7 = dup(r6) mq_notify(r7, 0x0) sendfile(0xffffffffffffffff, r7, &(0x7f0000000200)=0x4, 0x80000001) ioctl$AUTOFS_IOC_FAIL(r4, 0x9361, 0x66) 17:32:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2246.030506] FAULT_INJECTION: forcing a failure. [ 2246.030506] name failslab, interval 1, probability 0, space 0, times 0 [ 2246.031757] CPU: 1 PID: 16423 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2246.032517] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2246.033414] Call Trace: [ 2246.033717] dump_stack+0x107/0x167 [ 2246.034120] should_fail.cold+0x5/0xa [ 2246.034549] should_failslab+0x5/0x20 [ 2246.034985] __kmalloc_track_caller+0x79/0x370 [ 2246.035489] ? strndup_user+0x74/0xe0 [ 2246.035914] memdup_user+0x22/0xd0 [ 2246.036305] strndup_user+0x74/0xe0 [ 2246.036701] __x64_sys_mount+0x133/0x300 [ 2246.037160] ? copy_mnt_ns+0xa00/0xa00 [ 2246.037608] do_syscall_64+0x33/0x40 [ 2246.038023] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2246.038576] RIP: 0033:0x7f2cab73ab19 [ 2246.038989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2246.040969] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2246.041819] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2246.042599] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2246.043389] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2246.044175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2246.044966] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 [ 2246.053513] FAULT_INJECTION: forcing a failure. [ 2246.053513] name failslab, interval 1, probability 0, space 0, times 0 [ 2246.053553] CPU: 0 PID: 16421 Comm: syz-executor.6 Not tainted 5.10.194 #1 17:32:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2246.053570] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2246.053580] Call Trace: 17:32:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 2) [ 2246.053618] dump_stack+0x107/0x167 [ 2246.053662] should_fail.cold+0x5/0xa [ 2246.053706] ? create_object.isra.0+0x3a/0xa20 17:32:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) [ 2246.053741] should_failslab+0x5/0x20 [ 2246.053763] kmem_cache_alloc+0x5b/0x310 17:32:56 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 4) [ 2246.053804] create_object.isra.0+0x3a/0xa20 [ 2246.053827] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2246.053864] __kmalloc_track_caller+0x177/0x370 [ 2246.053886] ? strndup_user+0x74/0xe0 [ 2246.053927] memdup_user+0x22/0xd0 [ 2246.053954] strndup_user+0x74/0xe0 [ 2246.053986] __x64_sys_mount+0x133/0x300 17:32:56 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000180002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2246.054014] ? copy_mnt_ns+0xa00/0xa00 [ 2246.054073] do_syscall_64+0x33/0x40 [ 2246.054103] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2246.054121] RIP: 0033:0x7fcacacb3b19 17:32:56 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) [ 2246.054148] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2246.054163] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 17:32:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) [ 2246.054191] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2246.054205] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2246.054218] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2246.054231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2246.054245] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 [ 2246.055460] FAULT_INJECTION: forcing a failure. [ 2246.055460] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2246.055489] CPU: 0 PID: 16419 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2246.055505] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2246.055516] Call Trace: [ 2246.055547] dump_stack+0x107/0x167 [ 2246.055592] should_fail.cold+0x5/0xa [ 2246.055641] _copy_from_user+0x2e/0x1b0 [ 2246.055678] memdup_user+0x65/0xd0 [ 2246.055712] strndup_user+0x74/0xe0 [ 2246.055746] __x64_sys_mount+0x133/0x300 [ 2246.055775] ? copy_mnt_ns+0xa00/0xa00 [ 2246.055829] do_syscall_64+0x33/0x40 [ 2246.055854] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2246.055868] RIP: 0033:0x7f3da67ebb19 [ 2246.055889] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2246.055902] RSP: 002b:00007f3da3d61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2246.055933] RAX: ffffffffffffffda RBX: 00007f3da68fef60 RCX: 00007f3da67ebb19 [ 2246.055947] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2246.055960] RBP: 00007f3da3d611d0 R08: 0000000020000280 R09: 0000000000000000 [ 2246.055973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2246.055991] R13: 00007ffdf73094ff R14: 00007f3da3d61300 R15: 0000000000022000 [ 2246.115345] FAULT_INJECTION: forcing a failure. [ 2246.115345] name failslab, interval 1, probability 0, space 0, times 0 [ 2246.115359] CPU: 1 PID: 16440 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2246.115365] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2246.115368] Call Trace: [ 2246.115387] dump_stack+0x107/0x167 [ 2246.115401] should_fail.cold+0x5/0xa [ 2246.115415] ? create_object.isra.0+0x3a/0xa20 [ 2246.115429] should_failslab+0x5/0x20 [ 2246.115438] kmem_cache_alloc+0x5b/0x310 [ 2246.115452] create_object.isra.0+0x3a/0xa20 [ 2246.115463] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2246.115477] __kmalloc_track_caller+0x177/0x370 [ 2246.115487] ? strndup_user+0x74/0xe0 [ 2246.115501] memdup_user+0x22/0xd0 [ 2246.115513] strndup_user+0x74/0xe0 [ 2246.115527] __x64_sys_mount+0x133/0x300 [ 2246.115538] ? copy_mnt_ns+0xa00/0xa00 [ 2246.115558] do_syscall_64+0x33/0x40 [ 2246.115570] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2246.115577] RIP: 0033:0x7f2cab73ab19 [ 2246.115587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2246.115593] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2246.115605] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2246.115611] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2246.115617] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2246.115623] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2246.115629] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 [ 2246.225510] FAULT_INJECTION: forcing a failure. [ 2246.225510] name failslab, interval 1, probability 0, space 0, times 0 [ 2246.225551] CPU: 0 PID: 16510 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2246.225564] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2246.225572] Call Trace: [ 2246.225603] dump_stack+0x107/0x167 [ 2246.225637] should_fail.cold+0x5/0xa [ 2246.225667] ? copy_mount_options+0x55/0x180 [ 2246.225696] should_failslab+0x5/0x20 [ 2246.225723] kmem_cache_alloc_trace+0x55/0x320 [ 2246.225748] ? _copy_from_user+0xfb/0x1b0 [ 2246.225787] copy_mount_options+0x55/0x180 [ 2246.225823] __x64_sys_mount+0x1a8/0x300 [ 2246.225852] ? copy_mnt_ns+0xa00/0xa00 [ 2246.225908] do_syscall_64+0x33/0x40 [ 2246.225934] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2246.225949] RIP: 0033:0x7f3da67ebb19 [ 2246.225971] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2246.225984] RSP: 002b:00007f3da3d61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2246.226010] RAX: ffffffffffffffda RBX: 00007f3da68fef60 RCX: 00007f3da67ebb19 [ 2246.226024] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2246.226037] RBP: 00007f3da3d611d0 R08: 0000000020000280 R09: 0000000000000000 [ 2246.226050] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2246.226064] R13: 00007ffdf73094ff R14: 00007f3da3d61300 R15: 0000000000022000 17:33:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 3) 17:33:11 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:33:11 executing program 0: r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c, 0x800) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f0000001400)={{'\x00', 0x1}, {0x1}, 0x4c, 0x0, 0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)="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", 0x14b, 0x0, &(0x7f00000002c0)={0x2, 0x105e, {0x0, 0xc, 0x51, "4f32a405e553bd41d4fdf1139a84ff3500503986ddab3f68fe7a2004510f61eebf6b783434909d9b5fcde12325f49595d6c95aa18d66971f5f4807f3b5f2657109529763a27dc55795e17e32cb4c4873bf", 0x1000, "4af6c57b1a28088bde48b9872c95ba69b02588c5bc2ba3d1cce08e75cb6b43d6340cf72814c84f64ddc6b2063766af33b5962d3857a51870cc49b4c57f922145ec5f2886710e80415e9ab2e9306fd8579f3879a30271e760f6093dd87b616f6cdead8c244b854c34a5b46982b48e0e1383b0381a8ae21e5e2bbacf5f6a27b8db68b1a8225fd5ee54ddfc4219dec7ba991a7a3aab7393d01187385c7b9dcee1eee8b406bdcded07e8db6a6f30385892a0cfa52ef93a4509c8c9b78060fd708c9be922f9bd4f3ad629924a24530e41a92525dfdf9fdf51fdf95b2c703d0a8f2a86e1e3b6696bab8f87646cde0b844d27379e7c3f84ca9e230b83d7c4dec4b08c34a7fd96bc9bc280259d76fcdfccfff734cca15ae1d7bd0ab26d603d2b2564d0ae05d8f8937c9f9315f81972d4e927f36839a670bad71d750501834899173e3060a08694db86de05ba55d8bacf60be46398517479fbb8f33173dc8832a52bcf8c9cba2e11f19ee30870ede653401dbd5d15e064f15e838e11579b818d8a9fe35d2f96658e4e122ba4f763c43a86bacc9ac14beeb857a39846ee53a2e5f9020aeefe2a41de7bbd0b3392853e9e5f72331485cba7af3185fc38c95ae855ebaf72d20fe2627737ef845fd211d1902d64cd39c147e5d4e000f581b2cbc497bdacca09aa3005d78f148b3ec7e6ff5abc63ddc91702af1c3a044acf070e4d5d19781a490b6e291f97301797c495ea5162df654921afabbd79098b493c0227532df1d397e1178e0c2e051de0e047dc12beb90dd05e2957594f24980b63bedae07aab38295f69f3d9019202568baf4e9b9a36ad693031e4bec71685d3786a1202e8f9bd1902f4b9361c8c31b125ff74fafc00d25a8ee54689e4abdc0fc689c5430a045b209de552e64dd389dbedb2bbf503f5832eb68279faf8afa9286982b02c23a8cf2b60c3d455c93fb7be30998235fce69784d285c481f59a231a943652c644666900ff6e8dfc57864936941fe303aecc90ab0d13741b2559d5671b8f07d832a8f283c4dbca1bc24ee6335176fd628439465bb14deacd00bc15a3a24dbeb927aa82cc54577e7beb0a82d875bdf140d292a227436e5dccc3e7cc94333c9bea286b9913eb513b80b1267c246dee476837389435f5ef117c014dd4b393b75bacbbb1517bee898ffe14081d1e52319f93355d2ea20113524072f3d2ca8407fd2ad69309e7d9199dae6aef18dfbae8280ec2d87cf9d328a2c6a1fd27688729c22751490bb2a80e7e7e43dddd3b915db703d5894aeebaf4e0f0681533d9e4223c5d68e6fb9d371fd02258e90b5e75f53fa628181c578cd53dc01ecc712b8ab8dc2751bc63243ef0a7b620e892a3f88a99a2e401b38ee1646fdc7fe5a790c2159d7da38229b0317291c23d410eccdaefb98e830f33c3cfa39421cf6a85d496f45ce6648f184485f31c667a1befb828e0dc0e2b6abf18880c06bff1e7434c235e03dcf05564a219a5d585bc4847aeb604ccc95ef5a56a5bd1262b91a6a82ee02275f51501423e660bb690908c7c9caa83021810997a688e9d95c9f26ec7241c9f8ea90b5fa63a003a32f9708a8b97507e59600a3bec2b9784d716b7f63854d1d23b460096705e116124d0cbcfde17b0534c80d06f1959ec0f67bd92dbd940fa6c4e31bf1da29a48becde2926a6bbf8932bdd68416503bcf1bde9738eecc83b897f818afe5212f5c361b5a4c407d972affb3d8282406f219858a8c520cf8692dcdcda3a74f325164445aadbff9b195538e0a917336b0d042ab7d9a71d679785f8b0bed37522a9487a4096d517718c67e193a49cd0c13faca4a8511f0ad2673fe8bb72064846bbe8715f85e464b2dd75c1661a2a980f071b58db0faef81bf533dbddd0f6241796a3625fcf86a87da0995ed84fa3e6b6cf38c50c8b74cb6302eea593c39b29355deb00d0980c475373cd20de0614bad76e9985df6f6d14d2ebed3fc6881cb934fd78cd305883d241a9633294a728e94dc664d22ed261ea08371cf0c0ff83231eb07e37bfd8bb5bffa2b7289ff739eedbfb3bdaaff40e66524ffc7765d94699dfe39456cca398651be776bd096caf11cdf04480efccd4773b8f4c0ed27051133e6af0087f3ce5a2f3889c6e4c1a32cf22dfd565544b2c2e3c3a5b78fdb73887ec3e7f012ddd6837d24ff6d8f31340553b9a779c5641829d2a2937f5a308bf6303052fb61f0a60a93412f0e883e9b3228034d12e6e26843fddbeffcf9940534c34131f4574ffe4bee5e8a32e74c601ea605491dda57bc52f06c710de2c3f98956aff2f6a8b742d33c7e690fc657679471bbdddac6cd0b6817c16a9ad5ead0c6a05f908f7de3a34f28ebd4c3a0b5b777710daba8a2fea73ee5430ac8b92e5f83c0c33261f3b37db29b3d2df4c1241091bc9a69957935ffea8cd406cb01330ad33517cfedf0947fdb620c856e20d667c055c985be1c73723fbea69059a726a761617ae0656cdfc89d258b69580d7e07743a9dc2be684596aa336032f6052680b0cf9c76bc2447d72d3ea35cd875566f89d8aa9303ceaa06b54000dd875597d119267315dd852fb0689779cd93332268bffd2249d875ee42b2f30c7eecdc2be5ea748977917d94a251f5833f7e078b173be5a383dd71f1c1c4c556ae154ed473b2493a9ced2737a9337bb6ea8a383c91059d416a4d7bcab7eff9a06ce4b6f6cbec003032f3c315034685ef2d70fc888461b722051e4078c324fe8c1992a0b027f8e0eb33d195ab692f18fee8e85db35cbaf0c44f932abb0023e2ba2777310ae6b3e78b5a76af0a0a7511c9a614ab727ea85a1eb02dd4f775bd0a20e071d6a2a1fb102d4658c3a4b0a64a44e9b99429b53c3dc7b8134292fe6910974a756805a0395f32713eabe40b46945ee2bce588b56e70834a21bb652e4c523e6ad33609cffd8811ffffde08206873b76cbe2e2088edf83abb14da527724219c3abaca48439c96ac22d1cc343871eb8cc363be7f58d81861dfccd630679625ab4abf497b13860fdda396ab58753ee9c4c43d4672d9c76bf0b452514f618be61f3634bac422c135f03cdc3e21c54b2118bef5235228f3ff5d4319e63b69012275dc170501bd57a2e9166c6e3ec4a18388cf00df00decdfe3a091e29520e598b89fcdbac473ca35ae3baf84a6d8e3c925bb9edde98af586fc5661133aa7212367c548bff8c392f07eaae2e017836aea8def491378e1a22f8cbd5f9576ad395f9450d92d7e3bd760f7029bbc6b05589a63e9c1b9978976cc3c8d7fa64abde881a9b19e3ffe06bea8640613ac62b409058d7ac8bb99dda25b71dc01c635047df0f040113e4d581ea68d89027e4a2ef9caf9af43828c1bc7e2a696a9b1752de7be22e72d88a3f3018648f1df414ad5da6397273c015a904fc3092e17240b21dc54fc75c29c5179c004a71de498201b808f5a3a2696723842fe37fc8a2ba80d4c847a0058b21093c9d7d76eec0be889d5e9451e3d3a22c4da30b36c6985e20038a08219e1de552b318089b272055d2957a10660435083d5cd9e4c52136b2f24d87ecff4070d4aa84af8892b9293646f107f163fd511483ede0410cf8fea6c4ad353ab26195515f870b1e3cad7b94b099ec84d22d5b5634aeae4a5f034466c6e44833cdb5cd16802c7ee81e3f76f47f10f041c0afc5567e98b609366e46224bd84ac14959732e5b98fa42fd7693b113f68223f8cda53d9a01cfb210ebe2cae31bf023ea105c3dd8fb0ba09b98168f12a962cac4eb58613fadb09baeb0c96932f9bfd4a455b9d9e5a69d0e3082bf8a712a818cac857a4a5e05843af586a89bf925d9a5206e6cb1aab01adc164194d6f302c0450b03b40a79d1450f5d43b4f1161eb309df113d5eb5a24d80aedd71e0d36efd5edc6ed480cf1a2f08bced787fb76e7b8956aacef93afe82da21916f68784d7ea09bf463c30dae83fcdbbc9f549f48138ddd8b0252c1db90d96779673d6b7620bdf9c33096201d8535175ad6dd931a157681bdd9a292d8099205475db1f5037693fdbb9465b5d89c344e3f73117681577ca65caf418f9d9090a7647fce68ea7129b5ea8101388e91b628f6ce0e94b9efd7219b9598eb10113fdbccb2a3206cb23ebff5a9d4c535cec478960cb25daac40de4b8db48cd2a23f10ce976f4b9c3528771200f47a40b5daade4cf60fc25039958dc06a4fdc486e6cdb2d7b4b7b85d564a958873e6e18ea8436a168e7b56ee4eeb7e38df34a8235d42d5158625ebc58357daf36d663b1e2d062111e33fe98aec4aaf623fc2ccf6490d6f67f8a27c0542f3bc001e27d6ae20292c45bf04d30852ea627156cffab2bfadb9c7b27e1fddc7571b12d2e9074d6c7afffc79730f58e524c07a893594826106c47a0a9631d3a8b7ab6b616ff6ccccec33bfa500f7ce075d46e903eea55612efd7765ba027e82bb69f761233f7feead99a60b446b9e15338b4b3bd088439cde63948b7e98814ec1f48ce1da37995a60332033898768908fe48d1c39f1442ded03ef9a8bd34dfc94bdba1f49e173235a6f431bb2dcf4849bd0f45e5ae09e5e5b11620e19f644742253330e04519bfa8f48cdf85e577bb9cf84f596502979b9862c5d308b912839b9ca0044cd90fb2de484f6ba9b5c0e90fc8b27792c7cf0b0136311ab8f6e70155b4a15308201a10a6a278f9268aff175848da871ac929837085427ab5ef31d7590225a218f3e34aa793e809d8146a4f7bb86af1fe2d0ddf5859521e09af63e445ab1109867bd8840d30de4b76807ee96812639bff1158246ee6022a4729d7e1d8c6a38219ded6e524ceb9cdbf50225fc60366c5a330ec0595626f0d376ba9c4c1f06cbe15bfe0d88a4293a622e98bdf7d07fde2f74a2313b5fb790d2388d0e0c9e4b88e2c2028d887c1c7701010d2abaa2e15cfbaee78203dacedf0174ad5e2e4a7651f596e972547741df60a2d3e61ba5bdf8cbf92472cbc65c0b6118cb19aa79c53eca5b95f84e321c290f8e3655262e72a55901e7b4fc2ade0beb645eae96122c8a7f1d27daab8e6059116def9805a31bb4650cda600de587a2cb1dfe85661edd04d6dfb58d1c7db9cd1f60cde80c2d83b04d7c117408c7ca96e2fc4d9eea655acd8583a4c3be67a6b365df33a4f2ef40e50cb537121927d97d6edf386c0dd241282c2d5bf794d9b2cc22f1a3229cc3a38fa5114909692de956b4cde2de9b6e21639aeab7e5980955ee88147c48fe8826af6f4a94141de4ebd9e3d53bc339728735e52ee17f0ffe9ba1e0d1a57d73d0fcdbc7dd2773bc75e37231137f9fd6249a52803b1ed63f9d70ca137d02b291b985a2327dda7640b81bdd5e092412a81022afc2f3827ed30ee69f84f8716ba99f06d168cb9fb3d54211a6b4d2dc22e9d3d881ff4a850b1f5b7de9beb868e34a67068ae55fbb8625bce06e6317b253ba68d629b8c6a8c4ff56a380012289b844eb14736500496f0348caea48a0890791d63dc87dee674f689dce85224efaee8b759cd3ea027454d711794242c44f48f03d0481771e66317c40a76be61ed0ade08b7ac2c4cec5830fe9016e1b160f28c2cf2dc51ee355e372a7be76e7fb72da9a221d31566bc8bd6b3d2b36898e42c0a3bf98bf171cc2e4f71bc99331fbb3d2545fac4726fab1286d602140247e5fc2f9ee191e79a54b79b09802cf7733397bf01c90e4958f0b783c569e5440de194ec19885770e307b532a79e28dfbf6b72be327fe52247534bdde9a9fc8c811f68df9e517f9a36b59182ff1b922a7b20d96d5db30d420e6cc88d5de2a7f5"}, 0xc1, "6972db0c8fc11dec2000d779c5101370dddf978519212dd39649b4b520498cc4c34320a19eedefaf887a11f71da687f05af26048b96da55a3537a3699a9e980fd80f0b8001be111dd1fd3477a9aa0225c54ec1be1799e417e641703e37279e49446bccd9041927a4be200b9a610ced8fe1b56467f7b3130575ebb4d3ea163258a5d4ff4ef92b4fb2f771501f08105bd2335bfe4a4a5744e2eec1cc09928727a57c1a49587d87472f24602203c4431c7a0fc969d6dbe2fb2aeb4a799feb78d6a11d"}, 0x112b}) ioctl$VT_SETMODE(0xffffffffffffffff, 0x5602, &(0x7f0000000000)={0x6, 0xff, 0x6, 0x4, 0x4}) faccessat2(0xffffffffffffff9c, &(0x7f0000001480)='./file0\x00', 0x80, 0x0) 17:33:11 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:33:11 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 5) 17:33:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, 0x0) 17:33:11 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 3) 17:33:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000001c0002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2261.476639] FAULT_INJECTION: forcing a failure. [ 2261.476639] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2261.479281] CPU: 0 PID: 16568 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2261.480773] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2261.482577] Call Trace: [ 2261.483161] dump_stack+0x107/0x167 [ 2261.483961] should_fail.cold+0x5/0xa [ 2261.484804] _copy_from_user+0x2e/0x1b0 [ 2261.485715] memdup_user+0x65/0xd0 [ 2261.486499] strndup_user+0x74/0xe0 [ 2261.487307] __x64_sys_mount+0x133/0x300 [ 2261.488202] ? copy_mnt_ns+0xa00/0xa00 [ 2261.489089] do_syscall_64+0x33/0x40 [ 2261.489913] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2261.491030] RIP: 0033:0x7f2cab73ab19 [ 2261.491847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2261.495871] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2261.497548] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2261.499096] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2261.500646] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2261.502202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2261.503747] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:33:11 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x1c, 0x1, 0x4, 0x5, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x4}]}, 0x1c}}, 0x0) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1ceeff00010401040000000000000000052000030800034000a37e5d"], 0x1c}, 0x1, 0x0, 0x0, 0x4000001}, 0x48000) 17:33:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000006b0002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:33:11 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) [ 2261.509292] FAULT_INJECTION: forcing a failure. [ 2261.509292] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2261.510668] CPU: 1 PID: 16575 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2261.511415] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2261.512376] Call Trace: [ 2261.512669] dump_stack+0x107/0x167 [ 2261.513102] should_fail.cold+0x5/0xa [ 2261.513556] _copy_from_user+0x2e/0x1b0 [ 2261.514022] memdup_user+0x65/0xd0 [ 2261.514432] strndup_user+0x74/0xe0 [ 2261.514830] __x64_sys_mount+0x133/0x300 [ 2261.515296] ? copy_mnt_ns+0xa00/0xa00 [ 2261.515740] do_syscall_64+0x33/0x40 [ 2261.516181] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2261.516770] RIP: 0033:0x7fcacacb3b19 [ 2261.517178] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2261.519347] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2261.519964] FAULT_INJECTION: forcing a failure. [ 2261.519964] name failslab, interval 1, probability 0, space 0, times 0 [ 2261.520218] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2261.520234] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2261.524219] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2261.525028] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2261.525855] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 [ 2261.526714] CPU: 0 PID: 16581 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2261.528215] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2261.530015] Call Trace: [ 2261.530597] dump_stack+0x107/0x167 [ 2261.531402] should_fail.cold+0x5/0xa [ 2261.532239] ? create_object.isra.0+0x3a/0xa20 [ 2261.533239] should_failslab+0x5/0x20 [ 2261.534076] kmem_cache_alloc+0x5b/0x310 [ 2261.534980] create_object.isra.0+0x3a/0xa20 [ 2261.535938] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2261.537066] kmem_cache_alloc_trace+0x151/0x320 [ 2261.538100] ? _copy_from_user+0xfb/0x1b0 [ 2261.539021] copy_mount_options+0x55/0x180 [ 2261.539961] __x64_sys_mount+0x1a8/0x300 [ 2261.540850] ? copy_mnt_ns+0xa00/0xa00 [ 2261.541747] do_syscall_64+0x33/0x40 [ 2261.542563] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2261.543683] RIP: 0033:0x7f3da67ebb19 [ 2261.544493] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2261.548477] RSP: 002b:00007f3da3d61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2261.550138] RAX: ffffffffffffffda RBX: 00007f3da68fef60 RCX: 00007f3da67ebb19 [ 2261.551682] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2261.553230] RBP: 00007f3da3d611d0 R08: 0000000020000280 R09: 0000000000000000 [ 2261.554790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2261.556333] R13: 00007ffdf73094ff R14: 00007f3da3d61300 R15: 0000000000022000 17:33:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:33:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000f00002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2261.604925] 9pnet: Insufficient options for proto=fd 17:33:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:33:11 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:33:11 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000302000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:33:11 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 4) [ 2261.695945] 9pnet: Insufficient options for proto=fd 17:33:12 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:33:12 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 4) [ 2261.752647] FAULT_INJECTION: forcing a failure. [ 2261.752647] name failslab, interval 1, probability 0, space 0, times 0 [ 2261.755313] CPU: 0 PID: 16673 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2261.756794] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2261.758608] Call Trace: [ 2261.759197] dump_stack+0x107/0x167 [ 2261.760011] should_fail.cold+0x5/0xa [ 2261.760855] ? copy_mount_options+0x55/0x180 [ 2261.761323] FAULT_INJECTION: forcing a failure. [ 2261.761323] name failslab, interval 1, probability 0, space 0, times 0 [ 2261.761851] should_failslab+0x5/0x20 [ 2261.761876] kmem_cache_alloc_trace+0x55/0x320 [ 2261.764837] ? _copy_from_user+0xfb/0x1b0 [ 2261.765771] copy_mount_options+0x55/0x180 [ 2261.766713] __x64_sys_mount+0x1a8/0x300 [ 2261.767611] ? copy_mnt_ns+0xa00/0xa00 [ 2261.768498] do_syscall_64+0x33/0x40 [ 2261.769316] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2261.770443] RIP: 0033:0x7fcacacb3b19 [ 2261.771276] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2261.775261] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2261.776918] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2261.778476] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2261.780020] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2261.781576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2261.783122] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 [ 2261.784722] CPU: 1 PID: 16691 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2261.785491] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2261.786378] Call Trace: [ 2261.786664] dump_stack+0x107/0x167 [ 2261.787055] should_fail.cold+0x5/0xa [ 2261.787457] ? copy_mount_options+0x55/0x180 [ 2261.787936] should_failslab+0x5/0x20 [ 2261.788352] kmem_cache_alloc_trace+0x55/0x320 [ 2261.788867] ? _copy_from_user+0xfb/0x1b0 [ 2261.789334] copy_mount_options+0x55/0x180 [ 2261.789827] __x64_sys_mount+0x1a8/0x300 [ 2261.790289] ? copy_mnt_ns+0xa00/0xa00 [ 2261.790743] do_syscall_64+0x33/0x40 [ 2261.791172] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2261.791763] RIP: 0033:0x7f2cab73ab19 [ 2261.792186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2261.794309] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2261.795179] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2261.796008] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2261.796830] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2261.797662] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2261.798484] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 [ 2261.805691] 9pnet: Insufficient options for proto=fd 17:33:26 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) [ 2276.599199] 9pnet: Insufficient options for proto=fd [ 2276.616024] FAULT_INJECTION: forcing a failure. [ 2276.616024] name failslab, interval 1, probability 0, space 0, times 0 [ 2276.617355] CPU: 1 PID: 16730 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2276.618144] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2276.619022] Call Trace: [ 2276.619329] dump_stack+0x107/0x167 [ 2276.619736] should_fail.cold+0x5/0xa [ 2276.620166] ? create_object.isra.0+0x3a/0xa20 [ 2276.620680] should_failslab+0x5/0x20 [ 2276.621104] kmem_cache_alloc+0x5b/0x310 [ 2276.621568] create_object.isra.0+0x3a/0xa20 [ 2276.622065] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2276.622637] kmem_cache_alloc_trace+0x151/0x320 [ 2276.623164] copy_mount_options+0x55/0x180 [ 2276.623636] __x64_sys_mount+0x1a8/0x300 [ 2276.624093] ? copy_mnt_ns+0xa00/0xa00 [ 2276.624539] do_syscall_64+0x33/0x40 [ 2276.624955] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2276.625527] RIP: 0033:0x7f2cab73ab19 [ 2276.625958] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2276.628000] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2276.628804] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2276.629609] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2276.630399] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2276.631146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2276.631936] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 [ 2276.634105] FAULT_INJECTION: forcing a failure. [ 2276.634105] name failslab, interval 1, probability 0, space 0, times 0 [ 2276.636574] CPU: 0 PID: 16721 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2276.638005] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2276.639675] Call Trace: [ 2276.640223] dump_stack+0x107/0x167 [ 2276.640975] should_fail.cold+0x5/0xa [ 2276.641770] ? create_object.isra.0+0x3a/0xa20 [ 2276.642700] should_failslab+0x5/0x20 [ 2276.643474] kmem_cache_alloc+0x5b/0x310 [ 2276.644315] create_object.isra.0+0x3a/0xa20 [ 2276.645227] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2276.646291] kmem_cache_alloc_trace+0x151/0x320 [ 2276.647253] copy_mount_options+0x55/0x180 [ 2276.648126] __x64_sys_mount+0x1a8/0x300 [ 2276.648955] ? copy_mnt_ns+0xa00/0xa00 [ 2276.649798] do_syscall_64+0x33/0x40 [ 2276.650559] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2276.651591] RIP: 0033:0x7fcacacb3b19 [ 2276.652345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2276.656044] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2276.657401] 9pnet: Insufficient options for proto=fd [ 2276.657590] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2276.659584] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2276.661024] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2276.662479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2276.663921] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 [ 2276.687681] FAULT_INJECTION: forcing a failure. [ 2276.687681] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2276.690128] CPU: 0 PID: 16732 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2276.691522] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2276.693196] Call Trace: [ 2276.693760] dump_stack+0x107/0x167 [ 2276.694512] should_fail.cold+0x5/0xa [ 2276.695300] _copy_from_user+0x2e/0x1b0 [ 2276.696118] copy_mount_options+0x76/0x180 [ 2276.696987] __x64_sys_mount+0x1a8/0x300 [ 2276.697827] ? copy_mnt_ns+0xa00/0xa00 [ 2276.698651] do_syscall_64+0x33/0x40 [ 2276.699409] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2276.700442] RIP: 0033:0x7f3da67ebb19 [ 2276.701196] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2276.704893] RSP: 002b:00007f3da3d61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2276.706446] RAX: ffffffffffffffda RBX: 00007f3da68fef60 RCX: 00007f3da67ebb19 [ 2276.707887] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2276.709322] RBP: 00007f3da3d611d0 R08: 0000000020000280 R09: 0000000000000000 [ 2276.710764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2276.712198] R13: 00007ffdf73094ff R14: 00007f3da3d61300 R15: 0000000000022000 17:33:26 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 5) 17:33:26 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, r0) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, 0x0, 0x0) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r1, @ANYBLOB="200529bd7000000000000e0000000c00060002000000000000001d4f4a5257457e2bccde340662220c84171f1fb3f34d024282818e56f707c7ac82aa3ee423c323e4d9d4cfa8758f069e736278d112f65b236044c5dcea847e2e3d926cdb"], 0x20}, 0x1, 0x0, 0x0, 0x1}, 0x20040801) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r0, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, r1, 0x400, 0x70bd27, 0x25dfdbfd, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_MAX_FRAME_RETRIES={0x5, 0xf, 0x6}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x101}, 0x81) sendmsg$IEEE802154_SET_MACPARAMS(0xffffffffffffffff, 0x0, 0x20004004) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x80800, 0xfffffffffffffffc}, 0x280}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x8) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) r4 = dup(r3) mq_notify(r4, 0x0) sendmsg$TIPC_NL_BEARER_DISABLE(r4, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f00000003c0)={0x144, 0x0, 0x200, 0x70bd29, 0x25dfdbfb, {}, [@TIPC_NLA_NET={0x10, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1bd}]}, @TIPC_NLA_LINK={0xbc, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xa}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xe000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x654}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffffff8}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7e616d4e}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xc7f0}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}]}]}, @TIPC_NLA_MEDIA={0x64, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xed}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffffffd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfffff000}]}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x4004005}, 0x40) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r5) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8880, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) shmat(0x0, &(0x7f0000ffe000/0x2000)=nil, 0x0) ioctl$TIOCGPKT(0xffffffffffffffff, 0x80045438, &(0x7f00000001c0)) 17:33:26 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000800402000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:33:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:33:26 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:33:26 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 6) 17:33:26 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 5) 17:33:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:33:26 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:33:26 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2276.726368] 9pnet: Insufficient options for proto=fd 17:33:27 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:33:27 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:33:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000502000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:33:27 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 6) 17:33:27 executing program 0: r0 = epoll_create1(0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x90000019}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000100)=ANY=[@ANYBLOB="ce878fb197536e33d845", @ANYRES32=r0, @ANYBLOB='\t\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r5, &(0x7f0000000080)={0x80000000}) r6 = epoll_create(0x3ff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendto(0xffffffffffffffff, &(0x7f0000000240)="1f4c736977e3000000000000006b7d72cbd2f9fc3a32f72da6adb47bc4e545916d5a1d95b0fba9dc9019059f25c4b0bd68ca1c2d1f9f2e91b61874cd734f88a174f81d496957cece8e0783f0ced44b82dc7e2c1c0099c7294383d3397b2dbc58f307c50019bb4c", 0x67, 0x20000085, &(0x7f00000002c0)=@tipc=@id={0x1e, 0x3, 0x1, {0x4e23, 0x4}}, 0x80) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r0, &(0x7f0000000200)={0x20000001}) creat(0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r4, r0) 17:33:27 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000602000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:33:27 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 6) [ 2276.904116] FAULT_INJECTION: forcing a failure. [ 2276.904116] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2276.905600] CPU: 1 PID: 16847 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2276.906451] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2276.907464] Call Trace: [ 2276.907765] dump_stack+0x107/0x167 [ 2276.908203] should_fail.cold+0x5/0xa [ 2276.908671] _copy_from_user+0x2e/0x1b0 [ 2276.909170] copy_mount_options+0x76/0x180 [ 2276.909713] __x64_sys_mount+0x1a8/0x300 [ 2276.910226] ? copy_mnt_ns+0xa00/0xa00 [ 2276.910735] do_syscall_64+0x33/0x40 [ 2276.911190] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2276.911829] RIP: 0033:0x7fcacacb3b19 [ 2276.912294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2276.914593] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2276.914706] FAULT_INJECTION: forcing a failure. [ 2276.914706] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2276.915544] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2276.915553] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2276.915560] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2276.915567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2276.915584] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 [ 2276.921901] CPU: 0 PID: 16855 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2276.923325] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2276.925014] Call Trace: [ 2276.925572] dump_stack+0x107/0x167 [ 2276.926334] should_fail.cold+0x5/0xa [ 2276.927134] _copy_from_user+0x2e/0x1b0 [ 2276.927976] copy_mount_options+0x76/0x180 [ 2276.928849] __x64_sys_mount+0x1a8/0x300 [ 2276.929715] ? copy_mnt_ns+0xa00/0xa00 [ 2276.930713] do_syscall_64+0x33/0x40 [ 2276.931516] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2276.932562] RIP: 0033:0x7f2cab73ab19 [ 2276.933429] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2276.938050] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2276.939763] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2276.941218] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2276.942679] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2276.944132] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2276.945597] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:33:41 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 7) 17:33:41 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:33:41 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 7) 17:33:41 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:33:41 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c4600000007000000000009000003003e"], 0xaf2) close(r0) syz_genetlink_get_family_id$SEG6(&(0x7f0000000140), r0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000000680)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'veth1_virt_wifi\x00'}) rename(&(0x7f00000006c0)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e24, @multicast2}, 0x10) sendto$inet(0xffffffffffffffff, &(0x7f0000000080)="a8bb77a50c50feb39cfa2b2796a1e7150d911823fb47f4c65e583986b4f103cae377c6b2b3c37974a8ebc67cae319f1d13787b48650bf14a6484d876c662c8c0f98ccbaed6c1e31c2107e51a302d7746acd7", 0x52, 0x40081, 0x0, 0x0) r1 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f00000000c0)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="02309f8c81aa621572b78d64b044b3f7324f"]) mknodat$loop(r1, &(0x7f0000000240)='./mnt\x00', 0x0, 0x0) ioctl$BTRFS_IOC_QUOTA_RESCAN(r1, 0x4040942c, &(0x7f0000000100)={0x0, 0x9, [0x4, 0x81, 0x9, 0x1b35, 0x5, 0x4]}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0), 0x7fff) unshare(0x48020200) 17:33:41 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000702000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:33:41 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 7) 17:33:41 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2291.618474] FAULT_INJECTION: forcing a failure. [ 2291.618474] name failslab, interval 1, probability 0, space 0, times 0 [ 2291.620172] CPU: 1 PID: 16884 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2291.621137] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2291.622302] Call Trace: [ 2291.622675] dump_stack+0x107/0x167 [ 2291.623193] should_fail.cold+0x5/0xa [ 2291.623730] ? getname_flags.part.0+0x50/0x4f0 [ 2291.624371] should_failslab+0x5/0x20 [ 2291.624903] kmem_cache_alloc+0x5b/0x310 [ 2291.625473] getname_flags.part.0+0x50/0x4f0 [ 2291.626098] ? _copy_from_user+0xfb/0x1b0 [ 2291.626680] user_path_at_empty+0xa1/0x100 [ 2291.627280] __x64_sys_mount+0x1e9/0x300 [ 2291.627845] ? copy_mnt_ns+0xa00/0xa00 [ 2291.628407] do_syscall_64+0x33/0x40 [ 2291.628930] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2291.629634] RIP: 0033:0x7f3da67ebb19 [ 2291.630169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2291.632697] RSP: 002b:00007f3da3d61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2291.633756] RAX: ffffffffffffffda RBX: 00007f3da68fef60 RCX: 00007f3da67ebb19 [ 2291.634738] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2291.635509] FAULT_INJECTION: forcing a failure. [ 2291.635509] name failslab, interval 1, probability 0, space 0, times 0 [ 2291.635729] RBP: 00007f3da3d611d0 R08: 0000000020000280 R09: 0000000000000000 [ 2291.635739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2291.635748] R13: 00007ffdf73094ff R14: 00007f3da3d61300 R15: 0000000000022000 [ 2291.638207] FAULT_INJECTION: forcing a failure. [ 2291.638207] name failslab, interval 1, probability 0, space 0, times 0 [ 2291.638221] CPU: 1 PID: 16882 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2291.638228] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2291.638233] Call Trace: [ 2291.638249] dump_stack+0x107/0x167 [ 2291.638278] should_fail.cold+0x5/0xa [ 2291.646445] ? getname_flags.part.0+0x50/0x4f0 [ 2291.647050] should_failslab+0x5/0x20 [ 2291.647548] kmem_cache_alloc+0x5b/0x310 [ 2291.648100] getname_flags.part.0+0x50/0x4f0 [ 2291.648676] ? _copy_from_user+0xfb/0x1b0 [ 2291.649228] user_path_at_empty+0xa1/0x100 [ 2291.649804] __x64_sys_mount+0x1e9/0x300 [ 2291.650360] ? copy_mnt_ns+0xa00/0xa00 [ 2291.650914] do_syscall_64+0x33/0x40 [ 2291.651425] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2291.652091] RIP: 0033:0x7fcacacb3b19 [ 2291.652599] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2291.655108] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2291.656150] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2291.657119] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2291.658083] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2291.659047] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2291.659990] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 [ 2291.661005] CPU: 0 PID: 16885 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2291.662524] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2291.664310] Call Trace: [ 2291.664898] dump_stack+0x107/0x167 [ 2291.665702] should_fail.cold+0x5/0xa [ 2291.666546] ? getname_flags.part.0+0x50/0x4f0 [ 2291.667549] should_failslab+0x5/0x20 [ 2291.668379] kmem_cache_alloc+0x5b/0x310 [ 2291.669277] getname_flags.part.0+0x50/0x4f0 [ 2291.670250] ? _copy_from_user+0xfb/0x1b0 [ 2291.671161] user_path_at_empty+0xa1/0x100 [ 2291.672094] __x64_sys_mount+0x1e9/0x300 [ 2291.672983] ? copy_mnt_ns+0xa00/0xa00 [ 2291.673872] do_syscall_64+0x33/0x40 [ 2291.674683] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2291.675789] RIP: 0033:0x7f2cab73ab19 [ 2291.676597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2291.680568] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2291.682224] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2291.683760] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2291.685294] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2291.686844] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2291.688400] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 [ 2291.689261] tmpfs: Unknown parameter '0ŸŒªbr·d°D³÷2O' 17:33:41 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) r1 = pidfd_open(0x0, 0x0) r2 = dup(r1) mq_notify(r2, 0x0) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r2, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:33:42 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 8) 17:33:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 8) 17:33:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001802000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:33:42 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 8) [ 2291.819650] FAULT_INJECTION: forcing a failure. [ 2291.819650] name failslab, interval 1, probability 0, space 0, times 0 [ 2291.821035] CPU: 1 PID: 16940 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2291.821845] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2291.822792] Call Trace: [ 2291.823115] dump_stack+0x107/0x167 [ 2291.823539] should_fail.cold+0x5/0xa [ 2291.823982] ? create_object.isra.0+0x3a/0xa20 [ 2291.824515] should_failslab+0x5/0x20 [ 2291.824956] kmem_cache_alloc+0x5b/0x310 [ 2291.825439] create_object.isra.0+0x3a/0xa20 [ 2291.825966] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2291.826561] kmem_cache_alloc+0x159/0x310 [ 2291.827050] getname_flags.part.0+0x50/0x4f0 [ 2291.827556] ? _copy_from_user+0xfb/0x1b0 [ 2291.828057] user_path_at_empty+0xa1/0x100 [ 2291.828557] __x64_sys_mount+0x1e9/0x300 [ 2291.829032] ? copy_mnt_ns+0xa00/0xa00 [ 2291.829520] do_syscall_64+0x33/0x40 [ 2291.829990] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2291.830601] RIP: 0033:0x7fcacacb3b19 [ 2291.831050] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2291.833229] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2291.834143] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2291.834997] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2291.835818] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2291.836666] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2291.837520] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 17:33:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2291.844806] FAULT_INJECTION: forcing a failure. [ 2291.844806] name failslab, interval 1, probability 0, space 0, times 0 [ 2291.847401] CPU: 0 PID: 16939 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2291.848907] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2291.850717] Call Trace: [ 2291.851307] dump_stack+0x107/0x167 [ 2291.852117] should_fail.cold+0x5/0xa [ 2291.852960] ? create_object.isra.0+0x3a/0xa20 [ 2291.853985] should_failslab+0x5/0x20 [ 2291.854838] kmem_cache_alloc+0x5b/0x310 [ 2291.855743] create_object.isra.0+0x3a/0xa20 [ 2291.856705] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2291.857836] kmem_cache_alloc+0x159/0x310 [ 2291.858760] getname_flags.part.0+0x50/0x4f0 [ 2291.859723] ? _copy_from_user+0xfb/0x1b0 [ 2291.860638] user_path_at_empty+0xa1/0x100 [ 2291.861582] __x64_sys_mount+0x1e9/0x300 [ 2291.862498] ? copy_mnt_ns+0xa00/0xa00 [ 2291.863386] do_syscall_64+0x33/0x40 [ 2291.864203] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2291.865319] RIP: 0033:0x7f3da67ebb19 [ 2291.866141] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2291.870127] RSP: 002b:00007f3da3d61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2291.871784] RAX: ffffffffffffffda RBX: 00007f3da68fef60 RCX: 00007f3da67ebb19 [ 2291.873326] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2291.874881] RBP: 00007f3da3d611d0 R08: 0000000020000280 R09: 0000000000000000 [ 2291.876435] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2291.877992] R13: 00007ffdf73094ff R14: 00007f3da3d61300 R15: 0000000000022000 17:33:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001c02000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2291.893410] tmpfs: Unknown parameter '0ŸŒªbr·d°D³÷2O' 17:33:42 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) r1 = pidfd_open(0x0, 0x0) r2 = dup(r1) mq_notify(r2, 0x0) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r2, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:33:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000002002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2291.951943] FAULT_INJECTION: forcing a failure. [ 2291.951943] name failslab, interval 1, probability 0, space 0, times 0 [ 2291.954490] CPU: 0 PID: 16976 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2291.955896] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2291.957563] Call Trace: [ 2291.958127] dump_stack+0x107/0x167 [ 2291.958883] should_fail.cold+0x5/0xa [ 2291.959669] ? create_object.isra.0+0x3a/0xa20 [ 2291.960609] should_failslab+0x5/0x20 [ 2291.961392] kmem_cache_alloc+0x5b/0x310 [ 2291.962238] create_object.isra.0+0x3a/0xa20 [ 2291.963130] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2291.964172] kmem_cache_alloc+0x159/0x310 [ 2291.965029] getname_flags.part.0+0x50/0x4f0 [ 2291.965943] ? _copy_from_user+0xfb/0x1b0 [ 2291.966794] user_path_at_empty+0xa1/0x100 [ 2291.967664] __x64_sys_mount+0x1e9/0x300 [ 2291.968493] ? copy_mnt_ns+0xa00/0xa00 [ 2291.969323] do_syscall_64+0x33/0x40 [ 2291.970090] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2291.971120] RIP: 0033:0x7f2cab73ab19 [ 2291.971880] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2291.975572] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2291.977110] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2291.978555] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2291.980001] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2291.981445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2291.982894] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:33:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}]}}) 17:33:42 executing program 0: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) r1 = pidfd_open(0x0, 0x0) r2 = dup(r1) mq_notify(r2, 0x0) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r2, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:33:42 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:33:42 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpgrp(0x0) r1 = pidfd_open(0x0, 0x0) r2 = dup(r1) mq_notify(r2, 0x0) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r2, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:33:42 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 9) 17:33:42 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}]}}) 17:33:42 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000003f02000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:33:42 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = dup(0xffffffffffffffff) mq_notify(r2, 0x0) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r2, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) [ 2292.224110] FAULT_INJECTION: forcing a failure. [ 2292.224110] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2292.226974] CPU: 0 PID: 17072 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2292.228494] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2292.230332] Call Trace: [ 2292.230929] dump_stack+0x107/0x167 [ 2292.231745] should_fail.cold+0x5/0xa [ 2292.232606] strncpy_from_user+0x34/0x470 [ 2292.233537] getname_flags.part.0+0x95/0x4f0 [ 2292.234512] ? _copy_from_user+0xfb/0x1b0 [ 2292.235440] user_path_at_empty+0xa1/0x100 [ 2292.236394] __x64_sys_mount+0x1e9/0x300 [ 2292.237300] ? copy_mnt_ns+0xa00/0xa00 [ 2292.238215] do_syscall_64+0x33/0x40 [ 2292.239047] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2292.240181] RIP: 0033:0x7fcacacb3b19 [ 2292.241019] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2292.245099] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2292.246827] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2292.248422] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2292.250044] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2292.251652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2292.253246] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 [ 2305.533143] 9pnet: Insufficient options for proto=fd 17:33:55 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 9) 17:33:55 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 9) 17:33:55 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 10) 17:33:55 executing program 0: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='setgroups\x00') perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x9, 0x1, 0x81, 0x2, 0x0, 0x47b, 0x10000, 0x8, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_bp={&(0x7f0000000100), 0x4}, 0x500, 0x8, 0x730, 0x7, 0x6, 0x7, 0x9, 0x0, 0x4, 0x0, 0x7}, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x0) readv(r1, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) r4 = syz_open_dev$vcsn(&(0x7f00000002c0), 0x101, 0x680000) readv(r4, &(0x7f0000000440)=[{&(0x7f0000000340)=""/199, 0xc7}, {&(0x7f0000000500)=""/4096, 0x1000}], 0x2) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@cache_none}], [{@smackfsfloor={'smackfsfloor', 0x3d, ':'}}]}}) fcntl$getown(0xffffffffffffffff, 0x9) r5 = fsmount(r3, 0x0, 0x70) copy_file_range(r5, &(0x7f0000000000)=0x6, r0, &(0x7f0000000080), 0x911e, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) dup(r7) dup2(r7, r2) 17:33:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006b02000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:33:55 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = dup(0xffffffffffffffff) mq_notify(r2, 0x0) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r2, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:33:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}]}}) 17:33:55 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(0x0, 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) [ 2305.545520] 9pnet: Insufficient options for proto=fd [ 2305.546711] FAULT_INJECTION: forcing a failure. [ 2305.546711] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2305.549863] CPU: 0 PID: 17146 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2305.551501] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2305.553290] Call Trace: [ 2305.553875] dump_stack+0x107/0x167 [ 2305.554706] should_fail.cold+0x5/0xa [ 2305.555552] strncpy_from_user+0x34/0x470 [ 2305.556469] getname_flags.part.0+0x95/0x4f0 [ 2305.557425] ? _copy_from_user+0xfb/0x1b0 [ 2305.558348] user_path_at_empty+0xa1/0x100 [ 2305.559289] __x64_sys_mount+0x1e9/0x300 [ 2305.560175] ? copy_mnt_ns+0xa00/0xa00 [ 2305.561055] do_syscall_64+0x33/0x40 [ 2305.561868] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2305.562994] RIP: 0033:0x7f3da67ebb19 [ 2305.563803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2305.567752] RSP: 002b:00007f3da3d61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2305.569395] RAX: ffffffffffffffda RBX: 00007f3da68fef60 RCX: 00007f3da67ebb19 [ 2305.570937] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2305.572471] RBP: 00007f3da3d611d0 R08: 0000000020000280 R09: 0000000000000000 [ 2305.574024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2305.575558] R13: 00007ffdf73094ff R14: 00007f3da3d61300 R15: 0000000000022000 [ 2305.585567] FAULT_INJECTION: forcing a failure. [ 2305.585567] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2305.588176] CPU: 0 PID: 17147 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2305.589670] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2305.591462] Call Trace: [ 2305.592046] dump_stack+0x107/0x167 [ 2305.592849] should_fail.cold+0x5/0xa [ 2305.593689] strncpy_from_user+0x34/0x470 [ 2305.594634] getname_flags.part.0+0x95/0x4f0 [ 2305.595590] ? _copy_from_user+0xfb/0x1b0 [ 2305.596501] user_path_at_empty+0xa1/0x100 [ 2305.597435] __x64_sys_mount+0x1e9/0x300 [ 2305.598324] ? copy_mnt_ns+0xa00/0xa00 [ 2305.599200] do_syscall_64+0x33/0x40 [ 2305.599646] FAULT_INJECTION: forcing a failure. [ 2305.599646] name failslab, interval 1, probability 0, space 0, times 0 [ 2305.600007] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2305.600025] RIP: 0033:0x7f2cab73ab19 [ 2305.603129] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2305.607069] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2305.608724] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2305.610274] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2305.611810] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2305.613348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2305.614883] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 [ 2305.616468] CPU: 1 PID: 17157 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2305.617227] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2305.618130] Call Trace: [ 2305.618425] dump_stack+0x107/0x167 [ 2305.618825] should_fail.cold+0x5/0xa [ 2305.619237] ? alloc_fs_context+0x57/0x840 [ 2305.619694] should_failslab+0x5/0x20 [ 2305.620107] kmem_cache_alloc_trace+0x55/0x320 [ 2305.620603] alloc_fs_context+0x57/0x840 [ 2305.621063] path_mount+0xa72/0x20b0 [ 2305.621484] ? strncpy_from_user+0x9e/0x470 [ 2305.621966] ? finish_automount+0xa90/0xa90 [ 2305.622428] ? getname_flags.part.0+0x1dd/0x4f0 [ 2305.622924] ? _copy_from_user+0xfb/0x1b0 [ 2305.623379] __x64_sys_mount+0x282/0x300 [ 2305.623816] ? copy_mnt_ns+0xa00/0xa00 17:33:55 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@obj_type}]}}) 17:33:55 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x4, 0x0, 0xff, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb7, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000400)={0x28, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x14, 0x3d, 0x0, 0x1, [@typed={0x4}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x28}, 0x1, 0x0, 0x0, 0xa0}, 0x0) r1 = syz_io_uring_setup(0x21, &(0x7f0000000340)={0x0, 0xad03, 0x2, 0x3}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) io_uring_enter(0xffffffffffffffff, 0x76d3, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r4 = dup2(r3, r2) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) dup2(r5, r4) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x2b, &(0x7f0000000700)=ANY=[@ANYBLOB="00000400000000003dda8d5c787e6876a95223d985f0e382e72428100d6d5997ad50b6087bc9137ea00ac7d99c0157005b43e30a7a8be8b4d8adc234b69d6acfd40773fd5387d42dab52b4a9aa629e9f9b4ffbfa6a345950d6db1d98077d515d01c6d66c4166695cceb0a41465afea19055d2fecef4223ae1a11670452c2d252598c826c78cfd710276a35c15553fb77b57627399bd8c23f4a7ee7e6d721b01b18d8d036629c96a7d110b3858021acf34077ff181bbacc2f3897594cb3e097ba28ac991562ffdcd5942faf85940bd9754bf19c03e937bd646c2cbc23cb4622496b58c9354d29fd4ac61ea180"], 0x20000148) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wlan0\x00'}) r6 = openat$cgroup_freezer_state(r4, &(0x7f0000000240), 0x2, 0x0) write$binfmt_elf64(r6, &(0x7f0000000800)={{0x7f, 0x45, 0x4c, 0x46, 0x2, 0x8, 0x1, 0x1, 0x4d7, 0x3, 0x48f94585a9a3255f, 0x800, 0x20, 0x40, 0x1ad, 0x8, 0x1ff, 0x38, 0x2, 0x1, 0xc51, 0x5}, [{0x2, 0x6, 0xcb, 0x7, 0xffffffff, 0x95, 0xac82, 0x1}], "75d00eb34e414d1a19c70af064c044c9b882b4594111c8d13ce9b214a3fc45bb10fc087fb9cfd8b67848b6c6c4bd658244f94369a6334b93cb87c8cf46c9f4f8ebfddff695ad2fd90039021e86af6e0b5c8583", ['\x00', '\x00', '\x00', '\x00']}, 0x4cb) read(0xffffffffffffffff, &(0x7f0000000140)=""/205, 0xcd) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x24, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}, @typed={0x8, 0x7, 0x0, 0x0, @uid=0xee01}]}, 0x24}, 0x1, 0x0, 0x0, 0x8000}, 0x0) syncfs(0xffffffffffffffff) [ 2305.624502] do_syscall_64+0x33/0x40 [ 2305.624970] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2305.625524] RIP: 0033:0x7fcacacb3b19 [ 2305.625930] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2305.627886] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2305.628696] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2305.629453] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2305.630227] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2305.630991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2305.631751] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 17:33:55 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 10) [ 2305.655578] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2305.666081] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2305.682153] FAULT_INJECTION: forcing a failure. [ 2305.682153] name failslab, interval 1, probability 0, space 0, times 0 [ 2305.683514] CPU: 1 PID: 17193 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2305.684257] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2305.685148] Call Trace: [ 2305.685445] dump_stack+0x107/0x167 17:33:55 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000048002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2305.685846] should_fail.cold+0x5/0xa [ 2305.686468] ? alloc_fs_context+0x57/0x840 [ 2305.686926] should_failslab+0x5/0x20 [ 2305.687345] kmem_cache_alloc_trace+0x55/0x320 [ 2305.687833] alloc_fs_context+0x57/0x840 [ 2305.688287] path_mount+0xa72/0x20b0 [ 2305.688691] ? strncpy_from_user+0x9e/0x470 [ 2305.689165] ? finish_automount+0xa90/0xa90 [ 2305.689630] ? getname_flags.part.0+0x1dd/0x4f0 [ 2305.690140] ? _copy_from_user+0xfb/0x1b0 [ 2305.690604] __x64_sys_mount+0x282/0x300 [ 2305.691042] ? copy_mnt_ns+0xa00/0xa00 [ 2305.691475] do_syscall_64+0x33/0x40 [ 2305.691876] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2305.692425] RIP: 0033:0x7f3da67ebb19 [ 2305.692828] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2305.694797] RSP: 002b:00007f3da3d61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2305.695606] RAX: ffffffffffffffda RBX: 00007f3da68fef60 RCX: 00007f3da67ebb19 [ 2305.696351] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2305.697109] RBP: 00007f3da3d611d0 R08: 0000000020000280 R09: 0000000000000000 [ 2305.697875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2305.698642] R13: 00007ffdf73094ff R14: 00007f3da3d61300 R15: 0000000000022000 17:33:55 executing program 0: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0xffffffffffffffff) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 17:33:56 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 11) 17:33:56 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 11) 17:33:56 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = dup(0xffffffffffffffff) mq_notify(r2, 0x0) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r2, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) [ 2305.803350] FAULT_INJECTION: forcing a failure. [ 2305.803350] name failslab, interval 1, probability 0, space 0, times 0 [ 2305.804747] CPU: 1 PID: 17259 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2305.805499] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2305.806400] Call Trace: [ 2305.806691] dump_stack+0x107/0x167 [ 2305.807098] should_fail.cold+0x5/0xa [ 2305.807517] ? create_object.isra.0+0x3a/0xa20 [ 2305.808018] should_failslab+0x5/0x20 [ 2305.808434] kmem_cache_alloc+0x5b/0x310 [ 2305.808878] create_object.isra.0+0x3a/0xa20 [ 2305.809354] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2305.809902] kmem_cache_alloc_trace+0x151/0x320 [ 2305.810447] alloc_fs_context+0x57/0x840 [ 2305.810910] path_mount+0xa72/0x20b0 [ 2305.811314] ? strncpy_from_user+0x9e/0x470 [ 2305.811794] ? finish_automount+0xa90/0xa90 [ 2305.812256] ? getname_flags.part.0+0x1dd/0x4f0 [ 2305.812749] ? _copy_from_user+0xfb/0x1b0 [ 2305.813207] __x64_sys_mount+0x282/0x300 [ 2305.813641] ? copy_mnt_ns+0xa00/0xa00 [ 2305.814086] do_syscall_64+0x33/0x40 [ 2305.814492] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2305.815039] RIP: 0033:0x7f3da67ebb19 [ 2305.815445] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2305.817380] RSP: 002b:00007f3da3d61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2305.818199] RAX: ffffffffffffffda RBX: 00007f3da68fef60 RCX: 00007f3da67ebb19 [ 2305.818956] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2305.819712] RBP: 00007f3da3d611d0 R08: 0000000020000280 R09: 0000000000000000 [ 2305.820469] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2305.821253] R13: 00007ffdf73094ff R14: 00007f3da3d61300 R15: 0000000000022000 [ 2305.845264] FAULT_INJECTION: forcing a failure. [ 2305.845264] name failslab, interval 1, probability 0, space 0, times 0 [ 2305.847923] CPU: 0 PID: 17269 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2305.849369] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2305.851097] Call Trace: [ 2305.851651] dump_stack+0x107/0x167 [ 2305.852436] should_fail.cold+0x5/0xa [ 2305.853243] ? create_object.isra.0+0x3a/0xa20 [ 2305.854232] should_failslab+0x5/0x20 [ 2305.855016] kmem_cache_alloc+0x5b/0x310 [ 2305.855881] create_object.isra.0+0x3a/0xa20 [ 2305.856817] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2305.857887] kmem_cache_alloc_trace+0x151/0x320 [ 2305.858883] alloc_fs_context+0x57/0x840 [ 2305.859758] path_mount+0xa72/0x20b0 [ 2305.860571] ? strncpy_from_user+0x9e/0x470 [ 2305.861469] ? finish_automount+0xa90/0xa90 [ 2305.862398] ? getname_flags.part.0+0x1dd/0x4f0 [ 2305.863358] ? _copy_from_user+0xfb/0x1b0 [ 2305.864260] __x64_sys_mount+0x282/0x300 [ 2305.865103] ? copy_mnt_ns+0xa00/0xa00 [ 2305.865950] do_syscall_64+0x33/0x40 [ 2305.866726] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2305.867791] RIP: 0033:0x7fcacacb3b19 [ 2305.868581] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2305.872401] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2305.873992] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2305.875469] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2305.876956] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2305.878444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2305.879922] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 17:34:13 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 10) 17:34:13 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 12) 17:34:13 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 12) [ 2322.932220] FAULT_INJECTION: forcing a failure. [ 2322.932220] name failslab, interval 1, probability 0, space 0, times 0 [ 2322.933543] CPU: 1 PID: 17311 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2322.934319] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2322.935281] Call Trace: [ 2322.935580] dump_stack+0x107/0x167 [ 2322.936005] should_fail.cold+0x5/0xa [ 2322.936455] ? alloc_fs_context+0x57/0x840 [ 2322.936959] should_failslab+0x5/0x20 [ 2322.937414] kmem_cache_alloc_trace+0x55/0x320 [ 2322.937964] alloc_fs_context+0x57/0x840 [ 2322.938465] path_mount+0xa72/0x20b0 17:34:13 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_IP_XFRM_POLICY(r4, 0x0, 0x11, &(0x7f00000014c0)={{{@in6=@mcast2, @in=@broadcast, 0x8, 0x0, 0x0, 0x0, 0x0, 0x20, 0x40, 0x11, 0x0, 0xee00}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, {}, 0x0, 0x4, 0x1}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x8, 0x0}, 0x0, 0x32}, 0x0, @in=@empty}}, 0xe8) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @local}, 0x10) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x6, &(0x7f00000002c0)={0x5, 0x0, &(0x7f0000000280)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r4, r0, 0xffffffffffffffff]}, 0x9) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000040)=[r3], 0x1) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f00000029c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002900)=""/158, 0x9e}, 0x0, 0x2203, 0x0, {0x1}}, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/kexec_crash_size', 0x22902, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r6, &(0x7f0000000180)=@hci, &(0x7f0000000240)=0x80) copy_file_range(r5, 0x0, r5, &(0x7f00000000c0)=0x6, 0x6, 0x0) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/ata_device', 0x22902, 0x0) copy_file_range(r7, 0x0, r7, &(0x7f00000000c0)=0x6, 0x6, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 17:34:13 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000f002000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:34:13 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(0xffffffffffffffff, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:34:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@obj_type}]}}) 17:34:13 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(0x0, 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) [ 2322.938893] ? strncpy_from_user+0x9e/0x470 [ 2322.939540] ? finish_automount+0xa90/0xa90 [ 2322.940026] ? getname_flags.part.0+0x1dd/0x4f0 [ 2322.940542] ? _copy_from_user+0xfb/0x1b0 [ 2322.941004] __x64_sys_mount+0x282/0x300 [ 2322.941452] ? copy_mnt_ns+0xa00/0xa00 [ 2322.941891] do_syscall_64+0x33/0x40 [ 2322.942315] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2322.942878] RIP: 0033:0x7f2cab73ab19 [ 2322.943291] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2322.945348] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2322.946178] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2322.946955] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2322.947746] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2322.948496] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2322.949259] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 [ 2322.952475] FAULT_INJECTION: forcing a failure. [ 2322.952475] name failslab, interval 1, probability 0, space 0, times 0 [ 2322.953792] CPU: 1 PID: 17310 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2322.954539] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2322.955413] Call Trace: [ 2322.955708] dump_stack+0x107/0x167 [ 2322.956111] should_fail.cold+0x5/0xa [ 2322.956527] ? legacy_init_fs_context+0x44/0xe0 [ 2322.957023] should_failslab+0x5/0x20 [ 2322.957424] kmem_cache_alloc_trace+0x55/0x320 [ 2322.957916] ? lockdep_init_map_type+0x2c7/0x780 [ 2322.958435] legacy_init_fs_context+0x44/0xe0 [ 2322.958926] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2322.959464] alloc_fs_context+0x4fd/0x840 [ 2322.959927] path_mount+0xa72/0x20b0 [ 2322.960328] ? strncpy_from_user+0x9e/0x470 [ 2322.960804] ? finish_automount+0xa90/0xa90 [ 2322.961262] ? getname_flags.part.0+0x1dd/0x4f0 [ 2322.961755] ? _copy_from_user+0xfb/0x1b0 [ 2322.962230] __x64_sys_mount+0x282/0x300 [ 2322.962670] ? copy_mnt_ns+0xa00/0xa00 [ 2322.963107] do_syscall_64+0x33/0x40 [ 2322.963508] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2322.964049] RIP: 0033:0x7fcacacb3b19 [ 2322.964451] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2322.966434] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2322.967275] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2322.968069] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2322.968847] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2322.969630] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2322.970425] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 [ 2322.973603] FAULT_INJECTION: forcing a failure. [ 2322.973603] name failslab, interval 1, probability 0, space 0, times 0 [ 2322.976033] CPU: 0 PID: 17306 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2322.977505] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2322.979281] Call Trace: [ 2322.979857] dump_stack+0x107/0x167 [ 2322.980651] should_fail.cold+0x5/0xa [ 2322.981479] ? legacy_init_fs_context+0x44/0xe0 [ 2322.982500] should_failslab+0x5/0x20 [ 2322.983325] kmem_cache_alloc_trace+0x55/0x320 [ 2322.984302] ? lockdep_init_map_type+0x2c7/0x780 [ 2322.985334] legacy_init_fs_context+0x44/0xe0 [ 2322.986306] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2322.987380] alloc_fs_context+0x4fd/0x840 [ 2322.988293] path_mount+0xa72/0x20b0 [ 2322.989101] ? strncpy_from_user+0x9e/0x470 [ 2322.990029] ? finish_automount+0xa90/0xa90 [ 2322.990975] ? getname_flags.part.0+0x1dd/0x4f0 [ 2322.991967] ? _copy_from_user+0xfb/0x1b0 [ 2322.992883] __x64_sys_mount+0x282/0x300 [ 2322.993757] ? copy_mnt_ns+0xa00/0xa00 [ 2322.994638] do_syscall_64+0x33/0x40 [ 2322.995439] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2322.996531] RIP: 0033:0x7f3da67ebb19 [ 2322.997327] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2323.001213] RSP: 002b:00007f3da3d61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2323.002860] RAX: ffffffffffffffda RBX: 00007f3da68fef60 RCX: 00007f3da67ebb19 [ 2323.004379] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2323.005892] RBP: 00007f3da3d611d0 R08: 0000000020000280 R09: 0000000000000000 [ 2323.007450] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2323.008991] R13: 00007ffdf73094ff R14: 00007f3da3d61300 R15: 0000000000022000 17:34:29 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(0x0, 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:34:29 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x402002, 0x0) ioctl$EVIOCSABS20(r0, 0x401845e0, &(0x7f0000000080)={0x5, 0x4, 0x3, 0xc46, 0x4, 0x9}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)={0x14, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}}, 0x14}}, 0x0) 17:34:29 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 11) 17:34:29 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 13) 17:34:29 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 13) 17:34:29 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000202000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:34:29 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@obj_type}]}}) 17:34:29 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(0xffffffffffffffff, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) [ 2339.491222] FAULT_INJECTION: forcing a failure. [ 2339.491222] name failslab, interval 1, probability 0, space 0, times 0 [ 2339.492517] CPU: 1 PID: 17437 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2339.493370] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2339.494287] Call Trace: [ 2339.494589] dump_stack+0x107/0x167 [ 2339.494986] should_fail.cold+0x5/0xa [ 2339.495405] ? create_object.isra.0+0x3a/0xa20 [ 2339.495912] should_failslab+0x5/0x20 [ 2339.496345] kmem_cache_alloc+0x5b/0x310 [ 2339.496799] create_object.isra.0+0x3a/0xa20 [ 2339.497268] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2339.497833] kmem_cache_alloc_trace+0x151/0x320 [ 2339.498370] alloc_fs_context+0x57/0x840 [ 2339.498830] path_mount+0xa72/0x20b0 [ 2339.499246] ? strncpy_from_user+0x9e/0x470 [ 2339.499724] ? finish_automount+0xa90/0xa90 [ 2339.500206] ? getname_flags.part.0+0x1dd/0x4f0 [ 2339.500725] ? _copy_from_user+0xfb/0x1b0 [ 2339.501202] __x64_sys_mount+0x282/0x300 [ 2339.501653] ? copy_mnt_ns+0xa00/0xa00 [ 2339.502093] do_syscall_64+0x33/0x40 [ 2339.502513] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2339.503059] RIP: 0033:0x7f2cab73ab19 [ 2339.503470] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2339.505486] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2339.506209] FAULT_INJECTION: forcing a failure. [ 2339.506209] name failslab, interval 1, probability 0, space 0, times 0 [ 2339.506317] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2339.506336] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2339.510321] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2339.511108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2339.511891] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 [ 2339.512698] CPU: 0 PID: 17433 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2339.514189] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2339.516023] Call Trace: [ 2339.516626] dump_stack+0x107/0x167 [ 2339.517458] should_fail.cold+0x5/0xa [ 2339.518304] ? create_object.isra.0+0x3a/0xa20 [ 2339.519322] should_failslab+0x5/0x20 [ 2339.520172] kmem_cache_alloc+0x5b/0x310 [ 2339.521064] create_object.isra.0+0x3a/0xa20 [ 2339.522021] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2339.523137] kmem_cache_alloc_trace+0x151/0x320 [ 2339.524135] ? lockdep_init_map_type+0x2c7/0x780 [ 2339.525177] legacy_init_fs_context+0x44/0xe0 [ 2339.526147] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2339.527240] alloc_fs_context+0x4fd/0x840 [ 2339.528158] path_mount+0xa72/0x20b0 [ 2339.528976] ? strncpy_from_user+0x9e/0x470 [ 2339.529937] ? finish_automount+0xa90/0xa90 [ 2339.530899] ? getname_flags.part.0+0x1dd/0x4f0 [ 2339.531896] ? _copy_from_user+0xfb/0x1b0 [ 2339.532812] __x64_sys_mount+0x282/0x300 [ 2339.533697] ? copy_mnt_ns+0xa00/0xa00 [ 2339.534591] do_syscall_64+0x33/0x40 [ 2339.535423] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2339.536525] RIP: 0033:0x7fcacacb3b19 [ 2339.537341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2339.541283] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2339.542931] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2339.544486] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2339.546077] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2339.547610] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2339.549142] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 17:34:29 executing program 0: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x2, 0x0, 0x1, 0x800, 0x3, 0x3, 0x7fff, 0x1f6, 0x40, 0x1f9, 0x800, 0xfff6, 0x38, 0x2, 0x7f4, 0x7, 0xfff7}, [{0x1, 0x6, 0x0, 0x9, 0x3, 0xfff, 0x3, 0x5}, {0x564e97fe, 0x7, 0x1, 0x34958d3, 0x7, 0x20, 0x400, 0xfffffffffffff6cb}], "f10f63de1f3d948b107eb96a6f4c8e3ffa286f5782ef95f4ec6b3e0c413cdcca884b61a6e0f2821e4c39544f6b53d8095a7b4caa477c7e3b52daac27d220eef6a53f7aab9d7f0558ca199d240611e11356aa0b6f39eb7844d33291531568b762df32b9031f68c46866825dca923264dbed04457bf73d262671fe0bf9cf6125bfd8fd275b3ae523ba722aac4cde4fab9fc9f81b76da270651052db4d4a751828da07909e79cba87811383cbc61585ccd783bba921bbbe1c4c625e2bcfa45e236a439062b8ac1d589294dd088575175988f1e3315c579dbc56428f4fb03b09e530c2792c784ca584442f0bcc9ce926bab0a287cc9c9652", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x6a6) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10007}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @empty}, 0x1c) dup2(r0, r1) [ 2339.569501] FAULT_INJECTION: forcing a failure. [ 2339.569501] name failslab, interval 1, probability 0, space 0, times 0 [ 2339.572023] CPU: 0 PID: 17432 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2339.573542] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2339.575365] Call Trace: [ 2339.575936] dump_stack+0x107/0x167 [ 2339.576720] should_fail.cold+0x5/0xa [ 2339.577538] ? create_object.isra.0+0x3a/0xa20 [ 2339.578579] should_failslab+0x5/0x20 [ 2339.579391] kmem_cache_alloc+0x5b/0x310 [ 2339.580316] create_object.isra.0+0x3a/0xa20 [ 2339.581284] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2339.582430] kmem_cache_alloc_trace+0x151/0x320 [ 2339.583384] ? lockdep_init_map_type+0x2c7/0x780 [ 2339.584392] legacy_init_fs_context+0x44/0xe0 [ 2339.585310] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2339.586330] alloc_fs_context+0x4fd/0x840 [ 2339.587238] path_mount+0xa72/0x20b0 [ 2339.588028] ? strncpy_from_user+0x9e/0x470 [ 2339.588928] ? finish_automount+0xa90/0xa90 [ 2339.589822] ? getname_flags.part.0+0x1dd/0x4f0 [ 2339.590783] ? _copy_from_user+0xfb/0x1b0 [ 2339.591655] __x64_sys_mount+0x282/0x300 [ 2339.592490] ? copy_mnt_ns+0xa00/0xa00 [ 2339.593330] do_syscall_64+0x33/0x40 [ 2339.594095] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2339.595147] RIP: 0033:0x7f3da67ebb19 [ 2339.595916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2339.599748] RSP: 002b:00007f3da3d61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2339.601344] RAX: ffffffffffffffda RBX: 00007f3da68fef60 RCX: 00007f3da67ebb19 [ 2339.602821] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2339.604266] RBP: 00007f3da3d611d0 R08: 0000000020000280 R09: 0000000000000000 [ 2339.605713] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2339.607192] R13: 00007ffdf73094ff R14: 00007f3da3d61300 R15: 0000000000022000 17:34:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000302000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:34:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:34:46 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 14) 17:34:46 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(0xffffffffffffffff, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = dup(r5) mq_notify(r6, 0x0) r7 = getpgrp(0x0) r8 = pidfd_open(r7, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r6}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r9}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r10 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r10, 0x0, 0x100000001) 17:34:46 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:34:46 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 14) 17:34:46 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 12) [ 2356.172366] FAULT_INJECTION: forcing a failure. [ 2356.172366] name failslab, interval 1, probability 0, space 0, times 0 [ 2356.174261] CPU: 1 PID: 17554 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2356.175397] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2356.176738] Call Trace: [ 2356.177181] dump_stack+0x107/0x167 [ 2356.177776] should_fail.cold+0x5/0xa [ 2356.178418] should_failslab+0x5/0x20 [ 2356.179051] __kmalloc_track_caller+0x79/0x370 [ 2356.179800] ? selinux_sb_eat_lsm_opts+0x34e/0x790 [ 2356.180598] ? memcg_slab_post_alloc_hook+0x17a/0x430 [ 2356.181446] kmemdup_nul+0x2d/0xa0 [ 2356.182027] selinux_sb_eat_lsm_opts+0x34e/0x790 [ 2356.182838] security_sb_eat_lsm_opts+0x4e/0xb0 [ 2356.183590] legacy_parse_monolithic+0x132/0x180 [ 2356.184369] path_mount+0x1376/0x20b0 [ 2356.185015] ? strncpy_from_user+0x9e/0x470 [ 2356.185734] ? finish_automount+0xa90/0xa90 [ 2356.186457] ? getname_flags.part.0+0x1dd/0x4f0 [ 2356.187247] ? _copy_from_user+0xfb/0x1b0 [ 2356.187974] __x64_sys_mount+0x282/0x300 [ 2356.188644] ? copy_mnt_ns+0xa00/0xa00 [ 2356.189320] do_syscall_64+0x33/0x40 [ 2356.189952] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2356.190811] RIP: 0033:0x7fcacacb3b19 [ 2356.191410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2356.194444] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2356.195719] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2356.196898] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 17:34:46 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x301000, 0x40) umount2(&(0x7f0000000080)='./file0\x00', 0xb) [ 2356.198039] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2356.199330] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2356.200540] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 [ 2356.228507] FAULT_INJECTION: forcing a failure. [ 2356.228507] name failslab, interval 1, probability 0, space 0, times 0 [ 2356.230376] CPU: 1 PID: 17569 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2356.231567] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2356.232891] FAULT_INJECTION: forcing a failure. [ 2356.232891] name failslab, interval 1, probability 0, space 0, times 0 [ 2356.232953] Call Trace: [ 2356.232982] dump_stack+0x107/0x167 [ 2356.236390] should_fail.cold+0x5/0xa [ 2356.236994] should_failslab+0x5/0x20 [ 2356.237579] __kmalloc_track_caller+0x79/0x370 [ 2356.238270] ? selinux_sb_eat_lsm_opts+0x34e/0x790 [ 2356.239052] ? memcg_slab_post_alloc_hook+0x17a/0x430 [ 2356.239841] kmemdup_nul+0x2d/0xa0 [ 2356.240401] selinux_sb_eat_lsm_opts+0x34e/0x790 [ 2356.241163] security_sb_eat_lsm_opts+0x4e/0xb0 [ 2356.241890] legacy_parse_monolithic+0x132/0x180 [ 2356.242625] path_mount+0x1376/0x20b0 [ 2356.243258] ? strncpy_from_user+0x9e/0x470 [ 2356.243923] ? finish_automount+0xa90/0xa90 [ 2356.244592] ? getname_flags.part.0+0x1dd/0x4f0 [ 2356.245299] ? _copy_from_user+0xfb/0x1b0 [ 2356.245970] __x64_sys_mount+0x282/0x300 [ 2356.246638] ? copy_mnt_ns+0xa00/0xa00 [ 2356.247252] do_syscall_64+0x33/0x40 [ 2356.247840] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2356.248615] RIP: 0033:0x7f3da67ebb19 [ 2356.249181] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2356.251981] RSP: 002b:00007f3da3d61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2356.253135] RAX: ffffffffffffffda RBX: 00007f3da68fef60 RCX: 00007f3da67ebb19 [ 2356.254214] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2356.255340] RBP: 00007f3da3d611d0 R08: 0000000020000280 R09: 0000000000000000 [ 2356.256407] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2356.257478] R13: 00007ffdf73094ff R14: 00007f3da3d61300 R15: 0000000000022000 [ 2356.258594] CPU: 0 PID: 17564 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2356.260107] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2356.261923] Call Trace: [ 2356.262510] dump_stack+0x107/0x167 [ 2356.263334] should_fail.cold+0x5/0xa [ 2356.264192] ? legacy_init_fs_context+0x44/0xe0 [ 2356.265233] should_failslab+0x5/0x20 [ 2356.266071] kmem_cache_alloc_trace+0x55/0x320 [ 2356.267075] ? lockdep_init_map_type+0x2c7/0x780 [ 2356.268147] legacy_init_fs_context+0x44/0xe0 [ 2356.269132] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2356.270224] alloc_fs_context+0x4fd/0x840 [ 2356.271207] path_mount+0xa72/0x20b0 [ 2356.272018] ? strncpy_from_user+0x9e/0x470 [ 2356.272954] ? finish_automount+0xa90/0xa90 [ 2356.273871] ? getname_flags.part.0+0x1dd/0x4f0 [ 2356.274888] ? _copy_from_user+0xfb/0x1b0 [ 2356.275807] __x64_sys_mount+0x282/0x300 [ 2356.276703] ? copy_mnt_ns+0xa00/0xa00 [ 2356.277564] do_syscall_64+0x33/0x40 [ 2356.278359] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2356.279496] RIP: 0033:0x7f2cab73ab19 [ 2356.280294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2356.284202] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2356.285833] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2356.287359] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2356.288904] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2356.290445] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2356.291998] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:34:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000402000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:34:46 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 15) [ 2356.380514] FAULT_INJECTION: forcing a failure. [ 2356.380514] name failslab, interval 1, probability 0, space 0, times 0 [ 2356.382210] CPU: 1 PID: 17586 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2356.383203] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2356.384375] Call Trace: [ 2356.384764] dump_stack+0x107/0x167 [ 2356.385289] should_fail.cold+0x5/0xa [ 2356.385846] ? create_object.isra.0+0x3a/0xa20 [ 2356.386496] should_failslab+0x5/0x20 [ 2356.387056] kmem_cache_alloc+0x5b/0x310 [ 2356.387638] create_object.isra.0+0x3a/0xa20 [ 2356.388262] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2356.388983] __kmalloc_track_caller+0x177/0x370 [ 2356.389642] ? selinux_sb_eat_lsm_opts+0x34e/0x790 [ 2356.390332] ? memcg_slab_post_alloc_hook+0x17a/0x430 [ 2356.391085] kmemdup_nul+0x2d/0xa0 [ 2356.391601] selinux_sb_eat_lsm_opts+0x34e/0x790 [ 2356.392285] security_sb_eat_lsm_opts+0x4e/0xb0 [ 2356.392955] legacy_parse_monolithic+0x132/0x180 [ 2356.393643] path_mount+0x1376/0x20b0 [ 2356.394195] ? strncpy_from_user+0x9e/0x470 [ 2356.394822] ? finish_automount+0xa90/0xa90 [ 2356.395435] ? getname_flags.part.0+0x1dd/0x4f0 [ 2356.396093] ? _copy_from_user+0xfb/0x1b0 [ 2356.396696] __x64_sys_mount+0x282/0x300 [ 2356.397277] ? copy_mnt_ns+0xa00/0xa00 [ 2356.397848] do_syscall_64+0x33/0x40 [ 2356.398385] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2356.399116] RIP: 0033:0x7fcacacb3b19 [ 2356.399639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2356.402197] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2356.403274] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2356.404268] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2356.405265] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2356.406254] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2356.407260] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 17:34:46 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:34:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x5c, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/fib_triestat\x00') fcntl$F_SET_RW_HINT(0xffffffffffffffff, 0x40c, &(0x7f0000000100)=0x2) preadv(r0, &(0x7f0000002400)=[{&(0x7f0000000440)=""/213, 0xd5}], 0x1, 0x0, 0x0) openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x200000, 0x0) 17:34:46 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 15) 17:34:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000502000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:34:46 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 13) [ 2356.557324] FAULT_INJECTION: forcing a failure. [ 2356.557324] name failslab, interval 1, probability 0, space 0, times 0 [ 2356.560053] CPU: 0 PID: 17677 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2356.561624] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2356.563491] Call Trace: [ 2356.564103] dump_stack+0x107/0x167 [ 2356.564943] should_fail.cold+0x5/0xa [ 2356.565814] ? create_object.isra.0+0x3a/0xa20 [ 2356.566870] should_failslab+0x5/0x20 [ 2356.567731] kmem_cache_alloc+0x5b/0x310 [ 2356.568672] create_object.isra.0+0x3a/0xa20 [ 2356.569630] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2356.570790] __kmalloc_track_caller+0x177/0x370 [ 2356.571803] ? selinux_sb_eat_lsm_opts+0x34e/0x790 [ 2356.572886] ? memcg_slab_post_alloc_hook+0x17a/0x430 [ 2356.574014] kmemdup_nul+0x2d/0xa0 [ 2356.574812] selinux_sb_eat_lsm_opts+0x34e/0x790 [ 2356.575864] security_sb_eat_lsm_opts+0x4e/0xb0 [ 2356.576892] legacy_parse_monolithic+0x132/0x180 [ 2356.577911] path_mount+0x1376/0x20b0 [ 2356.578752] ? strncpy_from_user+0x9e/0x470 [ 2356.579682] ? finish_automount+0xa90/0xa90 [ 2356.580638] ? getname_flags.part.0+0x1dd/0x4f0 [ 2356.581642] ? _copy_from_user+0xfb/0x1b0 [ 2356.582567] __x64_sys_mount+0x282/0x300 [ 2356.583473] ? copy_mnt_ns+0xa00/0xa00 [ 2356.584347] do_syscall_64+0x33/0x40 [ 2356.585158] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2356.586257] RIP: 0033:0x7f3da67ebb19 [ 2356.587084] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2356.590975] RSP: 002b:00007f3da3d61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2356.592591] RAX: ffffffffffffffda RBX: 00007f3da68fef60 RCX: 00007f3da67ebb19 [ 2356.594096] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2356.595613] RBP: 00007f3da3d611d0 R08: 0000000020000280 R09: 0000000000000000 [ 2356.597185] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2356.598780] R13: 00007ffdf73094ff R14: 00007f3da3d61300 R15: 0000000000022000 17:34:46 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:34:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000602000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:34:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:34:46 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 16) [ 2356.644235] FAULT_INJECTION: forcing a failure. [ 2356.644235] name failslab, interval 1, probability 0, space 0, times 0 [ 2356.645521] CPU: 1 PID: 17693 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2356.646296] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2356.647239] Call Trace: [ 2356.647548] dump_stack+0x107/0x167 [ 2356.647956] should_fail.cold+0x5/0xa [ 2356.648388] ? create_object.isra.0+0x3a/0xa20 [ 2356.648900] should_failslab+0x5/0x20 [ 2356.649322] kmem_cache_alloc+0x5b/0x310 [ 2356.649776] create_object.isra.0+0x3a/0xa20 [ 2356.650260] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2356.650845] kmem_cache_alloc_trace+0x151/0x320 [ 2356.651372] ? lockdep_init_map_type+0x2c7/0x780 [ 2356.651905] legacy_init_fs_context+0x44/0xe0 [ 2356.652399] ? generic_parse_monolithic+0x1f0/0x1f0 [ 2356.652952] alloc_fs_context+0x4fd/0x840 [ 2356.653415] path_mount+0xa72/0x20b0 [ 2356.653836] ? strncpy_from_user+0x9e/0x470 [ 2356.654319] ? finish_automount+0xa90/0xa90 [ 2356.654821] ? getname_flags.part.0+0x1dd/0x4f0 [ 2356.655359] ? _copy_from_user+0xfb/0x1b0 [ 2356.655845] __x64_sys_mount+0x282/0x300 [ 2356.656316] ? copy_mnt_ns+0xa00/0xa00 [ 2356.656770] do_syscall_64+0x33/0x40 [ 2356.657209] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2356.657805] RIP: 0033:0x7f2cab73ab19 [ 2356.658237] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2356.660360] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2356.661236] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2356.662058] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2356.662872] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2356.663684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2356.664507] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:34:46 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2356.671563] FAULT_INJECTION: forcing a failure. [ 2356.671563] name failslab, interval 1, probability 0, space 0, times 0 [ 2356.672885] CPU: 1 PID: 17699 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2356.673676] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2356.674623] Call Trace: [ 2356.674938] dump_stack+0x107/0x167 [ 2356.675367] should_fail.cold+0x5/0xa [ 2356.675799] ? selinux_add_opt+0x256/0x360 [ 2356.676286] should_failslab+0x5/0x20 [ 2356.676725] kmem_cache_alloc_trace+0x55/0x320 [ 2356.677249] ? __kmalloc_track_caller+0x2c6/0x370 [ 2356.677799] ? selinux_sb_eat_lsm_opts+0x34e/0x790 [ 2356.678375] selinux_add_opt+0x256/0x360 [ 2356.678862] selinux_sb_eat_lsm_opts+0x374/0x790 [ 2356.679388] security_sb_eat_lsm_opts+0x4e/0xb0 [ 2356.679931] legacy_parse_monolithic+0x132/0x180 [ 2356.680420] path_mount+0x1376/0x20b0 [ 2356.680865] ? strncpy_from_user+0x9e/0x470 [ 2356.681358] ? finish_automount+0xa90/0xa90 [ 2356.681960] ? getname_flags.part.0+0x1dd/0x4f0 [ 2356.682584] ? _copy_from_user+0xfb/0x1b0 [ 2356.683152] __x64_sys_mount+0x282/0x300 [ 2356.683699] ? copy_mnt_ns+0xa00/0xa00 [ 2356.684230] do_syscall_64+0x33/0x40 [ 2356.684729] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2356.685401] RIP: 0033:0x7fcacacb3b19 [ 2356.685785] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2356.688186] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2356.689186] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2356.690069] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2356.690798] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2356.691512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2356.692225] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 17:34:46 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000702000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:34:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000802000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:34:47 executing program 0: socket$nl_generic(0x10, 0x3, 0x10) setns(0xffffffffffffffff, 0x10000000) openat$zero(0xffffffffffffff9c, 0x0, 0x2a0000, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), 0xffffffffffffffff) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$inet6_icmp(0xa, 0x2, 0x3a) getsockopt$bt_hci(r1, 0x0, 0x3, &(0x7f0000000500)=""/3, &(0x7f0000000540)=0x3) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000940)=ANY=[@ANYBLOB="34000000100001000600000000000000000000000500000000000000150000809be149f832650000000000f30ad022cea3b5906ed71efbac71604114ae634a1d3f5b42332fdb1ddff6c996d594f336ad93897a4c7c7d052c951ff3b19a2ae8dfe7daae4433b91e5be24f079e43a9060d92c52788cb564c5127467341e4376c1319a3cb91e35718c602f3acaab637ceb7852dafdf71f385cfa97aa0b4888b849ea763a6372e3668ad38b4998b12b7f74f557998f5ab174fbc688112a84bc0"], 0x34}}, 0x0) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000016140), 0xffffffffffffffff) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_RINGS_SET(r3, &(0x7f0000016580)={0x0, 0x0, &(0x7f0000016540)={&(0x7f0000000040)={0x2c, r2, 0x1, 0x0, 0x0, {0xf}, [@ETHTOOL_A_RINGS_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}]}, 0x2c}}, 0x0) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x42040000}, 0xc, &(0x7f0000000080)={&(0x7f0000000640)=ANY=[@ANYBLOB="d8010000488410dc96a0598f5d82c3f4f3a057f9df25e6ee1792b660a83b88e31b4a7bb6a7e9355cda2276b230165c46242af8ebb03309a8d7c405c952b33338f37445a0c145723613845e8f8e040c7a4a4eed55a7792e4e4112e77e4b9ca5c77224efc0a9b384519ad1712c0e3c80c235f2ca43f64363a1157ef0b2ed8ffacfb869d0343ae7b6a5cd037638c61fb633d4", @ANYRES16=r2, @ANYBLOB="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"], 0x1d8}, 0x1, 0x0, 0x0, 0x24008090}, 0x4000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {0x4}, [@generic='\x00\x00\x00\x00\x00\x00']}, 0x1c}}, 0x20000000) sendmsg$ETHTOOL_MSG_EEE_SET(r3, &(0x7f0000000600)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000005c0)={&(0x7f0000001e00)={0x143c, r2, 0x20, 0x70bd26, 0x25dfdbfb, {}, [@ETHTOOL_A_EEE_MODES_OURS={0x12b8, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x89, 0x5, "0311060f163d6293e7c38c620a5f24e70d0644bae320d9b46261c24d8c3ae0fc9f1d6cef2a77b780881403bb40873fcfcf8903217aa17211d3a3c7f5fed9e35c37d0d890b69a3eb1f3e5f19bbe90029c3bc0d1b76fc0e021869abf76f48d317174900b212acd7c376f5af668d2b1f3e5819491dbc8bfc06fa95da18ada7082caccacab2510"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_BITS={0x90, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '--\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'wlan0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x23}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'wlan0\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffb}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7}]}, {0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x40}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffff801}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_MASK={0x33, 0x5, "6ecd99baedeb17d12e5b6f7728c881f956f23d12de97268ec653cfd230e47ff34918e2bbde6da43fb004c5bf9b6b60"}, @ETHTOOL_A_BITSET_BITS={0xec, 0x3, 0x0, 0x1, [{0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fff}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'wlan0\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '\'\xec):\x00'}]}, {0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '\\(\'(,\\}\xb6\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}]}, {0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7fffffff}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '.^!\x00'}]}, {0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, '*@}}:\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffc01}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_MASK={0x5f, 0x5, "26a5bc5fc0076feaaae8d9173997edffa1810a8bbf37f95a0a6cd5270facc0f038876713f1991077152425882e486847695d374c154d294710c9de6e1cd6fbd131fbc46c6c325d21f1ffb665e529f56578cbe6850bc0a71c76ddbe"}, @ETHTOOL_A_BITSET_VALUE={0x1004, 0x4, "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"}]}, @ETHTOOL_A_EEE_ENABLED={0x5}, @ETHTOOL_A_EEE_MODES_OURS={0x160, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0xf8, 0x3, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x401}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'wlan0\x00'}]}, {0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x2}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x4cd}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'wlan0\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0xb, 0x2, '$\':^:]\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}]}, {0x10, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0xa, 0x2, 'wlan\xb0\x00'}]}, {0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0x9, 0x2, '\x90#}z\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'ethtool\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '^\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7ff}]}]}, @ETHTOOL_A_BITSET_MASK={0x26, 0x5, "5ed601fd6742a0317789fa5d7c5f4143ea9f15af64ac5bd575a78cee7e33e59bbf7e"}, @ETHTOOL_A_BITSET_BITS={0x38, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, ':!\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xffffffff}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0xd, 0x2, '\\(\'(,\\}\xb6\x00'}]}]}]}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}]}, 0x143c}, 0x1, 0x0, 0x0, 0x4004010}, 0x4000000) readv(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000400)=""/253, 0xfd}], 0x2) unshare(0x48020200) 17:34:47 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 17) [ 2356.799205] FAULT_INJECTION: forcing a failure. [ 2356.799205] name failslab, interval 1, probability 0, space 0, times 0 [ 2356.800450] CPU: 1 PID: 17751 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2356.801153] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2356.801990] Call Trace: [ 2356.802298] dump_stack+0x107/0x167 [ 2356.802720] should_fail.cold+0x5/0xa [ 2356.803152] ? create_object.isra.0+0x3a/0xa20 [ 2356.803664] should_failslab+0x5/0x20 [ 2356.804055] kmem_cache_alloc+0x5b/0x310 [ 2356.804512] create_object.isra.0+0x3a/0xa20 [ 2356.804972] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2356.805550] kmem_cache_alloc_trace+0x151/0x320 [ 2356.806027] ? __kmalloc_track_caller+0x2c6/0x370 [ 2356.806582] selinux_add_opt+0x256/0x360 [ 2356.807005] selinux_sb_eat_lsm_opts+0x374/0x790 [ 2356.807549] security_sb_eat_lsm_opts+0x4e/0xb0 [ 2356.808040] legacy_parse_monolithic+0x132/0x180 [ 2356.808532] path_mount+0x1376/0x20b0 [ 2356.808932] ? strncpy_from_user+0x9e/0x470 [ 2356.809416] ? finish_automount+0xa90/0xa90 [ 2356.809906] ? getname_flags.part.0+0x1dd/0x4f0 [ 2356.810424] ? _copy_from_user+0xfb/0x1b0 [ 2356.810910] __x64_sys_mount+0x282/0x300 [ 2356.811361] ? copy_mnt_ns+0xa00/0xa00 [ 2356.811820] do_syscall_64+0x33/0x40 [ 2356.812238] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2356.812801] RIP: 0033:0x7fcacacb3b19 [ 2356.813186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2356.815208] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2356.816054] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2356.816838] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2356.817582] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2356.818309] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2356.819051] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 [ 2356.829443] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2356.846614] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=33864 sclass=netlink_route_socket pid=17757 comm=syz-executor.0 [ 2356.983981] netlink: 20 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2356.987535] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=33864 sclass=netlink_route_socket pid=17819 comm=syz-executor.0 17:35:04 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 14) 17:35:04 executing program 0: sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="1400000000ffff00000000000000000007"], 0x14}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) io_setup(0x5d8, &(0x7f00000000c0)=0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/disk', 0x0, 0x0) io_submit(r1, 0x1, &(0x7f00000003c0)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000b00)='H', 0x1}]) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r2) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) io_uring_setup(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x161}) r3 = socket$inet(0x2, 0xa, 0x0) shutdown(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x10}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_SIOCGIFNETMASK(r3, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x7f, 0x20}}, './file0\x00'}) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000005c0)={0x3c, r4, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_STA_AID={0x6, 0x10, 0x76e}, @NL80211_ATTR_AIRTIME_WEIGHT={0x6, 0x112, 0x7}, @NL80211_ATTR_STA_EXT_CAPABILITY={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @broadcast}]}, 0x3c}}, 0x0) 17:35:04 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) pidfd_open(0x0, 0x0) r4 = dup(0xffffffffffffffff) mq_notify(r4, 0x0) r5 = getpgrp(0x0) r6 = pidfd_open(r5, 0x0) r7 = dup(r6) mq_notify(r7, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r4}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r7}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r8 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r8, 0x0, 0x100000001) 17:35:04 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 18) 17:35:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001802000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:35:04 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:35:04 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 16) 17:35:04 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2374.654892] FAULT_INJECTION: forcing a failure. [ 2374.654892] name failslab, interval 1, probability 0, space 0, times 0 [ 2374.657353] CPU: 1 PID: 17826 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2374.658933] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2374.660811] Call Trace: [ 2374.661424] dump_stack+0x107/0x167 [ 2374.662267] should_fail.cold+0x5/0xa [ 2374.663173] should_failslab+0x5/0x20 [ 2374.664055] __kmalloc_track_caller+0x79/0x370 [ 2374.665175] ? selinux_sb_eat_lsm_opts+0x34e/0x790 [ 2374.666231] ? memcg_slab_post_alloc_hook+0x17a/0x430 [ 2374.667435] kmemdup_nul+0x2d/0xa0 [ 2374.668207] selinux_sb_eat_lsm_opts+0x34e/0x790 [ 2374.669227] security_sb_eat_lsm_opts+0x4e/0xb0 [ 2374.670229] legacy_parse_monolithic+0x132/0x180 [ 2374.671264] path_mount+0x1376/0x20b0 [ 2374.672089] ? strncpy_from_user+0x9e/0x470 [ 2374.673006] ? finish_automount+0xa90/0xa90 [ 2374.673926] ? getname_flags.part.0+0x1dd/0x4f0 [ 2374.674921] ? _copy_from_user+0xfb/0x1b0 [ 2374.675821] __x64_sys_mount+0x282/0x300 [ 2374.676687] ? copy_mnt_ns+0xa00/0xa00 [ 2374.677540] do_syscall_64+0x33/0x40 [ 2374.678334] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2374.679445] RIP: 0033:0x7f2cab73ab19 [ 2374.680269] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2374.684334] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2374.686013] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2374.687595] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2374.689167] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2374.690738] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2374.692326] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 [ 2374.700475] FAULT_INJECTION: forcing a failure. [ 2374.700475] name failslab, interval 1, probability 0, space 0, times 0 [ 2374.700530] device veth0_vlan entered promiscuous mode [ 2374.702975] CPU: 1 PID: 17829 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2374.702989] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2374.702997] Call Trace: [ 2374.703025] dump_stack+0x107/0x167 [ 2374.703060] should_fail.cold+0x5/0xa [ 2374.703090] ? v9fs_mount+0x5a/0x8f0 [ 2374.703119] should_failslab+0x5/0x20 [ 2374.703141] kmem_cache_alloc_trace+0x55/0x320 [ 2374.703164] ? memmove+0x39/0x60 [ 2374.703195] ? v9fs_write_inode+0x60/0x60 [ 2374.703220] v9fs_mount+0x5a/0x8f0 [ 2374.703254] ? v9fs_write_inode+0x60/0x60 [ 2374.703281] legacy_get_tree+0x105/0x220 [ 2374.716589] vfs_get_tree+0x8e/0x300 [ 2374.717462] path_mount+0x13be/0x20b0 [ 2374.718370] ? strncpy_from_user+0x9e/0x470 [ 2374.719402] ? finish_automount+0xa90/0xa90 [ 2374.720420] ? getname_flags.part.0+0x1dd/0x4f0 [ 2374.721451] ? _copy_from_user+0xfb/0x1b0 [ 2374.722399] __x64_sys_mount+0x282/0x300 [ 2374.723310] ? copy_mnt_ns+0xa00/0xa00 [ 2374.724206] do_syscall_64+0x33/0x40 [ 2374.725032] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2374.726158] RIP: 0033:0x7fcacacb3b19 [ 2374.727001] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2374.731067] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2374.732858] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2374.734521] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2374.736207] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2374.737866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2374.739555] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 [ 2374.755124] FAULT_INJECTION: forcing a failure. [ 2374.755124] name failslab, interval 1, probability 0, space 0, times 0 [ 2374.757613] CPU: 1 PID: 17842 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2374.759121] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2374.760904] Call Trace: [ 2374.761487] dump_stack+0x107/0x167 [ 2374.762287] should_fail.cold+0x5/0xa [ 2374.763127] ? selinux_add_opt+0x256/0x360 [ 2374.764056] should_failslab+0x5/0x20 [ 2374.764886] kmem_cache_alloc_trace+0x55/0x320 [ 2374.765874] ? __kmalloc_track_caller+0x2c6/0x370 [ 2374.766934] ? selinux_sb_eat_lsm_opts+0x34e/0x790 [ 2374.768015] selinux_add_opt+0x256/0x360 [ 2374.768911] selinux_sb_eat_lsm_opts+0x374/0x790 [ 2374.769966] security_sb_eat_lsm_opts+0x4e/0xb0 [ 2374.771051] legacy_parse_monolithic+0x132/0x180 [ 2374.772175] path_mount+0x1376/0x20b0 [ 2374.773087] ? strncpy_from_user+0x9e/0x470 [ 2374.774120] ? finish_automount+0xa90/0xa90 [ 2374.775155] ? getname_flags.part.0+0x1dd/0x4f0 [ 2374.776246] ? _copy_from_user+0xfb/0x1b0 [ 2374.777251] __x64_sys_mount+0x282/0x300 [ 2374.778206] ? copy_mnt_ns+0xa00/0xa00 [ 2374.779116] do_syscall_64+0x33/0x40 [ 2374.779923] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2374.781019] RIP: 0033:0x7f3da67ebb19 [ 2374.781827] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2374.785728] RSP: 002b:00007f3da3d61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2374.787540] RAX: ffffffffffffffda RBX: 00007f3da68fef60 RCX: 00007f3da67ebb19 [ 2374.789030] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2374.790877] RBP: 00007f3da3d611d0 R08: 0000000020000280 R09: 0000000000000000 [ 2374.792466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2374.794051] R13: 00007ffdf73094ff R14: 00007f3da3d61300 R15: 0000000000022000 17:35:05 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) pidfd_open(0x0, 0x0) r4 = dup(0xffffffffffffffff) mq_notify(r4, 0x0) r5 = getpgrp(0x0) r6 = pidfd_open(r5, 0x0) r7 = dup(r6) mq_notify(r7, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r4}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r7}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r8 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r8, 0x0, 0x100000001) 17:35:05 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000001c02000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:35:05 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 15) [ 2374.892070] device veth0_vlan entered promiscuous mode [ 2374.981928] FAULT_INJECTION: forcing a failure. [ 2374.981928] name failslab, interval 1, probability 0, space 0, times 0 [ 2374.984513] CPU: 1 PID: 17948 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2374.986068] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2374.987936] Call Trace: [ 2374.988538] dump_stack+0x107/0x167 [ 2374.989363] should_fail.cold+0x5/0xa [ 2374.990227] ? create_object.isra.0+0x3a/0xa20 [ 2374.991260] should_failslab+0x5/0x20 [ 2374.992123] kmem_cache_alloc+0x5b/0x310 [ 2374.993043] create_object.isra.0+0x3a/0xa20 [ 2374.994034] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2374.995185] __kmalloc_track_caller+0x177/0x370 [ 2374.996236] ? selinux_sb_eat_lsm_opts+0x34e/0x790 [ 2374.997336] ? memcg_slab_post_alloc_hook+0x17a/0x430 [ 2374.998504] kmemdup_nul+0x2d/0xa0 [ 2374.999320] selinux_sb_eat_lsm_opts+0x34e/0x790 [ 2375.000398] security_sb_eat_lsm_opts+0x4e/0xb0 [ 2375.001459] legacy_parse_monolithic+0x132/0x180 [ 2375.002514] path_mount+0x1376/0x20b0 [ 2375.003378] ? strncpy_from_user+0x9e/0x470 [ 2375.004342] ? finish_automount+0xa90/0xa90 [ 2375.005302] ? getname_flags.part.0+0x1dd/0x4f0 [ 2375.006338] ? _copy_from_user+0xfb/0x1b0 [ 2375.007288] __x64_sys_mount+0x282/0x300 [ 2375.008196] ? copy_mnt_ns+0xa00/0xa00 [ 2375.009082] do_syscall_64+0x33/0x40 [ 2375.009922] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2375.011078] RIP: 0033:0x7f2cab73ab19 [ 2375.011908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2375.015999] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2375.017692] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2375.019281] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2375.020868] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2375.022446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2375.024023] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:35:20 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 16) 17:35:20 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:35:20 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:35:20 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 19) 17:35:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000006b02000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:35:20 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) pidfd_open(0x0, 0x0) r4 = dup(0xffffffffffffffff) mq_notify(r4, 0x0) r5 = getpgrp(0x0) r6 = pidfd_open(r5, 0x0) r7 = dup(r6) mq_notify(r7, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r4}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r7}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r8 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r8, 0x0, 0x100000001) 17:35:20 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 17) 17:35:20 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_open_dev$char_usb(0xc, 0xb4, 0x20) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000040)={0x0, r0, 0x3, 0x2, 0x100000001, 0xd1}) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000000)={0x28, 0x20, 0x100, 0x0, 0x0, {0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @uid=0xee01}, @nested={0xc, 0x18, 0x0, 0x1, [@typed={0x8, 0x71, 0x0, 0x0, @pid}]}]}, 0x28}}, 0x0) 17:35:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000003000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2390.543453] FAULT_INJECTION: forcing a failure. [ 2390.543453] name failslab, interval 1, probability 0, space 0, times 0 [ 2390.545863] CPU: 0 PID: 17970 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2390.547298] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2390.548965] Call Trace: [ 2390.549525] dump_stack+0x107/0x167 [ 2390.550296] should_fail.cold+0x5/0xa [ 2390.551084] ? selinux_add_opt+0x256/0x360 [ 2390.551960] should_failslab+0x5/0x20 [ 2390.552740] kmem_cache_alloc_trace+0x55/0x320 [ 2390.553667] ? __kmalloc_track_caller+0x2c6/0x370 [ 2390.554664] ? selinux_sb_eat_lsm_opts+0x34e/0x790 [ 2390.555695] selinux_add_opt+0x256/0x360 [ 2390.556541] selinux_sb_eat_lsm_opts+0x374/0x790 [ 2390.557537] security_sb_eat_lsm_opts+0x4e/0xb0 [ 2390.558510] legacy_parse_monolithic+0x132/0x180 [ 2390.559496] path_mount+0x1376/0x20b0 [ 2390.560293] ? strncpy_from_user+0x9e/0x470 [ 2390.561186] ? finish_automount+0xa90/0xa90 [ 2390.562059] ? getname_flags.part.0+0x1dd/0x4f0 [ 2390.563038] ? _copy_from_user+0xfb/0x1b0 [ 2390.563919] __x64_sys_mount+0x282/0x300 [ 2390.564754] ? copy_mnt_ns+0xa00/0xa00 [ 2390.565583] do_syscall_64+0x33/0x40 [ 2390.566361] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2390.567413] RIP: 0033:0x7f2cab73ab19 [ 2390.568175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2390.571890] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2390.573438] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2390.574888] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2390.576356] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2390.577856] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2390.579507] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:35:20 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2390.589026] FAULT_INJECTION: forcing a failure. [ 2390.589026] name failslab, interval 1, probability 0, space 0, times 0 [ 2390.590454] CPU: 1 PID: 17973 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2390.591242] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2390.592164] Call Trace: [ 2390.592471] dump_stack+0x107/0x167 [ 2390.592886] should_fail.cold+0x5/0xa [ 2390.593318] ? create_object.isra.0+0x3a/0xa20 [ 2390.593838] should_failslab+0x5/0x20 [ 2390.594287] kmem_cache_alloc+0x5b/0x310 [ 2390.594686] FAULT_INJECTION: forcing a failure. [ 2390.594686] name failslab, interval 1, probability 0, space 0, times 0 [ 2390.594751] ? cred_has_capability.isra.0+0x152/0x2b0 [ 2390.594772] create_object.isra.0+0x3a/0xa20 [ 2390.594796] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2390.598880] kmem_cache_alloc_trace+0x151/0x320 [ 2390.599429] ? v9fs_write_inode+0x60/0x60 [ 2390.599894] v9fs_mount+0x5a/0x8f0 [ 2390.600298] ? v9fs_write_inode+0x60/0x60 [ 2390.600767] legacy_get_tree+0x105/0x220 [ 2390.601215] vfs_get_tree+0x8e/0x300 [ 2390.601647] path_mount+0x13be/0x20b0 [ 2390.602084] ? strncpy_from_user+0x9e/0x470 [ 2390.602574] ? finish_automount+0xa90/0xa90 [ 2390.603068] ? getname_flags.part.0+0x1dd/0x4f0 [ 2390.603589] ? _copy_from_user+0xfb/0x1b0 [ 2390.604071] __x64_sys_mount+0x282/0x300 [ 2390.604527] ? copy_mnt_ns+0xa00/0xa00 [ 2390.604982] do_syscall_64+0x33/0x40 [ 2390.605408] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2390.605980] RIP: 0033:0x7fcacacb3b19 [ 2390.606397] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2390.608444] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2390.609290] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2390.610083] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2390.610876] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2390.611736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2390.612591] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 [ 2390.613482] CPU: 0 PID: 17977 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2390.615070] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2390.616917] Call Trace: [ 2390.617516] dump_stack+0x107/0x167 17:35:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000006000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2390.618400] should_fail.cold+0x5/0xa [ 2390.619292] ? create_object.isra.0+0x3a/0xa20 [ 2390.620322] should_failslab+0x5/0x20 [ 2390.621174] kmem_cache_alloc+0x5b/0x310 [ 2390.622104] create_object.isra.0+0x3a/0xa20 [ 2390.623118] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2390.624277] kmem_cache_alloc_trace+0x151/0x320 [ 2390.625314] ? __kmalloc_track_caller+0x2c6/0x370 [ 2390.626411] selinux_add_opt+0x256/0x360 [ 2390.627348] selinux_sb_eat_lsm_opts+0x374/0x790 [ 2390.628441] security_sb_eat_lsm_opts+0x4e/0xb0 [ 2390.629491] legacy_parse_monolithic+0x132/0x180 [ 2390.630561] path_mount+0x1376/0x20b0 [ 2390.631433] ? strncpy_from_user+0x9e/0x470 [ 2390.632407] ? finish_automount+0xa90/0xa90 [ 2390.633374] ? getname_flags.part.0+0x1dd/0x4f0 [ 2390.634414] ? _copy_from_user+0xfb/0x1b0 [ 2390.635392] __x64_sys_mount+0x282/0x300 [ 2390.636305] ? copy_mnt_ns+0xa00/0xa00 [ 2390.637212] do_syscall_64+0x33/0x40 [ 2390.638050] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2390.639201] RIP: 0033:0x7f3da67ebb19 [ 2390.640038] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2390.644118] RSP: 002b:00007f3da3d61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2390.645811] RAX: ffffffffffffffda RBX: 00007f3da68fef60 RCX: 00007f3da67ebb19 [ 2390.647411] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2390.648992] RBP: 00007f3da3d611d0 R08: 0000000020000280 R09: 0000000000000000 [ 2390.650568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2390.652161] R13: 00007ffdf73094ff R14: 00007f3da3d61300 R15: 0000000000022000 17:35:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000007000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:35:20 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000f000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:35:20 executing program 0: ftruncate(0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = dup(r1) mq_notify(r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x10141, 0x41) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) 17:35:20 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 17) 17:35:21 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(0xffffffffffffffff, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) [ 2390.777479] FAULT_INJECTION: forcing a failure. [ 2390.777479] name failslab, interval 1, probability 0, space 0, times 0 [ 2390.778820] CPU: 1 PID: 18078 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2390.779580] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2390.780469] Call Trace: [ 2390.780765] dump_stack+0x107/0x167 [ 2390.781161] should_fail.cold+0x5/0xa [ 2390.781572] ? create_object.isra.0+0x3a/0xa20 [ 2390.782082] should_failslab+0x5/0x20 [ 2390.782494] kmem_cache_alloc+0x5b/0x310 [ 2390.782940] create_object.isra.0+0x3a/0xa20 [ 2390.783418] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2390.783971] kmem_cache_alloc_trace+0x151/0x320 [ 2390.784468] ? __kmalloc_track_caller+0x2c6/0x370 [ 2390.784995] selinux_add_opt+0x256/0x360 [ 2390.785434] selinux_sb_eat_lsm_opts+0x374/0x790 [ 2390.785964] security_sb_eat_lsm_opts+0x4e/0xb0 [ 2390.786470] legacy_parse_monolithic+0x132/0x180 [ 2390.786980] path_mount+0x1376/0x20b0 [ 2390.787431] ? strncpy_from_user+0x9e/0x470 [ 2390.787917] ? finish_automount+0xa90/0xa90 [ 2390.788379] ? getname_flags.part.0+0x1dd/0x4f0 [ 2390.788908] ? _copy_from_user+0xfb/0x1b0 [ 2390.789369] __x64_sys_mount+0x282/0x300 [ 2390.789834] ? copy_mnt_ns+0xa00/0xa00 [ 2390.790279] do_syscall_64+0x33/0x40 [ 2390.790690] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2390.791252] RIP: 0033:0x7f2cab73ab19 [ 2390.791674] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2390.793653] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2390.794516] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2390.795323] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2390.796122] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2390.796921] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2390.797712] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:35:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000003000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:35:33 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000f40), 0x4) openat$tun(0xffffffffffffff9c, &(0x7f0000002300), 0x0, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0xfffffe3b, r0, {r3}}, './file0\x00'}) sendmmsg$inet6(r4, &(0x7f0000002200)=[{{&(0x7f0000000040)={0xa, 0x4e23, 0x6, @mcast1, 0x666}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000080)="98b7da37f374966ec500592a0015c5d4d6c06662a0344a98eed0b8528d280cb005a1228802cce04a6e546762aa29a6b6b9f38e26e18ea47b73e815623c2c417f57a245fa721332d82234d3e5fe1edfa0583d34a82a8af71a1743be32eacb5f39d43907f84e61a488fe106787848b9d93d6d82117951662e9", 0x78}, {&(0x7f0000000100)="74b58cc8b38057f6482b93d23a0ff5936e0f86afeb5284c6ba0f423060a61c90394e8875c08d42b72d690b1c563cfa62ba199aa7d22541e894dad0f7684834c5c13322726661b967e213eeefce1ee7b9a6a95d9ecc04a8b27b9f6ab06369f2e1a3b9d1f6943beba00963831c903c0ef9c40ca8a3ddaabbdee6d711f5b4c4dd56c87885f20857da5a6ec6a06d516c10da71458b1f61fd76306d78ac2c36375c1c46f2dc33e76568934a3f7a7f2195104dce98713f97c41f84d296a6be4c73bfc3aa4b81d98d2b91c6a7eb5beb9808e399975d5639e0fcac", 0xd7}, {&(0x7f0000000f80)="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", 0x1000}], 0x3, &(0x7f0000000240)=[@hoplimit={{0x14, 0x29, 0x34, 0x3}}, @rthdr={{0x28, 0x29, 0x39, {0x84, 0x2, 0x0, 0xff, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}}}, @dstopts_2292={{0xa8, 0x29, 0x4, {0x33, 0x11, '\x00', [@ra={0x5, 0x2, 0x9}, @ra={0x5, 0x2, 0x1}, @generic={0x0, 0x7c, "98b211f58ba5ff4bded2876a33a3cc4f52585f8de7c282fe8af1675792172b8a2ccc17b261ded6621ccc68d0582c9f4a94f5b784c3ac90991802a147cc41c2adece50f53cdb94c2f1168e9afed1b44cfdc62e688ba7f3661c95b41b91b30e9f4b539a60a5159bc5130549d8b09a337ded4346f5e8bf8ffc847c1ceb1"}, @padn={0x1, 0x1, [0x0]}]}}}], 0xe8}}, {{&(0x7f0000000340)={0xa, 0x4e21, 0x10001, @local, 0x2}, 0x1c, &(0x7f0000000500)=[{&(0x7f0000000380)="d86ec0507381efd073a3d64bdd880a417c94945dd5d4", 0x16}, {&(0x7f00000003c0)="21abaf7500fc9ef0c04e3bba46ba6dea30f173400fdcff12c61f6fa066f9b70573521d097220c7995a5af4a6b9b3e6ba7f6aa455078ee993726b9e1a61a28c49aad0c7222619dbcab32a444ac65f61f8b642f0351a842b36d0b6fa2f4fd2b26a51303c616d3b538a666336ae334a2ad402a66f62c2fd304a453e10720113e8", 0x7f}, {&(0x7f0000000440)="516f045a28a3325fd5bf65b8fb84de72fc07f2f08c8219d2bc86019f51b5a627f0f27eb2b94c7a47195ce103d75b0443be615ea7ab099aacfb0085ea6d0a2ed2870c8bcfb534c3aacf356c2e7f6b9cce0bfa09d8c95a87f38425d3b788fc0f2a3dd328da056a165e1f6b5f1ccab90c82fe3a3c6bbab0d9b6f27f76c18fab22789053b1bba8fcda74cfe2", 0x8a}], 0x3, &(0x7f0000002340)=[@rthdr_2292={{0x38, 0x29, 0x39, {0x4, 0x4, 0x2, 0x7, 0x0, [@ipv4={'\x00', '\xff\xff', @multicast1}, @ipv4={'\x00', '\xff\xff', @private=0xa010100}]}}}, @hopopts={{0x40, 0x29, 0x36, {0x34, 0x4, '\x00', [@hao={0xc9, 0x10, @private1}, @enc_lim={0x4, 0x1, 0x2}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}}}, @dstopts={{0x1d0, 0x29, 0x37, {0x2f, 0x37, '\x00', [@calipso={0x7, 0x20, {0x0, 0x6, 0xcd, 0x8, [0x7, 0x200, 0xd60]}}, @generic={0x20, 0xa0, "2535b01e05191d7f741aa9cf82b5150e6a760f516a9b211b3311bc3d108660476d947f6b1781fc37f8a203995163ab32ccef3e5d8440b6adebe6ac335b36e9eb06405fe89813612cc4278bb2b685bc8fb15d6ea89c1d041bd66f7f002437ef5f7a9c9422da6ba1543547d2c09c984fdce38a033a42ee1a0479633a3b7eb142c602349b06c6fc6af5e6dc732bfa35b674d14da5e1104588e31707c116b22bf91a"}, @padn={0x1, 0x2, [0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x6f}, @ra={0x5, 0x2, 0x20}, @generic={0xc, 0xe7, "19c8ed713d82b2bc73111beff290e2b4ebd956b12ccab08adfa9d256cf85290bad96201df54d8335b5851e1dc8a4b8e47fc2797d4fbf6b27526abfed7145e576c03d6e87b20488e8a72f7359890795f0de27c9fc9df52dc399b27884bc99d6bd35182d86dd31908fea1c1ec66665fa701e35c7c8507c8819aba2e737f7664874b604a393e7943a2a91e7eaa4ed5c1f30d6085edc594dc83e9033dd52719fc53a744a7b0f0efeb5b8974bcf7ddada3c277b8503a9ec666d8c21a4f43d5eda36e7237643bf40cf623cbc86bc3634615a66129782f5002861db471061a966f66bc6e03528083d815c"}]}}}, @tclass={{0x14, 0x29, 0x43, 0x1}}, @rthdr_2292={{0x58, 0x29, 0x39, {0xa, 0x8, 0x1, 0x44, 0x0, [@dev={0xfe, 0x80, '\x00', 0xb}, @loopback, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x33, 0x0, '\x00', [@pad1]}}}], 0x2d8}}, {{&(0x7f0000000840)={0xa, 0x4e24, 0x5, @loopback, 0x7}, 0x1c, &(0x7f0000000c00)=[{&(0x7f0000000880)="8e5c9c7c62ebed4caf57ab18c47de61ee96d84e17ffab9ffa0dbb161c095d6d18fba4f22fba3b908b6241d935a015b2428d8f251edbca75e040a154825edb8a908399076d1b9aa1246259ccfdf1279a48cb77470806eea999ea9b073d043917c4b7f2a548c7a6801fe028efee743a9515cc78c4894bc2a608a79840e0722326deab0eb977a3802e54a1681e6d8a4a2a02b3500ded0398721758c2f0dbfc0fd3d6a221a0d8dc249806efb41874a735b718e6d8d811e7d66f2b8b99aef04b8781befc7c798855a7871ad74a1aa1edeccb62d62b0eaa3c9a37f296e48631456a4f5cdd3ab06f9", 0xe5}, {&(0x7f0000000980)="9b72a313c5e5738fe0b7bee5319e7a4d71a08e265d", 0x15}, {&(0x7f00000009c0)="675f2d74de58f342410c745d7b64d7cbd89dd120b09f4b6ed961915b8878790f7e48296bfa47e82a3c228e6ed4d2b0c6c41f9d030dd5fa6b3581d4a77203d4b1f4ad01fdfe84dcc554528e4bfeab0cd571acf175f5933328610591c4224ad26716d29c", 0x63}, {&(0x7f0000000a40)="dd724ca331991b00b6ea0653151b32b443659ff430519899bc2e0df69d497eade9b13dbc0a13f82340f9d34faa5bb5afffca36c69e9a917a8bda98927e7494d5dc1b0909c75a9fa7aba12bc6414ae3952026d9bbc480187d51aee32d32c7f668f87501b76f53865088f6f5ca03ef140a5d215e14e12ecbc2d30a140799970e190c63bff9d085209b12da292f2d121890d95916c3d37e5bd5461cf5d72385c667c7828bf2fdab81735168bc80e363b560a7ed48570877bf903d0334ef80", 0xbd}, {&(0x7f0000000b00)="ecd62c393ca5116242d4584a06021ece1c5899b4e1ace5f9bd81a836264148a4d2c9acb5fd41da4d871cd7a775a8c547abf60e1913a1e9e6919a320e295461e3e0e27f0d1d56420969bbd49ab31be5eabc7d4dfd04f22ef1d246a5557511beecbcfa89bc878a52f3bee406ff478b05260beebb53053001b1cc493264c67c145fc145f0d3967ead0b1f18910c03fee37f6e7bc4ba7d979d3023f621561acec54c971e2868baabc4c2cfae756f75c78420c983ef85c57675b9bd72a6e0627d2716f0a838dffbb9d26e63ff4015e669d0953a81f0ef0690461ed87cfd443cbbd461", 0xe0}], 0x5, &(0x7f0000000c80)=[@flowinfo={{0x14, 0x29, 0xb, 0x5}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x2b}}], 0x30}}, {{&(0x7f0000000cc0)={0xa, 0x4e22, 0xffffff4e, @loopback, 0x18}, 0x1c, &(0x7f0000002140)=[{&(0x7f0000000d00)="65e4d923c7cf5f1644759d51fbb55810a70350005882e3b7ca3dc8a69159889e38671c58e0c2f243693bdc5abe52b1ef7b051b5301b88aed0382768e06c0b26938042ed9f4ad51ba441068a5cebb19e804fe06ae63cd14f9a0db6bd9c4deb89666425883e6b857f17b5e", 0x6a}, {&(0x7f0000000d80)="27a5b29108fd450fe1eb5f41499e03db0e863ef524dabb104887234a8197b9c97f7235ea2ef734bbc0f1ba1ef5539898541b294a37714d8209b1361259b9524580f0dda413b8f4746ed10640fa99be9ab6b390c1513c172d27e1276fd77a8d345d49fb91be897b3facb0448bb749a537f1bf04433e8e2051f487eb0319d8649c44652901bc4b4fabfba25a38ab79", 0x8e}, {&(0x7f0000000e40)="f0840b33732d731c5030694318cde929965c72fe7ce83cd3331f0f14fbbeec0d90823fd515699131dbf97b9ebc237cd7767e755cece2bfa8457d3667e65dce0fbb6d6f5f69d1b4a8a6d2440cfa351f44c4e658b8025ab9e1837df480b57a08118f71320a00247c7f25aeae828751d2815f60cd8c84a128b98103a7799f3e4716437d5a07b1c28dbbd8fa7954ea87ea6ca8b84d1f783b9ff12b073068d7d9c3323b47d09e49dc1e783e3fb822e7818a6a9ac07ec0482f393f033bf39ae30c450364f7dcec9ebd1a7f5d8c59452a9b6f67ffe5f587ce5177ef6cd1fa065627985476db0894bc6dfaad2874fe08", 0xec}, {&(0x7f0000001f80)="5ae8e15a5e0c546ce812b053bdc49c266bf3db997783cf70747e92e0fd22ee23105e97656eb19b4364c4880f64fcea3c4d28d67159684c7d7755240f16a541dcc58a8dc67b90e9cba2783051c6bcafdbc3ac0001ce9eee0f192881a319694b575d50ebf188c8270086fc07bc473350c166ae29cb32dcca2a19f7c7f392d1b12f61213775830b59a76036f0ec762819ab5b1f98c8eae465631afceb3f84d35e91f905bf82755bb27b17a8dc7cefe3f1489cd6e1bc7bf96de8f0ab6f18990ea695dd1a3f46d74dacaa3371df1a23fcab5f42010003d743", 0xd6}, {&(0x7f0000002080)="317f9a57937233eab6f6ffda31ae9f06df9ed6f84806a9f5a5f509cf43df99ff12b75391bf1fa60b8a600900c9772eec68466a51a1e73bf1843218ccab8f5d1e1f250a0d0f091c164898ee516bf83e417abe8c79bcbca5d7a120e8a185dec2258b33608af131488549ba94fbd4a7f92dbce0db58bcdc329cc9cecc559be2de538e7b49292a59f440edadbd4c1e49eab2", 0x90}], 0x5, &(0x7f00000021c0)=[@dstopts={{0x30, 0x29, 0x37, {0x87, 0x2, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}}}], 0x30}}], 0x4, 0x1) r5 = socket$nl_sock_diag(0x10, 0x3, 0x4) ioctl$BTRFS_IOC_QGROUP_LIMIT(r5, 0x8030942b, &(0x7f0000000540)={0x8, {0x2, 0x80000001, 0x4, 0x7d8, 0x9fec}}) [ 2403.484888] FAULT_INJECTION: forcing a failure. [ 2403.484888] name failslab, interval 1, probability 0, space 0, times 0 [ 2403.486146] CPU: 1 PID: 18106 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2403.486892] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2403.487788] Call Trace: [ 2403.488086] dump_stack+0x107/0x167 [ 2403.488488] should_fail.cold+0x5/0xa [ 2403.488910] should_failslab+0x5/0x20 [ 2403.489319] __kmalloc_track_caller+0x79/0x370 17:35:33 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 18) [ 2403.489818] ? v9fs_session_init+0xa7/0x1680 [ 2403.490502] ? kernel_text_address+0xf2/0x120 [ 2403.491014] kstrdup+0x36/0x70 [ 2403.491524] v9fs_session_init+0xa7/0x1680 [ 2403.492000] ? lock_release+0x680/0x680 [ 2403.492430] ? find_held_lock+0x2c/0x110 [ 2403.492871] ? kmem_cache_alloc_trace+0x151/0x320 [ 2403.493386] ? v9fs_show_options+0x690/0x690 [ 2403.493877] ? trace_hardirqs_on+0x5b/0x180 [ 2403.494360] ? kasan_unpoison_shadow+0x33/0x50 [ 2403.494867] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2403.495438] v9fs_mount+0x79/0x8f0 [ 2403.495846] ? v9fs_write_inode+0x60/0x60 [ 2403.496305] legacy_get_tree+0x105/0x220 [ 2403.496773] vfs_get_tree+0x8e/0x300 [ 2403.497200] path_mount+0x13be/0x20b0 [ 2403.497645] ? strncpy_from_user+0x9e/0x470 [ 2403.498138] ? finish_automount+0xa90/0xa90 [ 2403.498629] ? getname_flags.part.0+0x1dd/0x4f0 [ 2403.499170] ? _copy_from_user+0xfb/0x1b0 [ 2403.499657] __x64_sys_mount+0x282/0x300 [ 2403.500124] ? copy_mnt_ns+0xa00/0xa00 [ 2403.500586] do_syscall_64+0x33/0x40 [ 2403.501018] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2403.501607] RIP: 0033:0x7fcacacb3b19 17:35:33 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 20) 17:35:33 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 18) 17:35:33 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(0xffffffffffffffff, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:35:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 1) 17:35:33 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) [ 2403.502036] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2403.504283] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2403.505169] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2403.505991] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2403.506074] FAULT_INJECTION: forcing a failure. [ 2403.506074] name failslab, interval 1, probability 0, space 0, times 0 [ 2403.506818] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2403.506827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2403.506834] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 [ 2403.514125] CPU: 0 PID: 18112 Comm: syz-executor.1 Not tainted 5.10.194 #1 [ 2403.515631] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2403.517410] Call Trace: [ 2403.517993] dump_stack+0x107/0x167 [ 2403.518795] should_fail.cold+0x5/0xa [ 2403.519645] should_failslab+0x5/0x20 [ 2403.520462] __kmalloc_track_caller+0x79/0x370 [ 2403.521438] ? strndup_user+0x74/0xe0 [ 2403.522311] memdup_user+0x22/0xd0 [ 2403.523100] strndup_user+0x74/0xe0 [ 2403.523928] __x64_sys_mount+0x133/0x300 [ 2403.524809] ? copy_mnt_ns+0xa00/0xa00 [ 2403.525701] do_syscall_64+0x33/0x40 [ 2403.526606] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2403.527747] RIP: 0033:0x7ff2a6b09b19 [ 2403.528718] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2403.532685] RSP: 002b:00007ff2a407f188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2403.534321] RAX: ffffffffffffffda RBX: 00007ff2a6c1cf60 RCX: 00007ff2a6b09b19 [ 2403.535855] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2403.537376] RBP: 00007ff2a407f1d0 R08: 0000000020000280 R09: 0000000000000000 [ 2403.538898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2403.540439] R13: 00007ffdb542b63f R14: 00007ff2a407f300 R15: 0000000000022000 [ 2403.548993] FAULT_INJECTION: forcing a failure. [ 2403.548993] name failslab, interval 1, probability 0, space 0, times 0 [ 2403.550242] CPU: 1 PID: 18119 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2403.550984] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2403.551892] Call Trace: [ 2403.552193] dump_stack+0x107/0x167 [ 2403.552595] should_fail.cold+0x5/0xa [ 2403.553012] ? v9fs_mount+0x5a/0x8f0 [ 2403.553419] should_failslab+0x5/0x20 [ 2403.553835] kmem_cache_alloc_trace+0x55/0x320 [ 2403.554341] ? memmove+0x39/0x60 [ 2403.554712] ? v9fs_write_inode+0x60/0x60 [ 2403.555176] v9fs_mount+0x5a/0x8f0 [ 2403.555579] ? v9fs_write_inode+0x60/0x60 [ 2403.556036] legacy_get_tree+0x105/0x220 [ 2403.556512] vfs_get_tree+0x8e/0x300 [ 2403.556945] path_mount+0x13be/0x20b0 [ 2403.557388] ? strncpy_from_user+0x9e/0x470 [ 2403.557883] ? finish_automount+0xa90/0xa90 [ 2403.558370] ? getname_flags.part.0+0x1dd/0x4f0 [ 2403.558896] ? _copy_from_user+0xfb/0x1b0 [ 2403.559392] __x64_sys_mount+0x282/0x300 [ 2403.559860] ? copy_mnt_ns+0xa00/0xa00 [ 2403.560316] do_syscall_64+0x33/0x40 [ 2403.560743] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2403.561318] RIP: 0033:0x7f3da67ebb19 [ 2403.561742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2403.563831] RSP: 002b:00007f3da3d61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2403.564683] RAX: ffffffffffffffda RBX: 00007f3da68fef60 RCX: 00007f3da67ebb19 [ 2403.565498] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2403.565681] FAULT_INJECTION: forcing a failure. [ 2403.565681] name failslab, interval 1, probability 0, space 0, times 0 [ 2403.566320] RBP: 00007f3da3d611d0 R08: 0000000020000280 R09: 0000000000000000 [ 2403.566329] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2403.566336] R13: 00007ffdf73094ff R14: 00007f3da3d61300 R15: 0000000000022000 [ 2403.573452] CPU: 0 PID: 18118 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2403.574924] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2403.576708] Call Trace: [ 2403.577292] dump_stack+0x107/0x167 [ 2403.578091] should_fail.cold+0x5/0xa [ 2403.578920] ? v9fs_mount+0x5a/0x8f0 [ 2403.579748] should_failslab+0x5/0x20 [ 2403.580591] kmem_cache_alloc_trace+0x55/0x320 [ 2403.581585] ? memmove+0x39/0x60 [ 2403.582339] ? v9fs_write_inode+0x60/0x60 [ 2403.583257] v9fs_mount+0x5a/0x8f0 [ 2403.584046] ? v9fs_write_inode+0x60/0x60 [ 2403.584953] legacy_get_tree+0x105/0x220 [ 2403.585833] vfs_get_tree+0x8e/0x300 [ 2403.586651] path_mount+0x13be/0x20b0 [ 2403.587510] ? strncpy_from_user+0x9e/0x470 [ 2403.588451] ? finish_automount+0xa90/0xa90 [ 2403.589394] ? getname_flags.part.0+0x1dd/0x4f0 [ 2403.590398] ? _copy_from_user+0xfb/0x1b0 [ 2403.591336] __x64_sys_mount+0x282/0x300 [ 2403.592221] ? copy_mnt_ns+0xa00/0xa00 [ 2403.593096] do_syscall_64+0x33/0x40 [ 2403.593909] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2403.595013] RIP: 0033:0x7f2cab73ab19 [ 2403.595832] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2403.599898] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2403.601537] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2403.602157] FAULT_INJECTION: forcing a failure. [ 2403.602157] name failslab, interval 1, probability 0, space 0, times 0 [ 2403.603378] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2403.603400] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2403.603421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2403.609670] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 [ 2403.611289] CPU: 1 PID: 18141 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2403.612083] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 17:35:33 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 21) 17:35:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000004000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2403.613032] Call Trace: [ 2403.613506] dump_stack+0x107/0x167 [ 2403.613922] should_fail.cold+0x5/0xa [ 2403.614330] ? create_object.isra.0+0x3a/0xa20 [ 2403.614821] should_failslab+0x5/0x20 [ 2403.615239] kmem_cache_alloc+0x5b/0x310 [ 2403.615674] create_object.isra.0+0x3a/0xa20 [ 2403.616148] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2403.616692] __kmalloc_track_caller+0x177/0x370 [ 2403.617192] ? v9fs_session_init+0xa7/0x1680 [ 2403.617661] ? kernel_text_address+0xf2/0x120 [ 2403.618147] kstrdup+0x36/0x70 [ 2403.618492] v9fs_session_init+0xa7/0x1680 [ 2403.618944] ? lock_release+0x680/0x680 [ 2403.619372] ? find_held_lock+0x2c/0x110 [ 2403.619816] ? kmem_cache_alloc_trace+0x151/0x320 [ 2403.620333] ? v9fs_show_options+0x690/0x690 [ 2403.620815] ? trace_hardirqs_on+0x5b/0x180 [ 2403.621289] ? kasan_unpoison_shadow+0x33/0x50 [ 2403.621778] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2403.622331] v9fs_mount+0x79/0x8f0 [ 2403.622716] ? v9fs_write_inode+0x60/0x60 [ 2403.623171] legacy_get_tree+0x105/0x220 [ 2403.623613] vfs_get_tree+0x8e/0x300 [ 2403.624022] path_mount+0x13be/0x20b0 [ 2403.624431] ? strncpy_from_user+0x9e/0x470 [ 2403.624900] ? finish_automount+0xa90/0xa90 [ 2403.625386] ? getname_flags.part.0+0x1dd/0x4f0 [ 2403.625878] ? _copy_from_user+0xfb/0x1b0 [ 2403.626368] __x64_sys_mount+0x282/0x300 [ 2403.626799] ? copy_mnt_ns+0xa00/0xa00 [ 2403.627274] do_syscall_64+0x33/0x40 [ 2403.627709] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2403.628256] RIP: 0033:0x7fcacacb3b19 [ 2403.628689] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2403.630625] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2403.631510] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2403.632338] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2403.633166] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2403.633956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2403.634746] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 17:35:33 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(0xffffffffffffffff, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:35:33 executing program 0: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x708, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f00000000c0), 0xa}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x6, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000000080)=ANY=[]) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x10881, 0x0) preadv(r1, &(0x7f0000001600)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/190, 0xbe}, {&(0x7f0000001200)=""/184, 0xb8}, {&(0x7f00000012c0)=""/173, 0xad}, {&(0x7f0000001380)=""/243, 0xf3}, {&(0x7f0000001480)=""/89, 0x59}, {&(0x7f0000001500)=""/127, 0x7f}, {&(0x7f0000001580)=""/128, 0x80}], 0x8, 0xffffffff, 0xfffffffd) 17:35:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000006000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2403.685107] FAT-fs (loop0): bogus number of reserved sectors [ 2403.686177] FAT-fs (loop0): Can't find a valid FAT filesystem 17:35:33 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 19) 17:35:34 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 19) [ 2403.781323] FAULT_INJECTION: forcing a failure. [ 2403.781323] name failslab, interval 1, probability 0, space 0, times 0 [ 2403.783226] CPU: 0 PID: 18242 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2403.784345] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2403.785671] Call Trace: [ 2403.786197] dump_stack+0x107/0x167 [ 2403.786799] should_fail.cold+0x5/0xa [ 2403.787548] ? create_object.isra.0+0x3a/0xa20 [ 2403.788308] should_failslab+0x5/0x20 [ 2403.789061] kmem_cache_alloc+0x5b/0x310 [ 2403.789724] ? cred_has_capability.isra.0+0x152/0x2b0 [ 2403.790738] create_object.isra.0+0x3a/0xa20 [ 2403.791478] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2403.792479] kmem_cache_alloc_trace+0x151/0x320 [ 2403.793251] ? v9fs_write_inode+0x60/0x60 [ 2403.794061] v9fs_mount+0x5a/0x8f0 [ 2403.794654] ? v9fs_write_inode+0x60/0x60 [ 2403.795474] legacy_get_tree+0x105/0x220 [ 2403.796140] vfs_get_tree+0x8e/0x300 [ 2403.796877] path_mount+0x13be/0x20b0 [ 2403.797515] ? strncpy_from_user+0x9e/0x470 [ 2403.798362] ? finish_automount+0xa90/0xa90 [ 2403.799068] ? getname_flags.part.0+0x1dd/0x4f0 [ 2403.799995] ? _copy_from_user+0xfb/0x1b0 [ 2403.800694] __x64_sys_mount+0x282/0x300 [ 2403.801489] ? copy_mnt_ns+0xa00/0xa00 [ 2403.802157] do_syscall_64+0x33/0x40 [ 2403.802885] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2403.803724] RIP: 0033:0x7f3da67ebb19 [ 2403.804447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2403.807388] RSP: 002b:00007f3da3d61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2403.808858] RAX: ffffffffffffffda RBX: 00007f3da68fef60 RCX: 00007f3da67ebb19 [ 2403.810065] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2403.811457] RBP: 00007f3da3d611d0 R08: 0000000020000280 R09: 0000000000000000 [ 2403.812830] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2403.814205] R13: 00007ffdf73094ff R14: 00007f3da3d61300 R15: 0000000000022000 [ 2403.821756] FAULT_INJECTION: forcing a failure. [ 2403.821756] name failslab, interval 1, probability 0, space 0, times 0 [ 2403.823020] CPU: 1 PID: 18244 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2403.823767] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2403.824659] Call Trace: [ 2403.824966] dump_stack+0x107/0x167 [ 2403.825370] should_fail.cold+0x5/0xa [ 2403.825796] ? v9fs_mount+0x5a/0x8f0 [ 2403.826209] should_failslab+0x5/0x20 [ 2403.826623] kmem_cache_alloc_trace+0x55/0x320 [ 2403.827119] ? memmove+0x39/0x60 [ 2403.827486] ? v9fs_write_inode+0x60/0x60 [ 2403.827930] v9fs_mount+0x5a/0x8f0 [ 2403.828317] ? v9fs_write_inode+0x60/0x60 [ 2403.828758] legacy_get_tree+0x105/0x220 [ 2403.829195] vfs_get_tree+0x8e/0x300 [ 2403.829587] path_mount+0x13be/0x20b0 [ 2403.830001] ? strncpy_from_user+0x9e/0x470 [ 2403.830469] ? finish_automount+0xa90/0xa90 [ 2403.830935] ? getname_flags.part.0+0x1dd/0x4f0 [ 2403.831442] ? _copy_from_user+0xfb/0x1b0 [ 2403.831897] __x64_sys_mount+0x282/0x300 [ 2403.832333] ? copy_mnt_ns+0xa00/0xa00 [ 2403.832758] do_syscall_64+0x33/0x40 [ 2403.833149] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2403.833696] RIP: 0033:0x7f2cab73ab19 [ 2403.834099] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2403.836057] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2403.836866] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2403.837620] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2403.838383] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2403.839136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2403.839910] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:35:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000007000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:35:47 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 20) 17:35:47 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 20) 17:35:47 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x0) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) [ 2417.434101] FAULT_INJECTION: forcing a failure. [ 2417.434101] name failslab, interval 1, probability 0, space 0, times 0 [ 2417.435424] CPU: 1 PID: 18255 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2417.436188] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2417.437099] Call Trace: [ 2417.437401] dump_stack+0x107/0x167 [ 2417.437807] should_fail.cold+0x5/0xa [ 2417.438234] should_failslab+0x5/0x20 [ 2417.438832] __kmalloc_track_caller+0x79/0x370 17:35:47 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) getpgrp(0x0) r6 = pidfd_open(0x0, 0x0) r7 = dup(r6) mq_notify(r7, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r7}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r8 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r8, 0x0, 0x100000001) 17:35:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:35:47 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpgrp(0x0) pidfd_open(r0, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) r4 = dup(r3) mq_notify(r4, 0x0) accept4$unix(r4, 0x0, &(0x7f0000000100), 0x800) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ieee802154(0x0, r5) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000a80), r7) syz_mount_image$ext4(0x0, 0x0, 0x85ce, 0x0, 0x0, 0x808042, 0x0) sendmsg$IEEE802154_LLSEC_SETPARAMS(r7, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYBLOB="24daa5d2fb8f320c9cdb23b4164b000000", @ANYRES16=r6, @ANYBLOB="000827694e2616bc6b7d5ebd7000fcdbed259fd9df252501000005002b000300000008002c0001000000"], 0x24}, 0x1, 0x0, 0x0, 0x24040800}, 0x0) 17:35:47 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 22) [ 2417.439420] ? v9fs_session_init+0xa7/0x1680 [ 2417.439937] ? kernel_text_address+0xf2/0x120 [ 2417.440448] kstrdup+0x36/0x70 [ 2417.440795] v9fs_session_init+0xa7/0x1680 [ 2417.441277] ? lock_release+0x680/0x680 [ 2417.441706] ? find_held_lock+0x2c/0x110 [ 2417.442150] ? kmem_cache_alloc_trace+0x151/0x320 [ 2417.442672] ? v9fs_show_options+0x690/0x690 [ 2417.443172] ? trace_hardirqs_on+0x5b/0x180 [ 2417.443652] ? kasan_unpoison_shadow+0x33/0x50 [ 2417.444148] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2417.444701] v9fs_mount+0x79/0x8f0 [ 2417.445097] ? v9fs_write_inode+0x60/0x60 [ 2417.445557] legacy_get_tree+0x105/0x220 [ 2417.446010] vfs_get_tree+0x8e/0x300 [ 2417.446424] path_mount+0x13be/0x20b0 [ 2417.446850] ? strncpy_from_user+0x9e/0x470 [ 2417.447344] ? finish_automount+0xa90/0xa90 [ 2417.447824] ? getname_flags.part.0+0x1dd/0x4f0 [ 2417.448340] ? _copy_from_user+0xfb/0x1b0 [ 2417.448820] __x64_sys_mount+0x282/0x300 [ 2417.449259] ? copy_mnt_ns+0xa00/0xa00 [ 2417.449704] do_syscall_64+0x33/0x40 [ 2417.450110] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2417.450670] RIP: 0033:0x7f3da67ebb19 [ 2417.451081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2417.453098] RSP: 002b:00007f3da3d61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2417.453945] RAX: ffffffffffffffda RBX: 00007f3da68fef60 RCX: 00007f3da67ebb19 [ 2417.454732] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2417.455516] RBP: 00007f3da3d611d0 R08: 0000000020000280 R09: 0000000000000000 [ 2417.456301] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2417.457078] R13: 00007ffdf73094ff R14: 00007f3da3d61300 R15: 0000000000022000 [ 2417.464118] FAULT_INJECTION: forcing a failure. [ 2417.464118] name failslab, interval 1, probability 0, space 0, times 0 [ 2417.465414] CPU: 1 PID: 18268 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2417.466173] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2417.467087] Call Trace: [ 2417.467386] dump_stack+0x107/0x167 [ 2417.467804] should_fail.cold+0x5/0xa [ 2417.467959] FAULT_INJECTION: forcing a failure. [ 2417.467959] name failslab, interval 1, probability 0, space 0, times 0 [ 2417.468227] should_failslab+0x5/0x20 [ 2417.468238] __kmalloc_track_caller+0x79/0x370 [ 2417.468248] ? v9fs_session_init+0xe9/0x1680 [ 2417.468259] ? kernel_text_address+0xf2/0x120 [ 2417.468279] kstrdup+0x36/0x70 [ 2417.472852] v9fs_session_init+0xe9/0x1680 [ 2417.473314] ? lock_release+0x680/0x680 [ 2417.473757] ? find_held_lock+0x2c/0x110 [ 2417.474210] ? kmem_cache_alloc_trace+0x151/0x320 [ 2417.474747] ? v9fs_show_options+0x690/0x690 [ 2417.475230] ? trace_hardirqs_on+0x5b/0x180 [ 2417.475732] ? kasan_unpoison_shadow+0x33/0x50 [ 2417.476234] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2417.476806] v9fs_mount+0x79/0x8f0 [ 2417.477204] ? v9fs_write_inode+0x60/0x60 [ 2417.477666] legacy_get_tree+0x105/0x220 [ 2417.478120] vfs_get_tree+0x8e/0x300 [ 2417.478540] path_mount+0x13be/0x20b0 [ 2417.478975] ? strncpy_from_user+0x9e/0x470 [ 2417.479458] ? finish_automount+0xa90/0xa90 [ 2417.479936] ? getname_flags.part.0+0x1dd/0x4f0 [ 2417.480452] ? _copy_from_user+0xfb/0x1b0 [ 2417.480924] __x64_sys_mount+0x282/0x300 [ 2417.481378] ? copy_mnt_ns+0xa00/0xa00 [ 2417.481829] do_syscall_64+0x33/0x40 [ 2417.482243] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2417.482811] RIP: 0033:0x7fcacacb3b19 [ 2417.483225] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2417.485265] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2417.486109] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2417.486901] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2417.487703] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2417.488490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2417.489278] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 [ 2417.490109] CPU: 0 PID: 18267 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2417.491626] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2417.493428] Call Trace: [ 2417.494012] dump_stack+0x107/0x167 [ 2417.494820] should_fail.cold+0x5/0xa [ 2417.495682] should_failslab+0x5/0x20 [ 2417.496516] __kmalloc_track_caller+0x79/0x370 [ 2417.497510] ? v9fs_session_init+0xa7/0x1680 [ 2417.498471] ? kernel_text_address+0xf2/0x120 [ 2417.499470] kstrdup+0x36/0x70 [ 2417.500183] v9fs_session_init+0xa7/0x1680 [ 2417.501112] ? lock_release+0x680/0x680 [ 2417.501979] ? find_held_lock+0x2c/0x110 [ 2417.502888] ? kmem_cache_alloc_trace+0x151/0x320 [ 2417.503948] ? v9fs_show_options+0x690/0x690 [ 2417.504929] ? trace_hardirqs_on+0x5b/0x180 [ 2417.505882] ? kasan_unpoison_shadow+0x33/0x50 [ 2417.506884] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2417.508020] v9fs_mount+0x79/0x8f0 [ 2417.508814] ? v9fs_write_inode+0x60/0x60 [ 2417.509721] legacy_get_tree+0x105/0x220 [ 2417.510619] vfs_get_tree+0x8e/0x300 [ 2417.511445] path_mount+0x13be/0x20b0 [ 2417.512289] ? strncpy_from_user+0x9e/0x470 [ 2417.513236] ? finish_automount+0xa90/0xa90 [ 2417.514191] ? getname_flags.part.0+0x1dd/0x4f0 [ 2417.515204] ? _copy_from_user+0xfb/0x1b0 [ 2417.516148] __x64_sys_mount+0x282/0x300 [ 2417.517041] ? copy_mnt_ns+0xa00/0xa00 [ 2417.517924] do_syscall_64+0x33/0x40 [ 2417.518741] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2417.519867] RIP: 0033:0x7f2cab73ab19 [ 2417.520678] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2417.524672] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2417.526325] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2417.527884] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2417.529426] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2417.531024] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2417.532579] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:35:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000f000019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:35:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002020019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:35:47 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chdir(&(0x7f0000000000)='./file0\x00') mount(&(0x7f00000001c0)=ANY=[@ANYBLOB='/dev/'], &(0x7f0000000200)='./file0\x00', 0x0, 0x3000, 0x0) r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = dup(r1) mq_notify(r2, 0x0) openat(r2, &(0x7f0000000040)='./file0\x00', 0x501000, 0xe0) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r5, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0x9}}, './file0\x00'}) 17:35:47 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) getpgrp(0x0) r6 = pidfd_open(0x0, 0x0) r7 = dup(r6) mq_notify(r7, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r7}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r8 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r8, 0x0, 0x100000001) 17:35:47 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 21) 17:35:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002030019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:35:47 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 23) [ 2417.649649] FAULT_INJECTION: forcing a failure. [ 2417.649649] name failslab, interval 1, probability 0, space 0, times 0 [ 2417.651067] CPU: 1 PID: 18381 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 2417.651851] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2417.652755] Call Trace: [ 2417.653050] dump_stack+0x107/0x167 [ 2417.653464] should_fail.cold+0x5/0xa [ 2417.653881] ? create_object.isra.0+0x3a/0xa20 [ 2417.654378] should_failslab+0x5/0x20 [ 2417.654796] kmem_cache_alloc+0x5b/0x310 [ 2417.655249] create_object.isra.0+0x3a/0xa20 [ 2417.655739] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2417.656296] __kmalloc_track_caller+0x177/0x370 [ 2417.656796] ? v9fs_session_init+0xa7/0x1680 [ 2417.657280] ? kernel_text_address+0xf2/0x120 [ 2417.657768] kstrdup+0x36/0x70 [ 2417.658120] v9fs_session_init+0xa7/0x1680 [ 2417.658598] ? lock_release+0x680/0x680 [ 2417.659027] ? find_held_lock+0x2c/0x110 [ 2417.659501] ? kmem_cache_alloc_trace+0x151/0x320 [ 2417.660018] ? v9fs_show_options+0x690/0x690 [ 2417.660513] ? trace_hardirqs_on+0x5b/0x180 [ 2417.660984] ? kasan_unpoison_shadow+0x33/0x50 [ 2417.661487] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2417.662040] v9fs_mount+0x79/0x8f0 [ 2417.662445] ? v9fs_write_inode+0x60/0x60 [ 2417.662899] legacy_get_tree+0x105/0x220 [ 2417.663366] vfs_get_tree+0x8e/0x300 [ 2417.663784] path_mount+0x13be/0x20b0 [ 2417.664206] ? strncpy_from_user+0x9e/0x470 [ 2417.664672] ? finish_automount+0xa90/0xa90 [ 2417.665150] ? getname_flags.part.0+0x1dd/0x4f0 [ 2417.665650] ? _copy_from_user+0xfb/0x1b0 [ 2417.666120] __x64_sys_mount+0x282/0x300 [ 2417.666558] ? copy_mnt_ns+0xa00/0xa00 [ 2417.667012] do_syscall_64+0x33/0x40 [ 2417.667422] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2417.667985] RIP: 0033:0x7f3da67ebb19 [ 2417.668387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2417.670390] RSP: 002b:00007f3da3d61188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2417.671205] RAX: ffffffffffffffda RBX: 00007f3da68fef60 RCX: 00007f3da67ebb19 [ 2417.671992] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2417.672774] RBP: 00007f3da3d611d0 R08: 0000000020000280 R09: 0000000000000000 [ 2417.673550] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2417.674326] R13: 00007ffdf73094ff R14: 00007f3da3d61300 R15: 0000000000022000 17:35:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:35:47 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 21) [ 2417.712101] cgroup: fork rejected by pids controller in /syz1 [ 2417.727973] FAULT_INJECTION: forcing a failure. [ 2417.727973] name failslab, interval 1, probability 0, space 0, times 0 [ 2417.729249] CPU: 1 PID: 18395 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2417.729984] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2417.730879] Call Trace: [ 2417.731168] dump_stack+0x107/0x167 [ 2417.731582] should_fail.cold+0x5/0xa [ 2417.731991] ? create_object.isra.0+0x3a/0xa20 [ 2417.732485] should_failslab+0x5/0x20 [ 2417.732893] kmem_cache_alloc+0x5b/0x310 [ 2417.733341] create_object.isra.0+0x3a/0xa20 [ 2417.733816] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2417.734373] __kmalloc_track_caller+0x177/0x370 [ 2417.734634] FAULT_INJECTION: forcing a failure. [ 2417.734634] name failslab, interval 1, probability 0, space 0, times 0 [ 2417.734870] ? v9fs_session_init+0xa7/0x1680 [ 2417.734887] kstrdup+0x36/0x70 [ 2417.734898] v9fs_session_init+0xa7/0x1680 [ 2417.734912] ? lock_release+0x680/0x680 [ 2417.734922] ? find_held_lock+0x2c/0x110 [ 2417.734941] ? kmem_cache_alloc_trace+0x151/0x320 [ 2417.739914] ? v9fs_show_options+0x690/0x690 [ 2417.740405] ? trace_hardirqs_on+0x5b/0x180 [ 2417.740870] ? kasan_unpoison_shadow+0x33/0x50 [ 2417.741369] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2417.741919] v9fs_mount+0x79/0x8f0 [ 2417.742308] ? v9fs_write_inode+0x60/0x60 [ 2417.742764] legacy_get_tree+0x105/0x220 [ 2417.743209] vfs_get_tree+0x8e/0x300 [ 2417.743619] path_mount+0x13be/0x20b0 [ 2417.744037] ? strncpy_from_user+0x9e/0x470 [ 2417.744500] ? finish_automount+0xa90/0xa90 [ 2417.744974] ? getname_flags.part.0+0x1dd/0x4f0 [ 2417.745470] ? _copy_from_user+0xfb/0x1b0 [ 2417.745927] __x64_sys_mount+0x282/0x300 [ 2417.746364] ? copy_mnt_ns+0xa00/0xa00 [ 2417.746800] do_syscall_64+0x33/0x40 [ 2417.747203] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2417.747768] RIP: 0033:0x7f2cab73ab19 [ 2417.748168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2417.750156] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2417.750978] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2417.751771] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2417.752550] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2417.753327] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2417.754107] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 [ 2417.754916] CPU: 0 PID: 18389 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2417.756447] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2417.758246] Call Trace: [ 2417.758833] dump_stack+0x107/0x167 [ 2417.759650] should_fail.cold+0x5/0xa [ 2417.760487] ? create_object.isra.0+0x3a/0xa20 [ 2417.761495] should_failslab+0x5/0x20 [ 2417.762328] kmem_cache_alloc+0x5b/0x310 [ 2417.763233] create_object.isra.0+0x3a/0xa20 [ 2417.764210] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2417.765359] __kmalloc_track_caller+0x177/0x370 [ 2417.766365] ? v9fs_session_init+0xe9/0x1680 [ 2417.767375] ? kernel_text_address+0xf2/0x120 [ 2417.768366] kstrdup+0x36/0x70 [ 2417.769096] v9fs_session_init+0xe9/0x1680 [ 2417.770017] ? lock_release+0x680/0x680 [ 2417.770913] ? find_held_lock+0x2c/0x110 [ 2417.771826] ? kmem_cache_alloc_trace+0x151/0x320 [ 2417.772906] ? v9fs_show_options+0x690/0x690 [ 2417.773896] ? trace_hardirqs_on+0x5b/0x180 [ 2417.774868] ? kasan_unpoison_shadow+0x33/0x50 [ 2417.775892] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2417.777009] v9fs_mount+0x79/0x8f0 [ 2417.777802] ? v9fs_write_inode+0x60/0x60 [ 2417.778731] legacy_get_tree+0x105/0x220 [ 2417.779647] vfs_get_tree+0x8e/0x300 [ 2417.780473] path_mount+0x13be/0x20b0 [ 2417.781322] ? strncpy_from_user+0x9e/0x470 [ 2417.782275] ? finish_automount+0xa90/0xa90 [ 2417.783220] ? getname_flags.part.0+0x1dd/0x4f0 [ 2417.784244] ? _copy_from_user+0xfb/0x1b0 [ 2417.785181] __x64_sys_mount+0x282/0x300 [ 2417.786076] ? copy_mnt_ns+0xa00/0xa00 [ 2417.786971] do_syscall_64+0x33/0x40 [ 2417.787808] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2417.788929] RIP: 0033:0x7fcacacb3b19 [ 2417.789750] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2417.793737] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2417.795413] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2417.796966] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2417.798514] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2417.800074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2417.801673] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 17:36:03 executing program 0: r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000200)={0x7fffffff, 0x0, 0x3}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) r4 = dup(r3) mq_notify(r4, 0x0) getpgrp(0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x1, 0xab) r5 = accept4$unix(r1, &(0x7f00000011c0)=@abs, 0x0, 0x80800) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r5) syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)=ANY=[]) r6 = syz_io_uring_complete(0x0) lseek(0xffffffffffffffff, 0x0, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x4c2c1, 0x0) syz_open_dev$vcsa(0x0, 0xa8dc, 0x400) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x9e005, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0xc70}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x80010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x40000000000000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x400, 0x100) mknodat$loop(r6, &(0x7f0000000240)='./file1\x00', 0x1, 0x1) 17:36:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002040019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:36:03 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 24) 17:36:03 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 22) 17:36:03 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) getpgrp(0x0) r6 = pidfd_open(0x0, 0x0) r7 = dup(r6) mq_notify(r7, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r7}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r8 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r8, 0x0, 0x100000001) 17:36:03 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:36:03 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 22) 17:36:03 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2433.375408] FAULT_INJECTION: forcing a failure. [ 2433.375408] name failslab, interval 1, probability 0, space 0, times 0 [ 2433.377888] CPU: 1 PID: 18503 Comm: syz-executor.6 Not tainted 5.10.194 #1 [ 2433.379298] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2433.379627] FAULT_INJECTION: forcing a failure. [ 2433.379627] name failslab, interval 1, probability 0, space 0, times 0 [ 2433.380960] Call Trace: [ 2433.380992] dump_stack+0x107/0x167 [ 2433.381024] should_fail.cold+0x5/0xa [ 2433.381051] ? p9_client_create+0xaf/0x11c0 [ 2433.386112] should_failslab+0x5/0x20 [ 2433.386878] kmem_cache_alloc_trace+0x55/0x320 [ 2433.387836] p9_client_create+0xaf/0x11c0 [ 2433.388683] ? p9_client_flush+0x430/0x430 [ 2433.389564] ? _raw_spin_unlock_irqrestore+0x25/0x40 [ 2433.390608] ? lockdep_init_map_type+0x2c7/0x780 [ 2433.391591] ? __raw_spin_lock_init+0x36/0x110 [ 2433.392543] v9fs_session_init+0x1dd/0x1680 [ 2433.393407] ? lock_release+0x680/0x680 [ 2433.394237] ? kmem_cache_alloc_trace+0x151/0x320 [ 2433.395210] ? v9fs_show_options+0x690/0x690 [ 2433.396145] ? trace_hardirqs_on+0x5b/0x180 [ 2433.397015] ? kasan_unpoison_shadow+0x33/0x50 [ 2433.397953] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2433.398980] v9fs_mount+0x79/0x8f0 [ 2433.399726] ? v9fs_write_inode+0x60/0x60 [ 2433.400580] legacy_get_tree+0x105/0x220 [ 2433.401421] vfs_get_tree+0x8e/0x300 [ 2433.402191] path_mount+0x13be/0x20b0 [ 2433.402981] ? strncpy_from_user+0x9e/0x470 [ 2433.403893] ? finish_automount+0xa90/0xa90 [ 2433.404783] ? getname_flags.part.0+0x1dd/0x4f0 [ 2433.405734] ? _copy_from_user+0xfb/0x1b0 [ 2433.406583] __x64_sys_mount+0x282/0x300 [ 2433.407417] ? copy_mnt_ns+0xa00/0xa00 [ 2433.408255] do_syscall_64+0x33/0x40 [ 2433.409023] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2433.410070] RIP: 0033:0x7fcacacb3b19 [ 2433.410839] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2433.414560] RSP: 002b:00007fcac8229188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2433.416125] RAX: ffffffffffffffda RBX: 00007fcacadc6f60 RCX: 00007fcacacb3b19 [ 2433.417586] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2433.419040] RBP: 00007fcac82291d0 R08: 0000000020000280 R09: 0000000000000000 [ 2433.420509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2433.421957] R13: 00007ffd2a1ee27f R14: 00007fcac8229300 R15: 0000000000022000 [ 2433.423465] CPU: 0 PID: 18506 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2433.424915] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2433.426615] Call Trace: [ 2433.427159] dump_stack+0x107/0x167 [ 2433.427943] should_fail.cold+0x5/0xa [ 2433.428738] should_failslab+0x5/0x20 [ 2433.429526] __kmalloc_track_caller+0x79/0x370 [ 2433.430466] ? v9fs_session_init+0xe9/0x1680 [ 2433.431370] ? kernel_text_address+0xf2/0x120 [ 2433.432332] kstrdup+0x36/0x70 [ 2433.433001] v9fs_session_init+0xe9/0x1680 [ 2433.433873] ? lock_release+0x680/0x680 [ 2433.434696] ? find_held_lock+0x2c/0x110 [ 2433.435555] ? kmem_cache_alloc_trace+0x151/0x320 [ 2433.436548] ? v9fs_show_options+0x690/0x690 [ 2433.437474] ? trace_hardirqs_on+0x5b/0x180 [ 2433.438370] ? kasan_unpoison_shadow+0x33/0x50 [ 2433.439312] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2433.440378] v9fs_mount+0x79/0x8f0 [ 2433.441119] ? v9fs_write_inode+0x60/0x60 [ 2433.441977] legacy_get_tree+0x105/0x220 [ 2433.442816] vfs_get_tree+0x8e/0x300 [ 2433.443596] path_mount+0x13be/0x20b0 [ 2433.444386] ? strncpy_from_user+0x9e/0x470 [ 2433.445275] ? finish_automount+0xa90/0xa90 [ 2433.446157] ? getname_flags.part.0+0x1dd/0x4f0 [ 2433.447104] ? _copy_from_user+0xfb/0x1b0 [ 2433.447997] __x64_sys_mount+0x282/0x300 [ 2433.448834] ? copy_mnt_ns+0xa00/0xa00 [ 2433.449671] do_syscall_64+0x33/0x40 [ 2433.450436] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2433.451479] RIP: 0033:0x7f2cab73ab19 [ 2433.452252] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2433.455984] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2433.457537] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2433.458989] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2433.460449] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2433.461894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2433.463338] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:36:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002050019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:36:03 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) pidfd_open(r6, 0x0) r7 = dup(0xffffffffffffffff) mq_notify(r7, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r7}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r8 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r8, 0x0, 0x100000001) 17:36:03 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002060019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:36:03 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) pidfd_open(r6, 0x0) r7 = dup(0xffffffffffffffff) mq_notify(r7, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r7}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r8 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r8, 0x0, 0x100000001) 17:36:04 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:36:04 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:36:04 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) pidfd_open(r6, 0x0) r7 = dup(0xffffffffffffffff) mq_notify(r7, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r7}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r8 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r8, 0x0, 0x100000001) 17:36:04 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002070019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:36:21 executing program 0: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) pidfd_open(r6, 0x0) r7 = dup(0xffffffffffffffff) mq_notify(r7, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r7}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r8 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r8, 0x0, 0x100000001) 17:36:21 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_RESVSP(r1, 0x40305828, &(0x7f0000000080)={0x0, 0x6, 0x6, 0x6}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="7472616e733d66646e6f3d04000000", @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="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"]) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) dup(r4) r5 = getpgrp(0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) dup(r7) ioctl$INCFS_IOC_PERMIT_FILL(r0, 0x40046721, &(0x7f0000000100)={r7}) r8 = pidfd_open(r5, 0x0) r9 = dup(r8) mq_notify(r9, 0x0) sendfile(r4, r9, &(0x7f0000000000)=0x100, 0x9818) 17:36:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002080019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:36:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 23) 17:36:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 25) [ 2451.109334] 9pnet: Could not find request transport: fdno= 17:36:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:36:21 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(0xffffffffffffffff, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:36:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, 0x0) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) [ 2451.137199] FAULT_INJECTION: forcing a failure. [ 2451.137199] name failslab, interval 1, probability 0, space 0, times 0 [ 2451.139550] CPU: 0 PID: 19051 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2451.140972] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2451.142652] Call Trace: [ 2451.143202] dump_stack+0x107/0x167 [ 2451.143979] should_fail.cold+0x5/0xa [ 2451.144764] ? create_object.isra.0+0x3a/0xa20 [ 2451.145699] should_failslab+0x5/0x20 [ 2451.146475] kmem_cache_alloc+0x5b/0x310 [ 2451.147319] create_object.isra.0+0x3a/0xa20 [ 2451.148223] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2451.149267] __kmalloc_track_caller+0x177/0x370 [ 2451.150210] ? v9fs_session_init+0xe9/0x1680 [ 2451.151106] ? kernel_text_address+0xf2/0x120 [ 2451.152050] kstrdup+0x36/0x70 [ 2451.152712] v9fs_session_init+0xe9/0x1680 [ 2451.153582] ? lock_release+0x680/0x680 [ 2451.154391] ? find_held_lock+0x2c/0x110 [ 2451.155235] ? kmem_cache_alloc_trace+0x151/0x320 [ 2451.156223] ? v9fs_show_options+0x690/0x690 [ 2451.157148] ? trace_hardirqs_on+0x5b/0x180 [ 2451.158037] ? kasan_unpoison_shadow+0x33/0x50 [ 2451.158970] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2451.160023] v9fs_mount+0x79/0x8f0 [ 2451.160758] ? v9fs_write_inode+0x60/0x60 [ 2451.161605] legacy_get_tree+0x105/0x220 [ 2451.162438] vfs_get_tree+0x8e/0x300 [ 2451.163209] path_mount+0x13be/0x20b0 [ 2451.164017] ? strncpy_from_user+0x9e/0x470 [ 2451.164903] ? finish_automount+0xa90/0xa90 [ 2451.165783] ? getname_flags.part.0+0x1dd/0x4f0 [ 2451.166726] ? _copy_from_user+0xfb/0x1b0 [ 2451.167582] __x64_sys_mount+0x282/0x300 [ 2451.168418] ? copy_mnt_ns+0xa00/0xa00 [ 2451.169239] do_syscall_64+0x33/0x40 17:36:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002180019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2451.170000] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2451.171128] RIP: 0033:0x7f2cab73ab19 [ 2451.171894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2451.175588] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2451.177148] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2451.178587] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2451.180033] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2451.181473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2451.182919] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:36:21 executing program 0: ftruncate(0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0}, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000000180), 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x0, 0x0, 0x0, 0x0, 0x12345}, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/asound/seq/clients\x00', 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1000001, 0x10, r1, 0x0) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) r4 = dup(r3) mq_notify(r4, 0x0) io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) getpid() r6 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r6, 0x0, 0x100000001) 17:36:21 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(0xffffffffffffffff, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:36:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:36:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000021c0019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:36:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:36:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000026b0019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:36:37 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(0x0) getpgrp(0x0) 17:36:37 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(0xffffffffffffffff, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:36:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x9, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:36:37 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 24) 17:36:37 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:36:37 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000a40), 0x0, 0x0) fsetxattr$security_ima(r0, &(0x7f0000000140), &(0x7f00000004c0)=ANY=[@ANYBLOB="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"], 0x54, 0x1) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), r0) sendmsg$DEVLINK_CMD_RATE_NEW(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000100)={&(0x7f0000001b00)=ANY=[@ANYBLOB="98000000d5e40f3640b3d794d023ee4ae1981417a3ef8f5db915ebde70d235181d14ff7c0626958ec8dc51a8e6c7151ab3334aec270db44dcfc460b5deb295484ab4d2b3e4f29ba6b08612d47353f73c1ab2865f3c9673a8eb14c050e2f13bab6c383759b4df5374b045fc19cd1396bafe88ed6803d36489b1bdccb009f180e48c6d8b147f039a", @ANYRES16=r2, @ANYBLOB="000825bd7000ffdbdf254c0000008099c30f62ee38628afaf7339bfe74dc62fdc960dbc5bc02aa6eada3bc8300a900ca442f7a175cc2d980e78cda3d74be5f1612ae31de57798eaa094828d7b2d5f483a7755090baffb630ab8b262d377a3d5cfa97ef270421153c7ba4040f7c6766161ab9c833ada1e7a21a2f1095782cca6cbf760217d200000f00a8007365636f6e646e616d6500000e00a90066697273746e616d65000000080003050200000099fc20d92159ce6835c91463470deda59dfdbe46dc"], 0x98}, 0x1, 0x0, 0x0, 0x20000000}, 0x1) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080), 0xc, &(0x7f0000000180)={&(0x7f00000003c0)={0x5c, r2, 0x400, 0x70bd2a, 0x25dfdbff, {}, [{@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x4}}, {@pci={{0x8}, {0x11}}, {0x8, 0xb, 0x1}}]}, 0x5c}, 0x1, 0x0, 0x0, 0x40080}, 0x4008000) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_START_SCHED_SCAN(r3, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000100)={&(0x7f0000000280)={0x68, 0x0, 0x8, 0x70bd28, 0x25dfdbfd, {{}, {@void, @val={0xc, 0x99, {0x2b, 0x4b}}}}, [@NL80211_ATTR_SCAN_FREQUENCIES={0x34, 0x2c, 0x0, 0x1, [{0x8, 0x0, 0x5}, {0x8, 0x0, 0xf7}, {0x8, 0x0, 0x8}, {0x8, 0x0, 0x1}, {0x8, 0x0, 0x2}, {0x8, 0x0, 0x8}]}, @NL80211_ATTR_SCHED_SCAN_DELAY={0x8, 0xdc, 0x9}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mq_notify(0xffffffffffffffff, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = dup(r4) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000240)={0x24, r7, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r6}, @void}}, [@NL80211_ATTR_4ADDR={0x5, 0x53, 0x1}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000480)={&(0x7f0000000a80)={0x1060, r7, 0xf00, 0x70bd27, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_FRAME_MATCH={0x40, 0x5b, "51ab482d363a0e938bbb799ecb19781e970a00ec5e5c1c29c60e4247861ffad76fa9e6da59dc148d57ae80791d91bb4a911d5b2b4bca82219e6e38fb"}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x800}, @NL80211_ATTR_FRAME_MATCH={0x1004, 0x5b, "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"}]}, 0x1060}, 0x1, 0x0, 0x0, 0x800}, 0x20040090) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="7472616e733d66642c7245646e79040d046fc7f73c1d12fe6a5d0bcb3447d912c79ebd3698b29a13853294", @ANYRESHEX=r8, @ANYBLOB=',wfdno=', @ANYRESHEX=r9, @ANYBLOB="2c6163636573733d616e792c646566636f6e746578743d73797374656d5f752c6d6561737572652c736d61636b6673666c6f6f723dd2403a2d3a403a2424402c6f626a5f747970653d2c00"]) 17:36:37 executing program 0: fork() r0 = perf_event_open(0x0, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/vmstat\x00', 0x0, 0x0) r1 = timerfd_create(0x9, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) timerfd_settime(r1, 0x1, &(0x7f0000000000)={{0x77359400}, {r2, r3+60000000}}, 0x0) timerfd_gettime(r1, 0x0) r4 = getpgrp(0x0) pidfd_open(r4, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x1}, 0x1008, 0x0, 0x0, 0x7, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, r4, 0x100000000, 0xffffffffffffffff, 0x9) sync() fcntl$addseals(r0, 0x409, 0x1) [ 2467.583036] FAULT_INJECTION: forcing a failure. [ 2467.583036] name failslab, interval 1, probability 0, space 0, times 0 [ 2467.585923] CPU: 1 PID: 19594 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2467.587536] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2467.589503] Call Trace: [ 2467.590144] dump_stack+0x107/0x167 [ 2467.590956] should_fail.cold+0x5/0xa [ 2467.591809] ? p9_client_create+0xaf/0x11c0 [ 2467.592865] should_failslab+0x5/0x20 [ 2467.593720] kmem_cache_alloc_trace+0x55/0x320 [ 2467.594843] ? find_held_lock+0x2c/0x110 [ 2467.595782] p9_client_create+0xaf/0x11c0 [ 2467.596814] ? lock_downgrade+0x6d0/0x6d0 [ 2467.597745] ? p9_client_flush+0x430/0x430 [ 2467.598756] ? trace_hardirqs_on+0x5b/0x180 [ 2467.599797] ? lockdep_init_map_type+0x2c7/0x780 [ 2467.600928] ? __raw_spin_lock_init+0x36/0x110 [ 2467.601964] v9fs_session_init+0x1dd/0x1680 [ 2467.603010] ? lock_release+0x680/0x680 [ 2467.603998] ? kmem_cache_alloc_trace+0x151/0x320 [ 2467.605157] ? v9fs_show_options+0x690/0x690 [ 2467.606254] ? trace_hardirqs_on+0x5b/0x180 [ 2467.607254] ? kasan_unpoison_shadow+0x33/0x50 [ 2467.608400] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2467.609552] v9fs_mount+0x79/0x8f0 [ 2467.610357] ? v9fs_write_inode+0x60/0x60 [ 2467.611380] legacy_get_tree+0x105/0x220 [ 2467.612348] vfs_get_tree+0x8e/0x300 [ 2467.613200] path_mount+0x13be/0x20b0 [ 2467.614162] ? strncpy_from_user+0x9e/0x470 [ 2467.615174] ? finish_automount+0xa90/0xa90 [ 2467.616159] ? getname_flags.part.0+0x1dd/0x4f0 [ 2467.617210] ? _copy_from_user+0xfb/0x1b0 [ 2467.618167] __x64_sys_mount+0x282/0x300 [ 2467.619089] ? copy_mnt_ns+0xa00/0xa00 [ 2467.620006] do_syscall_64+0x33/0x40 [ 2467.620859] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2467.622046] RIP: 0033:0x7f2cab73ab19 [ 2467.622897] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2467.627324] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2467.629173] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2467.630810] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2467.632464] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2467.634100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2467.635735] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:36:37 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002f00019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:36:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:36:38 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(0x0) getpgrp(0x0) 17:36:38 executing program 0: pidfd_send_signal(0xffffffffffffffff, 0x10, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)={0x0, 0x2}) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) stat(&(0x7f0000000440)='.\x00', &(0x7f0000001c00)) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f0000000080)) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_io_uring_complete(0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) r2 = pidfd_open(0x0, 0x0) ioctl$F2FS_IOC_DEFRAGMENT(r2, 0xc010f508, &(0x7f0000000000)={0x8, 0x5}) unshare(0x48020200) 17:36:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000319000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:36:38 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = dup(r1) mq_notify(r2, 0x0) getpgrp(0x0) r3 = pidfd_open(0x0, 0x0) r4 = dup(r3) mq_notify(r4, 0x0) r5 = getpgrp(0x0) r6 = pidfd_open(r5, 0x0) r7 = dup(r6) mq_notify(r7, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r8 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r8, 0x0, 0x100000001) 17:36:38 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:36:38 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 25) 17:36:38 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = dup(r1) mq_notify(r2, 0x0) getsockname(r2, &(0x7f0000000100)=@in={0x2, 0x0, @broadcast}, &(0x7f0000000000)=0x80) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB, @ANYRESHEX=r4, @ANYBLOB="2c6163636573733d616e792c646566636f6e746578743d73797374656d5f752c6d6561737572652c736d61636b6673666c6f6f723dd2403a2d3a403a2424402c6f626a5f747970653d2c00"]) 17:36:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002800419000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2468.049790] FAULT_INJECTION: forcing a failure. [ 2468.049790] name failslab, interval 1, probability 0, space 0, times 0 [ 2468.052146] CPU: 0 PID: 20124 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2468.053521] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2468.055163] Call Trace: [ 2468.055703] dump_stack+0x107/0x167 [ 2468.056461] should_fail.cold+0x5/0xa [ 2468.057225] ? create_object.isra.0+0x3a/0xa20 [ 2468.058140] should_failslab+0x5/0x20 [ 2468.058898] kmem_cache_alloc+0x5b/0x310 [ 2468.059704] ? kernel_text_address+0xf2/0x120 [ 2468.060616] create_object.isra.0+0x3a/0xa20 [ 2468.061488] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2468.062508] kmem_cache_alloc_trace+0x151/0x320 [ 2468.063429] ? find_held_lock+0x2c/0x110 [ 2468.064262] p9_client_create+0xaf/0x11c0 [ 2468.065092] ? lock_downgrade+0x6d0/0x6d0 [ 2468.065933] ? p9_client_flush+0x430/0x430 [ 2468.066791] ? trace_hardirqs_on+0x5b/0x180 [ 2468.067657] ? lockdep_init_map_type+0x2c7/0x780 [ 2468.068635] ? __raw_spin_lock_init+0x36/0x110 [ 2468.069560] v9fs_session_init+0x1dd/0x1680 [ 2468.070422] ? lock_release+0x680/0x680 [ 2468.071233] ? kmem_cache_alloc_trace+0x151/0x320 [ 2468.072198] ? v9fs_show_options+0x690/0x690 [ 2468.073098] ? trace_hardirqs_on+0x5b/0x180 [ 2468.073964] ? kasan_unpoison_shadow+0x33/0x50 [ 2468.074883] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2468.075901] v9fs_mount+0x79/0x8f0 [ 2468.076637] ? v9fs_write_inode+0x60/0x60 [ 2468.077465] legacy_get_tree+0x105/0x220 [ 2468.078282] vfs_get_tree+0x8e/0x300 [ 2468.079030] path_mount+0x13be/0x20b0 [ 2468.079799] ? strncpy_from_user+0x9e/0x470 [ 2468.080671] ? finish_automount+0xa90/0xa90 [ 2468.081532] ? getname_flags.part.0+0x1dd/0x4f0 [ 2468.082455] ? _copy_from_user+0xfb/0x1b0 [ 2468.083306] __x64_sys_mount+0x282/0x300 [ 2468.084133] ? copy_mnt_ns+0xa00/0xa00 [ 2468.084938] do_syscall_64+0x33/0x40 [ 2468.085686] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2468.086700] RIP: 0033:0x7f2cab73ab19 [ 2468.087441] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2468.091079] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2468.092601] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2468.094008] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2468.095414] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2468.096832] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2468.098242] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:36:38 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = dup(r1) mq_notify(r2, 0x0) getpgrp(0x0) r3 = pidfd_open(0x0, 0x0) r4 = dup(r3) mq_notify(r4, 0x0) r5 = getpgrp(0x0) r6 = pidfd_open(r5, 0x0) r7 = dup(r6) mq_notify(r7, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r8 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r8, 0x0, 0x100000001) 17:36:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:36:38 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000519000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:36:53 executing program 0: r0 = inotify_init1(0x0) syz_mount_image$nfs4(0x0, &(0x7f0000005040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000080)='ext4\x00', 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = dup2(r2, r3) fsync(r2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000240)=0x6) preadv(r4, &(0x7f0000000100)=[{&(0x7f0000000280)=""/235, 0xeb}, {&(0x7f0000000180)=""/190, 0xbe}], 0x2, 0x99c, 0xc69) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f00000000c0)={0x5219, 0x7ff, 0x7fff, 0x7fffffff, 0x101, 0x8}) r5 = fcntl$dupfd(r0, 0x0, r0) inotify_add_watch(r5, &(0x7f0000000140)='./file0\x00', 0x12000440) rmdir(&(0x7f0000000000)='./file0\x00') 17:36:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000619000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:36:53 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 26) 17:36:53 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x100000001, 0x0, 0x0, 0x40, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) dup(r3) r4 = getpgrp(0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000000)=')\'$\x8e!^}:\'&\x00', &(0x7f0000000080)='./file1\x00', 0xffffffffffffffff) r5 = pidfd_open(r4, 0x0) dup(r5) fcntl$dupfd(r3, 0x0, r5) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733d616e792c646566636f6e746578743d73797374656d5f752c6d6561737572652c736d61636b6673666c6f6f723dd2403a2d3a403a2424402c6f626a5f745e70653d2c00"]) 17:36:53 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(0x0) getpgrp(0x0) 17:36:53 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x10, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:36:53 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = dup(r1) mq_notify(r2, 0x0) getpgrp(0x0) r3 = pidfd_open(0x0, 0x0) r4 = dup(r3) mq_notify(r4, 0x0) r5 = getpgrp(0x0) r6 = pidfd_open(r5, 0x0) r7 = dup(r6) mq_notify(r7, 0x0) io_submit(0x0, 0x0, 0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r8 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r8, 0x0, 0x100000001) 17:36:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:36:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000719000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2483.604421] FAULT_INJECTION: forcing a failure. [ 2483.604421] name failslab, interval 1, probability 0, space 0, times 0 [ 2483.606829] CPU: 0 PID: 20623 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2483.608287] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2483.609979] Call Trace: [ 2483.610534] dump_stack+0x107/0x167 [ 2483.611296] should_fail.cold+0x5/0xa [ 2483.612101] should_failslab+0x5/0x20 [ 2483.612928] __kmalloc_track_caller+0x79/0x370 [ 2483.613862] ? p9_client_create+0x41d/0x11c0 [ 2483.614765] kstrdup+0x36/0x70 [ 2483.615426] p9_client_create+0x41d/0x11c0 [ 2483.616301] ? lock_downgrade+0x6d0/0x6d0 [ 2483.617151] ? p9_client_flush+0x430/0x430 [ 2483.618015] ? trace_hardirqs_on+0x5b/0x180 [ 2483.618909] ? lockdep_init_map_type+0x2c7/0x780 [ 2483.619878] ? __raw_spin_lock_init+0x36/0x110 [ 2483.620848] v9fs_session_init+0x1dd/0x1680 [ 2483.621738] ? lock_release+0x680/0x680 [ 2483.622570] ? kmem_cache_alloc_trace+0x151/0x320 [ 2483.623555] ? v9fs_show_options+0x690/0x690 [ 2483.624486] ? trace_hardirqs_on+0x5b/0x180 [ 2483.625372] ? kasan_unpoison_shadow+0x33/0x50 [ 2483.626304] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2483.627347] v9fs_mount+0x79/0x8f0 [ 2483.628079] ? v9fs_write_inode+0x60/0x60 [ 2483.628945] legacy_get_tree+0x105/0x220 [ 2483.629787] vfs_get_tree+0x8e/0x300 [ 2483.630547] path_mount+0x13be/0x20b0 [ 2483.631341] ? strncpy_from_user+0x9e/0x470 [ 2483.632237] ? finish_automount+0xa90/0xa90 [ 2483.633119] ? getname_flags.part.0+0x1dd/0x4f0 [ 2483.634061] ? _copy_from_user+0xfb/0x1b0 [ 2483.634934] __x64_sys_mount+0x282/0x300 [ 2483.635766] ? copy_mnt_ns+0xa00/0xa00 [ 2483.636596] do_syscall_64+0x33/0x40 [ 2483.637357] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2483.638394] RIP: 0033:0x7f2cab73ab19 [ 2483.639152] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2483.642880] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2483.644445] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2483.645888] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2483.647344] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2483.648819] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2483.650276] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:36:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x5, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:36:53 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x7, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:36:53 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002001819000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:36:54 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x10e, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:36:54 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000780)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="25760f18274601000000000000000000010000000e0001004e4c42"], 0x24}}, 0x0) syz_open_procfs(0x0, &(0x7f0000000700)='clear_refs\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000700)='clear_refs\x00') writev(r1, &(0x7f0000000200)=[{&(0x7f0000000040)='3', 0x1}, {&(0x7f0000000100)}], 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x40a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) sendmsg$IEEE802154_LLSEC_LIST_DEVKEY(r0, &(0x7f00000004c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f00000002c0)={0x14, 0x0, 0x200, 0x70bd2d, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x20008084) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)}, 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/170, 0xaa}], 0x1) r2 = syz_open_procfs(0x0, &(0x7f0000000700)='clear_refs\x00') writev(r2, &(0x7f0000000200)=[{&(0x7f0000000040)='3', 0x1}, {&(0x7f0000000100)='5T', 0x2}], 0x2) r3 = pidfd_open(0x0, 0x0) r4 = dup(r3) mq_notify(r4, 0x0) writev(r4, &(0x7f0000000ac0)=[{&(0x7f00000007c0)="b5fd7caa7d175c62ca8cebc67dc181dee0802d81fba5a60cc89aab26a1d1aaaa115e175947d40aa0ed3d114214d1db412e185ea9e1001a877a90130adcda209a63ff1e22bc485fe3b63e2e4c38037b599037c6081b6dd5c5843de3f2f97c5ec1f8559f089414acd80cdba90c0af3c1fd6e2304a9eacf32c88448ab565fa346cb6f70b0b35c8c115bf9b2cd806ab7106b725f8146da808ceb", 0x98}, {&(0x7f0000000500)="6fe9e98aceb0d26bdd0a61e9a818ca304ab01ad5e44c4ac56d2b4c5bd197b6a390072acc53abe719a82666a8ea8c320cd9cdf2c67bcddeb92e34e9bcdba43e866ac205c5", 0x44}, {&(0x7f0000000880)="bc4e9b9be34eebd60234a9b42de4f151baaaaea282c9014ac97b9471cd151bdfe50586cc3667c603df2ff405b335d799f85df4d57501fcb441acdc22560994c820b477018818315e1991", 0x4a}, {&(0x7f0000000900)="062ee66f54ee820aaa355bd96569b1d889748d8dd357794eb87cf127804409afb861b7d3143d32dcb02e49fc801c594fc8ac12e2cbc8f009d318883f3e3c8a56060c53bb9326be3c08e73f1ad7fe2ae96101fec908e5d1264f9a9e8d75e263dd2943ff142b8304041d1068cb65fe6b40ee44999953b4fbd20fd919154734db0286f65183ebe51330a58fb4bec3403766fbee3ebc579bd9f47a411d12b48c4c4ebf6cd078d75849ffaf540bb74219fcbd65a5bfa78d86149c25861169f12c7953937ed719fc2e9877288c2ee77f25c3e627ee8ed410b34638062315e48483f6e9bbd12cf6303538", 0xe7}, {&(0x7f0000000a00)="5eaf33189edc7946d3ab40774dd1f487c9793f0bad58cc660a44d40fa1bc09dd0261b992202ff791a596fffbe9e6e83dfa94d1d7b6d0f546e3275df669538566cbc4c1368ea265b6de61512c9995a73d190f7a429e372f48d993de706ffcd16ec4afe10fe634686424ac0268315f2a46f9812ea8da6c177a60a7ab09ff59a1e0ada8694f03fe40286121d173e3e8ba5c3fb4036979c5d0250ba1b4c0", 0x9c}], 0x5) r5 = accept4$packet(r2, &(0x7f00000000c0), &(0x7f00000001c0)=0x8, 0x81800) recvmmsg(r5, &(0x7f0000000680)=[{{0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000b40)=""/84, 0x54}, {&(0x7f00000003c0)=""/171, 0xab}, {&(0x7f0000000580)=""/181, 0xb5}], 0x3}, 0x8000}], 0x1, 0x40002003, &(0x7f0000000740)) ftruncate(0xffffffffffffffff, 0x0) unshare(0x48020200) 17:36:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002001c19000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:36:54 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x7, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) [ 2483.875407] FAULT_INJECTION: forcing a failure. [ 2483.875407] name failslab, interval 1, probability 0, space 0, times 0 [ 2483.876798] CPU: 1 PID: 21006 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2483.877545] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2483.878446] Call Trace: [ 2483.878737] dump_stack+0x107/0x167 [ 2483.879142] should_fail.cold+0x5/0xa [ 2483.879583] ? create_object.isra.0+0x3a/0xa20 [ 2483.880091] should_failslab+0x5/0x20 [ 2483.880527] kmem_cache_alloc+0x5b/0x310 [ 2483.880977] ? lock_downgrade+0x6d0/0x6d0 [ 2483.881430] create_object.isra.0+0x3a/0xa20 [ 2483.881910] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2483.882456] __kmalloc_track_caller+0x177/0x370 [ 2483.882966] ? p9_client_create+0x41d/0x11c0 [ 2483.883455] kstrdup+0x36/0x70 [ 2483.883814] p9_client_create+0x41d/0x11c0 [ 2483.884288] ? lock_downgrade+0x6d0/0x6d0 17:36:54 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 27) 17:36:54 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x7, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) [ 2483.884748] ? p9_client_flush+0x430/0x430 [ 2483.885399] ? trace_hardirqs_on+0x5b/0x180 [ 2483.885897] ? lockdep_init_map_type+0x2c7/0x780 [ 2483.886559] ? __raw_spin_lock_init+0x36/0x110 [ 2483.887095] v9fs_session_init+0x1dd/0x1680 [ 2483.887588] ? lock_release+0x680/0x680 [ 2483.888054] ? kmem_cache_alloc_trace+0x151/0x320 [ 2483.888616] ? v9fs_show_options+0x690/0x690 [ 2483.889134] ? trace_hardirqs_on+0x5b/0x180 [ 2483.889636] ? kasan_unpoison_shadow+0x33/0x50 [ 2483.890169] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2483.890756] v9fs_mount+0x79/0x8f0 [ 2483.891176] ? v9fs_write_inode+0x60/0x60 [ 2483.891650] legacy_get_tree+0x105/0x220 [ 2483.892121] vfs_get_tree+0x8e/0x300 [ 2483.892561] path_mount+0x13be/0x20b0 [ 2483.893001] ? strncpy_from_user+0x9e/0x470 [ 2483.893518] ? finish_automount+0xa90/0xa90 [ 2483.894020] ? getname_flags.part.0+0x1dd/0x4f0 [ 2483.894556] ? _copy_from_user+0xfb/0x1b0 [ 2483.895048] __x64_sys_mount+0x282/0x300 [ 2483.895525] ? copy_mnt_ns+0xa00/0xa00 [ 2483.895994] do_syscall_64+0x33/0x40 [ 2483.896438] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2483.897025] RIP: 0033:0x7f2cab73ab19 [ 2483.897469] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2483.899607] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2483.900489] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2483.901298] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2483.902123] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2483.902950] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2483.903770] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:37:07 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 1) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:37:07 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, 0x0]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) [ 2497.472555] FAULT_INJECTION: forcing a failure. [ 2497.472555] name failslab, interval 1, probability 0, space 0, times 0 [ 2497.473838] CPU: 1 PID: 21200 Comm: syz-executor.4 Not tainted 5.10.194 #1 17:37:07 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 28) 17:37:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002002019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:37:07 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x132, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:37:07 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) r4 = dup(r3) mq_notify(r4, 0x0) ioctl$GIO_CMAP(r4, 0x4b70, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:37:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_POOL(r0, 0x40a85323, &(0x7f0000000080)={0x80}) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) dup(r2) fcntl$dupfd(r0, 0x0, r2) 17:37:07 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2497.474775] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2497.475688] Call Trace: [ 2497.475987] dump_stack+0x107/0x167 [ 2497.476384] should_fail.cold+0x5/0xa [ 2497.476795] should_failslab+0x5/0x20 [ 2497.477202] __kmalloc_track_caller+0x79/0x370 [ 2497.477687] ? p9_client_create+0x51e/0x11c0 [ 2497.478170] kmemdup_nul+0x2d/0xa0 [ 2497.478552] p9_client_create+0x51e/0x11c0 [ 2497.479022] ? p9_client_flush+0x430/0x430 [ 2497.479477] ? trace_hardirqs_on+0x5b/0x180 [ 2497.479939] ? lockdep_init_map_type+0x2c7/0x780 [ 2497.480454] ? __raw_spin_lock_init+0x36/0x110 [ 2497.480948] v9fs_session_init+0x1dd/0x1680 [ 2497.481408] ? lock_release+0x680/0x680 [ 2497.481846] ? kmem_cache_alloc_trace+0x151/0x320 [ 2497.482390] ? v9fs_show_options+0x690/0x690 [ 2497.482886] ? trace_hardirqs_on+0x5b/0x180 [ 2497.483367] ? kasan_unpoison_shadow+0x33/0x50 [ 2497.483872] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2497.484458] v9fs_mount+0x79/0x8f0 [ 2497.484850] ? v9fs_write_inode+0x60/0x60 [ 2497.485320] legacy_get_tree+0x105/0x220 [ 2497.485768] vfs_get_tree+0x8e/0x300 [ 2497.486196] path_mount+0x13be/0x20b0 [ 2497.486626] ? strncpy_from_user+0x9e/0x470 [ 2497.487108] ? finish_automount+0xa90/0xa90 [ 2497.487599] ? getname_flags.part.0+0x1dd/0x4f0 [ 2497.488124] ? _copy_from_user+0xfb/0x1b0 [ 2497.488606] __x64_sys_mount+0x282/0x300 [ 2497.489064] ? copy_mnt_ns+0xa00/0xa00 [ 2497.489503] do_syscall_64+0x33/0x40 [ 2497.489922] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2497.490489] RIP: 0033:0x7f2cab73ab19 [ 2497.490893] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2497.492953] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2497.493797] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2497.494564] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2497.495363] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2497.496157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2497.496958] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 [ 2497.521964] FAULT_INJECTION: forcing a failure. [ 2497.521964] name failslab, interval 1, probability 0, space 0, times 0 [ 2497.524551] CPU: 0 PID: 21231 Comm: syz-executor.7 Not tainted 5.10.194 #1 [ 2497.526067] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2497.527873] Call Trace: [ 2497.528472] dump_stack+0x107/0x167 [ 2497.529284] should_fail.cold+0x5/0xa [ 2497.530137] should_failslab+0x5/0x20 [ 2497.530977] __kmalloc_track_caller+0x79/0x370 [ 2497.531975] ? strndup_user+0x74/0xe0 [ 2497.532840] memdup_user+0x22/0xd0 [ 2497.533627] strndup_user+0x74/0xe0 [ 2497.534434] __x64_sys_mount+0x133/0x300 [ 2497.535329] ? copy_mnt_ns+0xa00/0xa00 [ 2497.536216] do_syscall_64+0x33/0x40 [ 2497.537054] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2497.538172] RIP: 0033:0x7fe0d1e05b19 [ 2497.539001] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2497.543061] RSP: 002b:00007fe0cf37b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2497.544748] RAX: ffffffffffffffda RBX: 00007fe0d1f18f60 RCX: 00007fe0d1e05b19 [ 2497.546323] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2497.547901] RBP: 00007fe0cf37b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 2497.549466] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2497.551018] R13: 00007fff43d3beff R14: 00007fe0cf37b300 R15: 0000000000022000 17:37:07 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, 0x0]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:37:07 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) ftruncate(r0, 0xffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000540)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, {0xffff}}, 0x8a1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x0, 0x0, 0x3, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000002c0)=@IORING_OP_TIMEOUT_REMOVE={0xc, 0x1, 0x0, 0x0, 0x0, 0x12345}, 0x2) r2 = fsmount(0xffffffffffffffff, 0x0, 0x88) dup2(r2, 0xffffffffffffffff) getsockopt$inet_opts(r2, 0x0, 0x0, &(0x7f0000000140)=""/230, &(0x7f0000000040)=0xe6) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) fcntl$dupfd(r5, 0x406, r3) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) getpid() r6 = openat(r2, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) sendfile(r1, r6, 0x0, 0x100000001) 17:37:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002003f19000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:37:07 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 2) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:37:07 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, 0x0]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:37:07 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 29) [ 2497.722102] FAULT_INJECTION: forcing a failure. [ 2497.722102] name failslab, interval 1, probability 0, space 0, times 0 [ 2497.723428] CPU: 1 PID: 21405 Comm: syz-executor.7 Not tainted 5.10.194 #1 [ 2497.724172] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2497.725061] Call Trace: [ 2497.725365] dump_stack+0x107/0x167 [ 2497.725764] should_fail.cold+0x5/0xa [ 2497.726189] ? create_object.isra.0+0x3a/0xa20 [ 2497.726687] should_failslab+0x5/0x20 [ 2497.727100] kmem_cache_alloc+0x5b/0x310 [ 2497.727568] create_object.isra.0+0x3a/0xa20 [ 2497.728151] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2497.728711] __kmalloc_track_caller+0x177/0x370 [ 2497.729208] ? strndup_user+0x74/0xe0 [ 2497.729620] memdup_user+0x22/0xd0 [ 2497.730015] strndup_user+0x74/0xe0 [ 2497.730422] __x64_sys_mount+0x133/0x300 [ 2497.730855] ? copy_mnt_ns+0xa00/0xa00 [ 2497.731290] do_syscall_64+0x33/0x40 [ 2497.731691] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2497.732244] RIP: 0033:0x7fe0d1e05b19 [ 2497.732653] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2497.734601] RSP: 002b:00007fe0cf37b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2497.735422] RAX: ffffffffffffffda RBX: 00007fe0d1f18f60 RCX: 00007fe0d1e05b19 [ 2497.736188] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2497.736966] RBP: 00007fe0cf37b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 2497.737740] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2497.738512] R13: 00007fff43d3beff R14: 00007fe0cf37b300 R15: 0000000000022000 17:37:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x17e, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:37:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002006b19000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2497.822152] FAULT_INJECTION: forcing a failure. [ 2497.822152] name failslab, interval 1, probability 0, space 0, times 0 [ 2497.824697] CPU: 0 PID: 21435 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2497.826208] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2497.828013] Call Trace: [ 2497.828616] dump_stack+0x107/0x167 [ 2497.829427] should_fail.cold+0x5/0xa [ 2497.830273] ? create_object.isra.0+0x3a/0xa20 [ 2497.831277] should_failslab+0x5/0x20 [ 2497.832111] kmem_cache_alloc+0x5b/0x310 [ 2497.833041] create_object.isra.0+0x3a/0xa20 [ 2497.834002] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2497.835121] __kmalloc_track_caller+0x177/0x370 [ 2497.836137] ? p9_client_create+0x51e/0x11c0 [ 2497.837125] kmemdup_nul+0x2d/0xa0 [ 2497.837910] p9_client_create+0x51e/0x11c0 [ 2497.838880] ? p9_client_flush+0x430/0x430 [ 2497.839813] ? trace_hardirqs_on+0x5b/0x180 [ 2497.840773] ? lockdep_init_map_type+0x2c7/0x780 [ 2497.841827] ? __raw_spin_lock_init+0x36/0x110 [ 2497.842846] v9fs_session_init+0x1dd/0x1680 [ 2497.843798] ? lock_release+0x680/0x680 [ 2497.844701] ? kmem_cache_alloc_trace+0x151/0x320 [ 2497.845758] ? v9fs_show_options+0x690/0x690 [ 2497.846748] ? trace_hardirqs_on+0x5b/0x180 [ 2497.847698] ? kasan_unpoison_shadow+0x33/0x50 [ 2497.848703] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2497.849820] v9fs_mount+0x79/0x8f0 [ 2497.850607] ? v9fs_write_inode+0x60/0x60 [ 2497.851515] legacy_get_tree+0x105/0x220 [ 2497.852423] vfs_get_tree+0x8e/0x300 [ 2497.853243] path_mount+0x13be/0x20b0 [ 2497.854086] ? strncpy_from_user+0x9e/0x470 [ 2497.855032] ? finish_automount+0xa90/0xa90 [ 2497.855974] ? getname_flags.part.0+0x1dd/0x4f0 [ 2497.856993] ? _copy_from_user+0xfb/0x1b0 [ 2497.857926] __x64_sys_mount+0x282/0x300 [ 2497.858817] ? copy_mnt_ns+0xa00/0xa00 [ 2497.859699] do_syscall_64+0x33/0x40 [ 2497.860524] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2497.861633] RIP: 0033:0x7f2cab73ab19 [ 2497.862446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2497.866412] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2497.868061] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2497.869607] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2497.871147] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2497.872693] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2497.874236] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:37:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002048019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:37:21 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:37:21 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 30) 17:37:21 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3e6, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:37:21 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2511.043690] FAULT_INJECTION: forcing a failure. [ 2511.043690] name failslab, interval 1, probability 0, space 0, times 0 [ 2511.045055] CPU: 1 PID: 21744 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2511.045802] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2511.046699] Call Trace: [ 2511.046996] dump_stack+0x107/0x167 [ 2511.047390] should_fail.cold+0x5/0xa [ 2511.047808] should_failslab+0x5/0x20 [ 2511.048219] __kmalloc_track_caller+0x79/0x370 [ 2511.048714] ? parse_opts.part.0+0x8e/0x340 [ 2511.049191] kstrdup+0x36/0x70 [ 2511.049540] parse_opts.part.0+0x8e/0x340 [ 2511.049991] ? p9_fd_show_options+0x1c0/0x1c0 [ 2511.050480] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2511.051142] ? quarantine_put+0x8b/0x1a0 [ 2511.051626] ? trace_hardirqs_on+0x5b/0x180 [ 2511.052229] ? kfree+0xd7/0x340 [ 2511.052726] p9_fd_create+0x98/0x4a0 [ 2511.053262] ? p9_conn_create+0x510/0x510 17:37:21 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:37:21 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) r4 = dup(r3) mq_notify(r4, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x2, 0x6, 0x4, 0x4f, 0x0, 0x3d, 0x800, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_config_ext={0x4, 0x8d70}, 0x20, 0x3, 0x7, 0x6, 0x2, 0x1, 0x1ca, 0x0, 0x1, 0x0, 0x3}, r1, 0x4, r4, 0x8) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) write$binfmt_script(r0, &(0x7f0000000940)={'#! ', './file1', [{0x20, '-'}, {0x20, 'rfdno'}, {0x20, '9p\x00'}, {}], 0xa, "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"}, 0x1018) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r6}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:37:21 executing program 0: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) [ 2511.053771] ? p9_client_create+0x798/0x11c0 [ 2511.054363] ? kfree+0xd7/0x340 [ 2511.054720] ? do_raw_spin_unlock+0x4f/0x220 [ 2511.055209] p9_client_create+0x7ff/0x11c0 [ 2511.055666] ? p9_client_flush+0x430/0x430 [ 2511.056123] ? trace_hardirqs_on+0x5b/0x180 [ 2511.056584] ? lockdep_init_map_type+0x2c7/0x780 [ 2511.057096] ? __raw_spin_lock_init+0x36/0x110 [ 2511.057587] v9fs_session_init+0x1dd/0x1680 [ 2511.058045] ? lock_release+0x680/0x680 [ 2511.058485] ? kmem_cache_alloc_trace+0x151/0x320 [ 2511.059010] ? v9fs_show_options+0x690/0x690 [ 2511.059503] ? trace_hardirqs_on+0x5b/0x180 [ 2511.059972] ? kasan_unpoison_shadow+0x33/0x50 [ 2511.060471] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2511.061029] v9fs_mount+0x79/0x8f0 [ 2511.061422] ? v9fs_write_inode+0x60/0x60 [ 2511.061863] legacy_get_tree+0x105/0x220 [ 2511.062294] vfs_get_tree+0x8e/0x300 [ 2511.062697] path_mount+0x13be/0x20b0 [ 2511.063104] ? strncpy_from_user+0x9e/0x470 [ 2511.063570] ? finish_automount+0xa90/0xa90 [ 2511.064034] ? getname_flags.part.0+0x1dd/0x4f0 [ 2511.064553] ? _copy_from_user+0xfb/0x1b0 [ 2511.065011] __x64_sys_mount+0x282/0x300 [ 2511.065447] ? copy_mnt_ns+0xa00/0xa00 [ 2511.065878] do_syscall_64+0x33/0x40 io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, 0x0]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) [ 2511.066285] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2511.066977] RIP: 0033:0x7f2cab73ab19 [ 2511.067381] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2511.069386] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2511.070197] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2511.070956] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2511.071722] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2511.072500] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2511.073277] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 [ 2511.074129] 9pnet: Insufficient options for proto=fd 17:37:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200f019000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:37:21 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:37:21 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000219000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:37:21 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:37:34 executing program 0: msgget$private(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f00000001c0)={0x2, 0x5}, 0x4) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000001c40), 0x4) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f0000000080)={0x0, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4000, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xffffffffffffffe0}, 0x0, 0x1782, 0x6, 0x0, 0x7ff, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) sendfile(r2, 0xffffffffffffffff, &(0x7f0000000040)=0x4, 0x334) setsockopt$inet6_tcp_int(r2, 0x6, 0x1e, &(0x7f0000000180)=0x1, 0x4) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000000280)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000007040)=[{{0x0, 0x0, &(0x7f00000013c0)=[{&(0x7f00000002c0)="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", 0xfb}, {&(0x7f00000003c0)="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", 0xc86}], 0x2}}], 0x1, 0x4004051) r3 = openat$vcs(0xffffffffffffff9c, 0x0, 0x420240, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000100)={@local, 0x8, 0x0, 0x0, 0x2, 0x974, 0xff2b}, &(0x7f0000000140)=0x20) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 17:37:34 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733d616e792c646566636f6e746578743d73797374656d5f752c6d6561737572652c738f83de4afbe5e976ff9cc28dd18e65076d61636b6673666c6f6f7e3dd2403a2d3a40f96e8d19300a3bf35f6e911f4899c2239c6c74f8e74cf41a2522d2de7284247027b99b72c83d4eb4f073903753fec648c40b937e91bae227a7ea44a42bdf7b76a2702f698242be21c88d853a49536131d4d941982d6c44464b0eca8b58a86bd7173fbfb33aa87e35c1bbe0e3878819be4893bf46e0ed12c6"]) 17:37:34 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = fcntl$dupfd(r0, 0x406, r1) sendmsg$nl_generic(r2, &(0x7f0000000140)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000340)={0x204, 0x20, 0x1, 0x70bd2b, 0x25dfdbff, {0x12}, [@typed={0x4, 0x4f}, @generic="0a1cbdd5537c6f2f17a398bf789c39ff1df879a0a4ad4170c8df6cb61afebe742b7766f39b75520a3463d8b43d92f1d055592fe6021f9f9eb5068115b71a02f58fad23fbc469c5402d27a65ff2f08c615bca6bff6b64a6a47cd36115754f1fc484c9760bf300103106930a3eb64649b170343b7467018f08c88d45f89f2a5ea516a7770f023f3e6553d2dc75f7684c03892d37d78f2658f6d7591e093174e5faf66e7eeb2b157c1e489448aa22eb63a4155addf799b5f22b85c889b7b778fb2e65d41fa418d705820aac", @typed={0x8, 0x60, 0x0, 0x0, @uid=0xffffffffffffffff}, @typed={0x7a, 0x8c, 0x0, 0x0, @binary="8b070ca053aed150e3cbef619b5b12d738a068d786f2e9e1f11cbbb4901adf93b5ceeb1bf5d61f84ec367a13f6be84f441de8a55e47682792cb6149aeb9d6b13dd0ea34b39d84597e005e8b480644c0e223a5f77fbe7c880eeb1fe7ec93a5c6fc8311a51a716bff203a9838991358207d466973874d6"}, @nested={0x9b, 0x6a, 0x0, 0x1, [@typed={0x8, 0x2f, 0x0, 0x0, @u32=0x7ff}, @generic="ce8b75b6bd0dfd908f65676fc3f4a43f9db8aad5bc1406af2c81568ef47051e5ae4d97c3ec9e12e3d9dcfeca3f7c4a61e2c9a2663c332480808525e4ac9044525cc5bd79414cfcecd2fcb4068429b16ee3bf4562bbdb5ca0033276e106539d75da886e12fd2445e9234a0f6c9cfe0a6d20709a6fcb33c7c105753608b5c8502a6eec8be986bffd66a32f46c82bceb4"]}]}, 0x204}, 0x1, 0x0, 0x0, 0x10}, 0x404c040) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:37:34 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3e9, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:37:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000319000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:37:34 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:37:34 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 31) 17:37:34 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2524.220975] FAULT_INJECTION: forcing a failure. [ 2524.220975] name failslab, interval 1, probability 0, space 0, times 0 [ 2524.223589] CPU: 0 PID: 22189 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2524.225093] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2524.226924] Call Trace: [ 2524.227516] dump_stack+0x107/0x167 [ 2524.228317] should_fail.cold+0x5/0xa [ 2524.229191] ? create_object.isra.0+0x3a/0xa20 [ 2524.230202] should_failslab+0x5/0x20 [ 2524.231056] kmem_cache_alloc+0x5b/0x310 [ 2524.231943] ? legacy_get_tree+0x105/0x220 [ 2524.232894] ? vfs_get_tree+0x8e/0x300 [ 2524.233780] create_object.isra.0+0x3a/0xa20 [ 2524.234737] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2524.235875] __kmalloc_track_caller+0x177/0x370 [ 2524.236887] ? parse_opts.part.0+0x8e/0x340 [ 2524.237877] kstrdup+0x36/0x70 [ 2524.238583] parse_opts.part.0+0x8e/0x340 [ 2524.239510] ? p9_fd_show_options+0x1c0/0x1c0 [ 2524.240510] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2524.241681] ? quarantine_put+0x8b/0x1a0 [ 2524.242569] ? trace_hardirqs_on+0x5b/0x180 [ 2524.243547] ? kfree+0xd7/0x340 [ 2524.244301] p9_fd_create+0x98/0x4a0 [ 2524.245153] ? p9_conn_create+0x510/0x510 [ 2524.246060] ? p9_client_create+0x798/0x11c0 [ 2524.247037] ? kfree+0xd7/0x340 [ 2524.247763] ? do_raw_spin_unlock+0x4f/0x220 [ 2524.248761] p9_client_create+0x7ff/0x11c0 [ 2524.249711] ? p9_client_flush+0x430/0x430 [ 2524.250648] ? trace_hardirqs_on+0x5b/0x180 [ 2524.251603] ? lockdep_init_map_type+0x2c7/0x780 [ 2524.252674] ? __raw_spin_lock_init+0x36/0x110 [ 2524.253696] v9fs_session_init+0x1dd/0x1680 [ 2524.254651] ? lock_release+0x680/0x680 [ 2524.255546] ? kmem_cache_alloc_trace+0x151/0x320 [ 2524.256611] ? v9fs_show_options+0x690/0x690 [ 2524.257613] ? trace_hardirqs_on+0x5b/0x180 [ 2524.258576] ? kasan_unpoison_shadow+0x33/0x50 [ 2524.259598] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2524.260742] v9fs_mount+0x79/0x8f0 [ 2524.261538] ? v9fs_write_inode+0x60/0x60 [ 2524.262459] legacy_get_tree+0x105/0x220 [ 2524.263368] vfs_get_tree+0x8e/0x300 [ 2524.264201] path_mount+0x13be/0x20b0 [ 2524.265072] ? strncpy_from_user+0x9e/0x470 [ 2524.266027] ? finish_automount+0xa90/0xa90 [ 2524.266975] ? getname_flags.part.0+0x1dd/0x4f0 [ 2524.267994] ? _copy_from_user+0xfb/0x1b0 [ 2524.268938] __x64_sys_mount+0x282/0x300 [ 2524.269836] ? copy_mnt_ns+0xa00/0xa00 [ 2524.270723] do_syscall_64+0x33/0x40 [ 2524.271545] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2524.272686] RIP: 0033:0x7f2cab73ab19 [ 2524.273509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2524.277524] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2524.279207] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2524.280772] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2524.282345] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2524.283913] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2524.285685] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:37:34 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x9, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:37:34 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:37:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000419000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:37:34 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x0, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:37:34 executing program 0: ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, &(0x7f00000000c0)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000180)={0x7, 0x5, 0x6, 0xaf7f, 0x2}) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') r1 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20480, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r1, 0x2403, 0x0) fork() 17:37:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000519000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:37:34 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x600, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2524.528825] audit: type=1400 audit(1694713054.810:44): avc: denied { tracepoint } for pid=22693 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 17:37:34 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x8040380, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:37:34 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000619000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:37:34 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:37:52 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 32) 17:37:52 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:37:52 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x80, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) r4 = dup(r3) mq_notify(r4, 0x0) openat(r4, &(0x7f0000000000)='./file0\x00', 0x0, 0x108) 17:37:52 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f00000023c0)={0xfffffffd, 0xfffffffb, 0xd1, 0xfffffffc, 0x4}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) write$binfmt_elf64(r2, &(0x7f0000000a00)=ANY=[], 0x98a) readv(r2, &(0x7f0000000100)=[{&(0x7f0000001340)=""/4096, 0x1000}], 0x1) r3 = getpgid(0x0) sched_setattr(0x0, &(0x7f00000001c0)={0x38}, 0x0) sched_setattr(r3, &(0x7f0000000040)={0x38, 0x1, 0x40, 0xdb, 0x6, 0x7, 0x9, 0xfff, 0x80da, 0x10001}, 0x0) perf_event_open(0x0, r3, 0x8, 0xffffffffffffffff, 0xb) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000001300)='./file1\x00', 0x200000, 0x183) r4 = gettid() sched_setattr(r4, &(0x7f0000002400)={0x38, 0x5, 0x67, 0x6, 0x0, 0x3, 0x80, 0x81, 0x54fb, 0xc643}, 0x0) r5 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) clone3(&(0x7f0000002340)={0x28000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000140), {0x28}, &(0x7f0000000180)=""/252, 0xfc, &(0x7f00000002c0)=""/4096, &(0x7f00000012c0)=[r3, 0xffffffffffffffff], 0x2, {r5}}, 0x58) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x12, r2, 0x729d2000) unshare(0x48020200) 17:37:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x700, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:37:52 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:37:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000719000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:37:52 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xa9, 0x7, 0x8, 0xff, 0x0, 0x6, 0x20300, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7a7c3380, 0x1, @perf_config_ext={0x0, 0x206}, 0x0, 0x400, 0x9, 0x9, 0xea, 0x2, 0x5, 0x0, 0x7, 0x0, 0x5}, 0x0, 0xb, r0, 0xa) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d5d072b9d143622fb86c36359e9877b7b1062ad7987b3ab97a9a77146cf2ae446113e1a035c7144aa989d128877a8494cbbbfee178cd3b75a7c1d2f8888110ee2cef021cc142d082372fc4189b00e02584a1668cadb7ee0a42b338fcea9d992e8436db7e0c89997570444c9cc73403fae9f564538b7969e9ce26daeab6b792fcb08ceb42bd76ed1b836621a293bf4412923ca52fc8512726974945053427523cc632ebc3397bb3fb7b17330f83eada79b7e2e4a8eed97cdc1bb4fee2003", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB="2c6163636573733d616e792c646566636f6e746578743d73797374656d5f752c6d6561737572652c736d61636b6673666c6f6f723dd2403a2d3a403a2424402c6f626a5f747970653d2c00"]) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000180)={&(0x7f0000000680)=ANY=[@ANYBLOB="90010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x190}, 0x1, 0x0, 0x0, 0x4000}, 0x1000) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) sendfile(r1, r4, &(0x7f0000000280)=0x1f, 0x8f6a) [ 2542.458363] FAULT_INJECTION: forcing a failure. [ 2542.458363] name failslab, interval 1, probability 0, space 0, times 0 [ 2542.460811] CPU: 0 PID: 23046 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2542.462007] 9pnet: Insufficient options for proto=fd [ 2542.462094] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2542.462109] Call Trace: [ 2542.465234] dump_stack+0x107/0x167 [ 2542.465910] should_fail.cold+0x5/0xa [ 2542.466628] should_failslab+0x5/0x20 [ 2542.467325] __kmalloc_track_caller+0x79/0x370 [ 2542.468164] ? match_number+0xaf/0x1d0 [ 2542.468910] kmemdup_nul+0x2d/0xa0 [ 2542.469572] match_number+0xaf/0x1d0 [ 2542.470256] ? match_u64+0x190/0x190 [ 2542.470937] ? __kmalloc_track_caller+0x2c6/0x370 [ 2542.471825] ? memcpy+0x39/0x60 [ 2542.472440] parse_opts.part.0+0x1f3/0x340 [ 2542.473223] ? p9_fd_show_options+0x1c0/0x1c0 [ 2542.474061] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2542.475021] ? trace_hardirqs_on+0x5b/0x180 [ 2542.475820] ? kfree+0xd7/0x340 [ 2542.476451] p9_fd_create+0x98/0x4a0 [ 2542.477143] ? p9_conn_create+0x510/0x510 [ 2542.477903] ? p9_client_create+0x798/0x11c0 [ 2542.478712] ? kfree+0xd7/0x340 [ 2542.479317] ? do_raw_spin_unlock+0x4f/0x220 [ 2542.480143] p9_client_create+0x7ff/0x11c0 [ 2542.480956] ? p9_client_flush+0x430/0x430 [ 2542.481740] ? trace_hardirqs_on+0x5b/0x180 [ 2542.482532] ? lockdep_init_map_type+0x2c7/0x780 [ 2542.483408] ? __raw_spin_lock_init+0x36/0x110 [ 2542.484262] v9fs_session_init+0x1dd/0x1680 [ 2542.485057] ? lock_release+0x680/0x680 [ 2542.485790] ? kmem_cache_alloc_trace+0x151/0x320 [ 2542.486652] ? v9fs_show_options+0x690/0x690 [ 2542.487467] ? trace_hardirqs_on+0x5b/0x180 [ 2542.488252] ? kasan_unpoison_shadow+0x33/0x50 [ 2542.489079] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2542.489998] v9fs_mount+0x79/0x8f0 [ 2542.490643] ? v9fs_write_inode+0x60/0x60 [ 2542.491395] legacy_get_tree+0x105/0x220 [ 2542.492129] vfs_get_tree+0x8e/0x300 [ 2542.492809] path_mount+0x13be/0x20b0 [ 2542.493516] ? strncpy_from_user+0x9e/0x470 [ 2542.494297] ? finish_automount+0xa90/0xa90 [ 2542.495072] ? getname_flags.part.0+0x1dd/0x4f0 [ 2542.495908] ? _copy_from_user+0xfb/0x1b0 [ 2542.496676] __x64_sys_mount+0x282/0x300 [ 2542.497413] ? copy_mnt_ns+0xa00/0xa00 [ 2542.498137] do_syscall_64+0x33/0x40 [ 2542.498813] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2542.499728] RIP: 0033:0x7f2cab73ab19 [ 2542.500398] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2542.503664] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2542.505034] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2542.506298] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2542.507559] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2542.508823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2542.510097] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:37:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000819000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:37:52 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:37:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002001819000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2542.661186] 9pnet: Insufficient options for proto=fd 17:37:52 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x900, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:37:52 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 33) 17:37:52 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002001c19000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:37:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x10, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2542.779152] FAULT_INJECTION: forcing a failure. [ 2542.779152] name failslab, interval 1, probability 0, space 0, times 0 [ 2542.781674] CPU: 1 PID: 23445 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2542.783159] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2542.784953] Call Trace: [ 2542.785531] dump_stack+0x107/0x167 [ 2542.786321] should_fail.cold+0x5/0xa [ 2542.787146] ? create_object.isra.0+0x3a/0xa20 [ 2542.788136] should_failslab+0x5/0x20 [ 2542.788977] kmem_cache_alloc+0x5b/0x310 [ 2542.789857] create_object.isra.0+0x3a/0xa20 [ 2542.790804] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2542.791897] __kmalloc_track_caller+0x177/0x370 [ 2542.792903] ? match_number+0xaf/0x1d0 [ 2542.793755] kmemdup_nul+0x2d/0xa0 [ 2542.794521] match_number+0xaf/0x1d0 [ 2542.795315] ? match_u64+0x190/0x190 [ 2542.796106] ? __kmalloc_track_caller+0x2c6/0x370 [ 2542.797155] ? memcpy+0x39/0x60 [ 2542.797869] parse_opts.part.0+0x1f3/0x340 [ 2542.798771] ? p9_fd_show_options+0x1c0/0x1c0 [ 2542.799736] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2542.800845] ? trace_hardirqs_on+0x5b/0x180 [ 2542.801772] ? kfree+0xd7/0x340 [ 2542.802486] p9_fd_create+0x98/0x4a0 [ 2542.803278] ? p9_conn_create+0x510/0x510 [ 2542.804154] ? p9_client_create+0x798/0x11c0 [ 2542.805104] ? kfree+0xd7/0x340 [ 2542.805821] ? do_raw_spin_unlock+0x4f/0x220 [ 2542.806801] p9_client_create+0x7ff/0x11c0 [ 2542.807751] ? p9_client_flush+0x430/0x430 [ 2542.808636] ? trace_hardirqs_on+0x5b/0x180 [ 2542.809616] ? lockdep_init_map_type+0x2c7/0x780 [ 2542.810639] ? __raw_spin_lock_init+0x36/0x110 [ 2542.811681] v9fs_session_init+0x1dd/0x1680 [ 2542.812595] ? lock_release+0x680/0x680 [ 2542.813484] ? kmem_cache_alloc_trace+0x151/0x320 [ 2542.814559] ? v9fs_show_options+0x690/0x690 [ 2542.815544] ? trace_hardirqs_on+0x5b/0x180 [ 2542.816515] ? kasan_unpoison_shadow+0x33/0x50 [ 2542.817567] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2542.818666] v9fs_mount+0x79/0x8f0 [ 2542.819477] ? v9fs_write_inode+0x60/0x60 [ 2542.820409] legacy_get_tree+0x105/0x220 [ 2542.821306] vfs_get_tree+0x8e/0x300 [ 2542.822125] path_mount+0x13be/0x20b0 [ 2542.822970] ? strncpy_from_user+0x9e/0x470 [ 2542.823877] ? finish_automount+0xa90/0xa90 [ 2542.824849] ? getname_flags.part.0+0x1dd/0x4f0 [ 2542.825877] ? _copy_from_user+0xfb/0x1b0 [ 2542.826746] __x64_sys_mount+0x282/0x300 [ 2542.827649] ? copy_mnt_ns+0xa00/0xa00 [ 2542.828500] do_syscall_64+0x33/0x40 [ 2542.829301] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2542.830405] RIP: 0033:0x7f2cab73ab19 [ 2542.831185] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2542.835089] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2542.836658] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2542.838139] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2542.839605] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2542.841077] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2542.842540] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:38:07 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wnJno=', @ANYRESHEX=r1, @ANYBLOB=',access=any,fowner<', @ANYRESDEC=r2, @ANYBLOB="2c6d6561737572652c736d61636b6673666c6f6f723dd2403a2d3a403a2424402c6f626a5f747970653d2c00"]) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000200), 0x800, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r5}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@version_9p2000}, {@aname={'aname', 0x3d, '-'}}, {@version_9p2000}, {@cache_none}, {@cache_fscache}, {@loose}, {@version_9p2000}, {@cache_fscache}, {@cache_mmap}, {@cachetag={'cachetag', 0x3d, '\x00'}}], [{@euid_lt={'euid<', r2}}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:38:07 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, 0x0, 0x0, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:38:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002006b19000000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:38:07 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2e, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:38:07 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 34) 17:38:07 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa00, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:38:07 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) dup(r2) recvmsg(r0, &(0x7f0000000180)={&(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f0000000080)=[{&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/70, 0x46}, {&(0x7f0000000940)=""/4096, 0x1000}], 0x3, &(0x7f0000000480)=""/218, 0xda}, 0x40000000) dup2(r2, r3) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/mdstat\x00', 0x0, 0x0) ioctl$TIOCSTI(r6, 0x5412, &(0x7f0000000000)=0x20) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB="2c6163636573733d616e792c646566636f6e746578743d73797374656d5f752c6d7561737572652c736d6163ff6673666c6f6f723dd2403a2d2a403a2424402cef626a5f747970653d2c00"]) 17:38:07 executing program 0: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) syz_open_dev$vcsu(&(0x7f0000002480), 0x0, 0x208a20) openat$bsg(0xffffffffffffff9c, &(0x7f0000002500), 0x400, 0x0) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) r4 = dup(r3) mq_notify(r4, 0x0) r5 = fspick(r4, &(0x7f0000002700)='./file0\x00', 0x0) fcntl$setpipe(r5, 0x407, 0x400000004) r6 = syz_open_dev$vcsa(&(0x7f0000002540), 0x9, 0x200080) perf_event_open(&(0x7f0000002680)={0x3, 0x80, 0x31, 0x8, 0xff, 0x3, 0x0, 0x21d, 0x2000, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0x865, 0x4}, 0x1, 0x40, 0xffff, 0x1, 0x5, 0x8, 0x9c, 0x0, 0x594, 0x0, 0x1}, r0, 0xffffffffffffffff, r4, 0x3) sendmsg$TIPC_CMD_GET_BEARER_NAMES(r6, &(0x7f0000002640)={&(0x7f0000002580)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000024c0)={&(0x7f00000025c0)={0x1c, 0x0, 0x8, 0x70bd28, 0x25dfdbfc, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x44001}, 0x200080d5) mq_timedsend(r6, &(0x7f0000002740)="8157513fdb1aa85c4d86c70db2282d8f934fc0dfc71212862674fa1cccbe43ca462e07d89a5011b04a2fc907178328d3e47f1fb2af212de411b8aa46e68df073dfd18e374459cf2370615dcc1bcce07f85905fb3412c7e39032796a0c241c563925926ad2bd1f190f4714690fb6eff6b9c6d7490525de4457b13e0faae61af45c4984139f18c9f935981232cb33bc3684f87647eabb5c25651f66627ea5b2ae76415d5436b85633a6d03576de9bcbae725571813c7a10f1d8f7ceddfca3989bfd369deed2ef9d12996dd7685a927120ca21948f1efd9f7dcaecc", 0xda, 0x60c, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cgroup.stat\x00', 0x0, 0x0) sendmsg$nl_generic(r7, &(0x7f0000002440)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000080)={&(0x7f00000011c0)=ANY=[@ANYBLOB="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"/4724], 0x1274}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) r8 = dup(r1) mq_notify(r8, 0x0) syz_emit_ethernet(0x86, &(0x7f0000000140)=ANY=[@ANYRESHEX=r0, @ANYBLOB="386cfa3ee341dd24a78a859c1491ec00acd4e3393857bdded90ca561c91ae5ce4a84582b5ce2e612f34de6a1e03448e7f8cd5dd98564fb62a25539cbe26afe01fd37", @ANYBLOB="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", @ANYRESDEC=r8, @ANYRES32], 0x0) write$tun(0xffffffffffffffff, &(0x7f00000000c0)={@val={0x0, 0x8}, @val={0x0, 0x81, 0x3f, 0xfff, 0x1, 0x4f}, @x25={0x2, 0x2, 0x0, "e8c8650de362730ed9611a1d99336b9718f3400f39c53e5dcb79d43dd197d4b2b84f592e10f95be806825ebcbe3eead85ab63ebbd84bce70c4c74b22c75c08fe1b60c13c352afa4813fa7f15ccaabbf902df577caea37e99bf01430594972f6c11378d995b89b3"}}, 0x78) [ 2557.649619] FAULT_INJECTION: forcing a failure. [ 2557.649619] name failslab, interval 1, probability 0, space 0, times 0 [ 2557.651014] CPU: 1 PID: 23674 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2557.651766] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2557.652655] Call Trace: [ 2557.652954] dump_stack+0x107/0x167 [ 2557.653366] should_fail.cold+0x5/0xa [ 2557.653804] should_failslab+0x5/0x20 [ 2557.654237] __kmalloc_track_caller+0x79/0x370 [ 2557.654755] ? match_number+0xaf/0x1d0 [ 2557.655188] ? kfree+0xd7/0x340 [ 2557.655576] kmemdup_nul+0x2d/0xa0 [ 2557.655973] match_number+0xaf/0x1d0 [ 2557.656384] ? match_u64+0x190/0x190 [ 2557.656782] ? __kmalloc_track_caller+0x2c6/0x370 [ 2557.657311] ? memcpy+0x39/0x60 [ 2557.657673] parse_opts.part.0+0x1f3/0x340 [ 2557.658130] ? p9_fd_show_options+0x1c0/0x1c0 [ 2557.658626] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2557.659187] ? trace_hardirqs_on+0x5b/0x180 [ 2557.659658] ? kfree+0xd7/0x340 [ 2557.660034] p9_fd_create+0x98/0x4a0 [ 2557.660451] ? p9_conn_create+0x510/0x510 [ 2557.660895] ? p9_client_create+0x798/0x11c0 [ 2557.661393] ? kfree+0xd7/0x340 [ 2557.661764] ? do_raw_spin_unlock+0x4f/0x220 [ 2557.662253] p9_client_create+0x7ff/0x11c0 [ 2557.662729] ? p9_client_flush+0x430/0x430 [ 2557.663201] ? trace_hardirqs_on+0x5b/0x180 [ 2557.663680] ? lockdep_init_map_type+0x2c7/0x780 [ 2557.664194] ? __raw_spin_lock_init+0x36/0x110 [ 2557.664683] v9fs_session_init+0x1dd/0x1680 [ 2557.665159] ? lock_release+0x680/0x680 [ 2557.665613] ? kmem_cache_alloc_trace+0x151/0x320 [ 2557.666136] ? v9fs_show_options+0x690/0x690 [ 2557.666617] ? trace_hardirqs_on+0x5b/0x180 [ 2557.667080] ? kasan_unpoison_shadow+0x33/0x50 [ 2557.667574] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2557.668129] v9fs_mount+0x79/0x8f0 [ 2557.668519] ? v9fs_write_inode+0x60/0x60 [ 2557.668966] legacy_get_tree+0x105/0x220 [ 2557.669416] vfs_get_tree+0x8e/0x300 [ 2557.669821] path_mount+0x13be/0x20b0 [ 2557.670233] ? strncpy_from_user+0x9e/0x470 [ 2557.670715] ? finish_automount+0xa90/0xa90 [ 2557.671195] ? getname_flags.part.0+0x1dd/0x4f0 [ 2557.671701] ? _copy_from_user+0xfb/0x1b0 [ 2557.672170] __x64_sys_mount+0x282/0x300 [ 2557.672612] ? copy_mnt_ns+0xa00/0xa00 [ 2557.673052] do_syscall_64+0x33/0x40 [ 2557.673460] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2557.674010] RIP: 0033:0x7f2cab73ab19 [ 2557.674414] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2557.676435] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2557.677282] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2557.678052] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2557.678833] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2557.679619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2557.680395] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 [ 2557.681267] 9pnet: Insufficient options for proto=fd 17:38:07 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019020000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:38:08 executing program 0: getpgid(0x0) syz_open_procfs$namespace(0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)=ANY=[@ANYBLOB='\r\x00'/13], 0x14}}, 0x0) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) 17:38:08 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:38:08 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb00, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:38:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019030000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:38:08 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 35) [ 2557.893001] FAULT_INJECTION: forcing a failure. [ 2557.893001] name failslab, interval 1, probability 0, space 0, times 0 [ 2557.894279] CPU: 1 PID: 24100 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2557.895035] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2557.895932] Call Trace: [ 2557.896234] dump_stack+0x107/0x167 [ 2557.896627] should_fail.cold+0x5/0xa [ 2557.897040] ? create_object.isra.0+0x3a/0xa20 [ 2557.897552] should_failslab+0x5/0x20 [ 2557.897965] kmem_cache_alloc+0x5b/0x310 [ 2557.898408] create_object.isra.0+0x3a/0xa20 [ 2557.898887] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2557.899427] __kmalloc_track_caller+0x177/0x370 [ 2557.899935] ? match_number+0xaf/0x1d0 [ 2557.900363] kmemdup_nul+0x2d/0xa0 [ 2557.900759] match_number+0xaf/0x1d0 [ 2557.901172] ? match_u64+0x190/0x190 [ 2557.901586] ? __kmalloc_track_caller+0x2c6/0x370 [ 2557.902118] ? memcpy+0x39/0x60 [ 2557.902492] parse_opts.part.0+0x1f3/0x340 [ 2557.902956] ? p9_fd_show_options+0x1c0/0x1c0 [ 2557.903448] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2557.904022] ? trace_hardirqs_on+0x5b/0x180 [ 2557.904486] ? kfree+0xd7/0x340 [ 2557.904847] p9_fd_create+0x98/0x4a0 [ 2557.905252] ? p9_conn_create+0x510/0x510 [ 2557.905715] ? p9_client_create+0x798/0x11c0 [ 2557.906203] ? kfree+0xd7/0x340 [ 2557.906575] ? do_raw_spin_unlock+0x4f/0x220 [ 2557.907064] p9_client_create+0x7ff/0x11c0 [ 2557.907546] ? p9_client_flush+0x430/0x430 [ 2557.908019] ? trace_hardirqs_on+0x5b/0x180 [ 2557.908503] ? lockdep_init_map_type+0x2c7/0x780 [ 2557.909034] ? __raw_spin_lock_init+0x36/0x110 [ 2557.909561] v9fs_session_init+0x1dd/0x1680 [ 2557.910033] ? lock_release+0x680/0x680 [ 2557.910461] ? kmem_cache_alloc_trace+0x151/0x320 [ 2557.911004] ? v9fs_show_options+0x690/0x690 [ 2557.911477] ? trace_hardirqs_on+0x5b/0x180 [ 2557.911953] ? kasan_unpoison_shadow+0x33/0x50 [ 2557.912448] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2557.913002] v9fs_mount+0x79/0x8f0 [ 2557.913402] ? v9fs_write_inode+0x60/0x60 [ 2557.913858] legacy_get_tree+0x105/0x220 [ 2557.914304] vfs_get_tree+0x8e/0x300 [ 2557.914709] path_mount+0x13be/0x20b0 [ 2557.915124] ? strncpy_from_user+0x9e/0x470 [ 2557.915594] ? finish_automount+0xa90/0xa90 [ 2557.916073] ? getname_flags.part.0+0x1dd/0x4f0 [ 2557.916577] ? _copy_from_user+0xfb/0x1b0 [ 2557.917029] __x64_sys_mount+0x282/0x300 [ 2557.917489] ? copy_mnt_ns+0xa00/0xa00 [ 2557.917916] do_syscall_64+0x33/0x40 [ 2557.918333] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2557.918894] RIP: 0033:0x7f2cab73ab19 [ 2557.919310] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2557.921366] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2557.922208] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2557.923002] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2557.923792] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2557.924589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2557.925382] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:38:08 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:38:08 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x10e, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:38:08 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x200, 0x180) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="5f8b0800000000", @ANYRESHEX=r1, @ANYBLOB="2c6163636573733d616e792c646566636f6e746578743d73797374656d5f752c6d6561737572652c736d61636b6673666c6f6f723dd2403a2d3a403a2424402c6f626a5f747970653d2c00"]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) [ 2557.981225] 9pnet: Insufficient options for proto=fd 17:38:08 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019040000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:38:30 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x132, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:38:30 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019050000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:38:30 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="666163636573333d616e792c64656674656d5f752c6d6561737572252c736d61636b6673666c6f6f723dd2403a2d3a403a2424403cd7ac6f626a5f747970653d2c00"/77]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) r4 = dup(r3) mq_notify(r4, 0x0) write$binfmt_elf64(r4, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x65, 0x6c, 0x46, 0x40, 0x8001, 0x3, 0x6, 0x3, 0x23b, 0x40, 0x8, 0x3ff, 0x256, 0x38, 0x2, 0x4, 0x5, 0x60}, [{0x5, 0x8000, 0x401, 0x7, 0x9, 0x3, 0x10000, 0x7}], "572a4294663ac6c63de3bbe39144a2e70b3e78e9a09cb40f", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x890) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) [ 2580.677812] FAULT_INJECTION: forcing a failure. [ 2580.677812] name failslab, interval 1, probability 0, space 0, times 0 [ 2580.679180] CPU: 1 PID: 24527 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2580.679949] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2580.680894] Call Trace: [ 2580.681199] dump_stack+0x107/0x167 [ 2580.681631] should_fail.cold+0x5/0xa [ 2580.682075] ? p9_fd_create+0x161/0x4a0 [ 2580.682531] should_failslab+0x5/0x20 [ 2580.682964] kmem_cache_alloc_trace+0x55/0x320 [ 2580.683481] p9_fd_create+0x161/0x4a0 [ 2580.683924] ? p9_conn_create+0x510/0x510 [ 2580.684389] ? p9_client_create+0x798/0x11c0 [ 2580.684884] ? kfree+0xd7/0x340 [ 2580.685246] ? do_raw_spin_unlock+0x4f/0x220 [ 2580.685753] p9_client_create+0x7ff/0x11c0 [ 2580.686242] ? p9_client_flush+0x430/0x430 [ 2580.686715] ? trace_hardirqs_on+0x5b/0x180 [ 2580.687211] ? lockdep_init_map_type+0x2c7/0x780 [ 2580.687759] ? __raw_spin_lock_init+0x36/0x110 [ 2580.688278] v9fs_session_init+0x1dd/0x1680 [ 2580.688766] ? lock_release+0x680/0x680 [ 2580.689222] ? kmem_cache_alloc_trace+0x151/0x320 [ 2580.689786] ? v9fs_show_options+0x690/0x690 [ 2580.690294] ? trace_hardirqs_on+0x5b/0x180 [ 2580.690786] ? kasan_unpoison_shadow+0x33/0x50 [ 2580.691311] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2580.691906] v9fs_mount+0x79/0x8f0 [ 2580.692313] ? v9fs_write_inode+0x60/0x60 [ 2580.692788] legacy_get_tree+0x105/0x220 [ 2580.693257] vfs_get_tree+0x8e/0x300 [ 2580.693693] path_mount+0x13be/0x20b0 [ 2580.694125] ? strncpy_from_user+0x9e/0x470 [ 2580.694616] ? finish_automount+0xa90/0xa90 [ 2580.695106] ? getname_flags.part.0+0x1dd/0x4f0 [ 2580.695628] ? _copy_from_user+0xfb/0x1b0 [ 2580.696104] __x64_sys_mount+0x282/0x300 [ 2580.696566] ? copy_mnt_ns+0xa00/0xa00 [ 2580.697011] do_syscall_64+0x33/0x40 [ 2580.697448] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2580.698025] RIP: 0033:0x7f2cab73ab19 [ 2580.698445] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2580.700541] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2580.700922] 9pnet: Insufficient options for proto=fd [ 2580.701413] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2580.701420] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 17:38:30 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x4c8600, 0x180) openat(r0, &(0x7f0000000180)='./file0\x00', 0x8000, 0x48) llistxattr(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)=""/197, 0xc5) mkdirat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x81) 17:38:30 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:38:30 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 36) 17:38:30 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xe01, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2580.701427] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2580.701433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2580.701439] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:38:31 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) dup(r1) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000000)="117994ba5840da387872ce4a02f9422a8de97d1da6ab68d1cee099de33d0282a69e20223a547d891ff821f926c5808804eda", 0x32}, {&(0x7f0000000100)="d2920d6d8617949b9b6193d990094b0400b43ee7b68162cdccb71cdc22371d204b02ec2ed61c9a354b67741238757cd14ed0532a7e636792ae7a5e23367deeee20d7aa87e42cdb223d4f896dec7413f1625f84baae2fbb35c4b44de4889d12af671701fa2b9875e4e7d65e5a0b854bbb962dc0b1332374", 0x77}, {&(0x7f0000000080)="2f7dd79bbda5aa1f6432b533ef473470a1904f5f677cebaaa3256132fb42883512b6277f301b770c3a8cf97406927064bf75d948952b8c0c5ae5bb83", 0x3c}, {&(0x7f0000000180)="3cd1c639bacbcf7c8505441915c9432dc67b3163418378082b2f81d623b1e0b38547", 0x22}], 0x4) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:38:31 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019060000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:38:31 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout_data(r2, 0x107, 0xa, 0x0, 0x0) readahead(r2, 0x9, 0x6) chown(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) socket$unix(0x1, 0x5, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) fallocate(r3, 0x0, 0x0, 0x8000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r4, 0xf504, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) 17:38:31 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0), 0x0, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:38:31 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1020, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:38:31 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x17e, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:38:31 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 37) [ 2581.008199] FAULT_INJECTION: forcing a failure. [ 2581.008199] name failslab, interval 1, probability 0, space 0, times 0 [ 2581.010869] CPU: 0 PID: 25086 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2581.012331] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2581.014183] Call Trace: [ 2581.014792] dump_stack+0x107/0x167 [ 2581.015612] should_fail.cold+0x5/0xa [ 2581.016412] ? create_object.isra.0+0x3a/0xa20 [ 2581.017466] should_failslab+0x5/0x20 [ 2581.018321] kmem_cache_alloc+0x5b/0x310 [ 2581.019245] ? p9_fd_show_options+0x1c0/0x1c0 [ 2581.020269] create_object.isra.0+0x3a/0xa20 [ 2581.021190] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2581.022337] kmem_cache_alloc_trace+0x151/0x320 [ 2581.023404] p9_fd_create+0x161/0x4a0 [ 2581.024200] ? p9_conn_create+0x510/0x510 [ 2581.025113] ? p9_client_create+0x798/0x11c0 [ 2581.026151] ? kfree+0xd7/0x340 [ 2581.026908] ? do_raw_spin_unlock+0x4f/0x220 [ 2581.027887] p9_client_create+0x7ff/0x11c0 [ 2581.028818] ? p9_client_flush+0x430/0x430 [ 2581.029792] ? trace_hardirqs_on+0x5b/0x180 [ 2581.030772] ? lockdep_init_map_type+0x2c7/0x780 [ 2581.031830] ? __raw_spin_lock_init+0x36/0x110 [ 2581.032820] v9fs_session_init+0x1dd/0x1680 [ 2581.033823] ? lock_release+0x680/0x680 [ 2581.034751] ? kmem_cache_alloc_trace+0x151/0x320 [ 2581.035819] ? v9fs_show_options+0x690/0x690 [ 2581.036769] ? trace_hardirqs_on+0x5b/0x180 [ 2581.037767] ? kasan_unpoison_shadow+0x33/0x50 [ 2581.038808] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2581.039927] v9fs_mount+0x79/0x8f0 [ 2581.040688] ? v9fs_write_inode+0x60/0x60 [ 2581.041642] legacy_get_tree+0x105/0x220 [ 2581.042574] vfs_get_tree+0x8e/0x300 [ 2581.043445] path_mount+0x13be/0x20b0 [ 2581.044249] ? strncpy_from_user+0x9e/0x470 [ 2581.045135] ? finish_automount+0xa90/0xa90 [ 2581.046052] ? getname_flags.part.0+0x1dd/0x4f0 [ 2581.047012] ? _copy_from_user+0xfb/0x1b0 [ 2581.047896] __x64_sys_mount+0x282/0x300 [ 2581.048736] ? copy_mnt_ns+0xa00/0xa00 [ 2581.049581] do_syscall_64+0x33/0x40 [ 2581.050350] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2581.051405] RIP: 0033:0x7f2cab73ab19 [ 2581.052185] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2581.055905] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2581.057487] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2581.058944] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2581.060397] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2581.061877] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2581.063333] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:38:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019070000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:38:45 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 38) [ 2595.105257] FAULT_INJECTION: forcing a failure. [ 2595.105257] name failslab, interval 1, probability 0, space 0, times 0 [ 2595.106874] CPU: 0 PID: 25166 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2595.107828] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2595.108963] Call Trace: [ 2595.109344] dump_stack+0x107/0x167 [ 2595.109875] should_fail.cold+0x5/0xa [ 2595.110406] ? p9_client_prepare_req.part.0+0x3a/0xac0 [ 2595.111140] should_failslab+0x5/0x20 [ 2595.111668] kmem_cache_alloc+0x5b/0x310 [ 2595.112244] p9_client_prepare_req.part.0+0x3a/0xac0 [ 2595.112966] p9_client_rpc+0x220/0x1360 [ 2595.113522] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2595.114275] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2595.115020] ? pipe_poll+0x21b/0x7f0 [ 2595.115545] ? p9_fd_close+0x4a0/0x4a0 [ 2595.116085] ? anon_pipe_buf_release+0x280/0x280 [ 2595.116747] ? p9_fd_poll+0x1e0/0x2c0 [ 2595.117297] ? p9_fd_create+0x357/0x4a0 [ 2595.117860] ? p9_conn_create+0x510/0x510 [ 2595.118433] ? p9_client_create+0x798/0x11c0 [ 2595.119045] ? kfree+0xd7/0x340 [ 2595.119507] ? do_raw_spin_unlock+0x4f/0x220 [ 2595.120128] p9_client_create+0xa76/0x11c0 [ 2595.120730] ? p9_client_flush+0x430/0x430 [ 2595.121320] ? trace_hardirqs_on+0x5b/0x180 [ 2595.121938] ? lockdep_init_map_type+0x2c7/0x780 [ 2595.122599] ? __raw_spin_lock_init+0x36/0x110 [ 2595.123246] v9fs_session_init+0x1dd/0x1680 [ 2595.123844] ? lock_release+0x680/0x680 [ 2595.124425] ? kmem_cache_alloc_trace+0x151/0x320 [ 2595.125100] ? v9fs_show_options+0x690/0x690 [ 2595.125735] ? trace_hardirqs_on+0x5b/0x180 [ 2595.126340] ? kasan_unpoison_shadow+0x33/0x50 [ 2595.126976] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2595.127679] v9fs_mount+0x79/0x8f0 [ 2595.128175] ? v9fs_write_inode+0x60/0x60 [ 2595.128747] legacy_get_tree+0x105/0x220 [ 2595.129309] vfs_get_tree+0x8e/0x300 [ 2595.129839] path_mount+0x13be/0x20b0 [ 2595.130375] ? strncpy_from_user+0x9e/0x470 [ 2595.130976] ? finish_automount+0xa90/0xa90 [ 2595.131570] ? getname_flags.part.0+0x1dd/0x4f0 [ 2595.132216] ? _copy_from_user+0xfb/0x1b0 [ 2595.132802] __x64_sys_mount+0x282/0x300 [ 2595.133368] ? copy_mnt_ns+0xa00/0xa00 [ 2595.133931] do_syscall_64+0x33/0x40 [ 2595.134452] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2595.135154] RIP: 0033:0x7f2cab73ab19 [ 2595.135660] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2595.138183] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2595.139228] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2595.140205] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2595.141205] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2595.142218] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2595.143222] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:38:45 executing program 0: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init() r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r0) pipe(&(0x7f0000000100)={0xffffffffffffffff}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, &(0x7f0000000280)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r2, 0xc0709411, &(0x7f0000000180)={{0x0, 0x6, 0x101, 0x0, 0x6, 0x8, 0x0, 0x8, 0x800, 0x1, 0x0, 0x0, 0x9, 0x1c, 0x2}, 0x10, [0x0, 0x0]}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000001e00)={r7, r8, "002e78a10a6005cd1a7be72f8a2274277e3d82ada88cca4261a051fbf7cab34a58e7cad1d36b4c8c4bd179b4137f70f011db04418d6ef4bbac5b77154062d7dc63e21329642012c54c65525ea7bc287c8205fcf3c8de83e96bc7b5ce9f5a1f1f3c5e07d6b8dc464572cef5d4990aa752614b061f089a74fefb9eabab2850ff0cbcc3507ff90d0c1fd7aff7bc7ff93fd57b8c55d9c39bcb9b565849b8358f66122f3b549ecf96799242407a2e54060a592ac9a72b5f26ac6620a830c83f2f046ced9186b20a18f861367bf09944d3901e2e44160de74ddb4309ff4b0fae5020c28296235bde533a9bbdd53ffee0f743f21e2041b9b1e0106575411d85a5ba0822", "36f1b9cc477c8c5e32d6b9f51e06d1682a2cbb8786d87dceb10e90357b173222b3e559c39b71b62d8699f861cdf7713e31f4a3c488da26c9ffe66a60998f83f0250ed83df01b9b06066a6ec139f95fe7499dd194c6e5445d497ab914faddb932601e5e573eea1a47d787330c8488d11e14af1340992b266d809dd5d76fd641abbf328c043c18991249c0ee5fd298af1a9bf09d73cdb8a05fd2081285bfa48cfc1f16f1b7f102325eaf3d9fd2018c54c1afb34fe82f98a49c733a3cfaaf015aa80f4b9776ee50d75e7377597cc1b349ca7b0c218f50aa4c9e080cf79f616101a32c68f6d80a35402add618ca312d88dc1864d4c437657fe19171ddf05c24a237570917d53cb8330c82008aa43f3312a6fa2852e38a411c45c60fb5372409b2cd2535861083ea876cc7fd927648a12c89811a1d7aa5855d0b78173981c16b4e98a99c910b93e39205dd0c4b9c6f5e4ed39bdee3487d9e5aa60aed5578ec2677101f1a9a39faf41cd73e76cefe092376067dbede8a1b8df3b153ea13a7e656c52a2f27ffca08c6ba5da80ff0ec5e94bda83382d2748b1988faf53ab97cac2b4abd87fbc0262c0320bfe068f318f08c4a07fc5fe9ada22b8b800fe095cbf0f5f942b7a8bf9955bfd8e79357de18f5bfb0779b1aac096718cfb8287c47765398403c8c488184166ffa1091e024ccc1aedb7db67c733912e627ff9606cc89ed24e2d2c911cc7df85b7d22c6d1e28382f8cf14ed4973ee37374b4f807500d173184b7dc79ba7d906e20025da1338c72a084b23abaa033a4113ef3857acff9e9e72036237764dc73672e95ce9878b68b3b36f6a33c79d9762f7f57a6028bccdcd637e2242b77ba7b046544dd3767cb759493d09c2eac3129782c107e8177a16af8c55a134d35b084126f0dc2af37020876d6ab84979643847bb234a4c1eb5fa7556d3b0091106b18634c9e9519c16dd1c3229bf5765151c848048f5479c0a32c6cc1f7009e2355d9c53dff8f883216e147e07ea8db8ecc92c0826a0e170b5551669da6c6ac3daefcae0a9f4442762349fee89f9fb961fbe6f9075e741230870b71a6ead7f2587f259461c12e36ff3fc92b270fdcdfe005f7782a544566aa19d73a8a35019a6c0d2c334bd3277060cdcfca7b4f33e89b49cd3abbbf0a6a98d2eed4a228dea2b1783dda5269d1e707730cc274e2bc71c4a753ca6547adec777e79d55eac6634bacca5fa5f4878afadcec00d00a684a95ab05e8dc8c2a4d98ad90b10c06524f48fb570d2eef99058a8db2b7dc05e6bb524df09d9e2268e35475419bd5f61444da74f82be9b0f05687bb2548c43a7f9eec59845fd0eac4d6a704f303935238c9e19f1000a157777c068a03664cc28d3ed86c40eb801523e30c3b07b4d9a837028d72f59fd655deb0d26d13e9d4020def4d48660943eb9f2f0da40e6feaac11e5cbbc4bc180405650344bf8fd01126afd58c33a2de4c61c03893bf4e29bf528a67d87661f506a389c3483975d24204e6ab5a037eb92fcd5bebe7c60653ce4313bb01dcb0cddcc5dd0cb665eddc8b7e8fa6d642a7a0594cc93dafa5455aefa173d939a32d0b9d91b5cb14b0ad05c7ac80fe729d401aae574fc8bdc40045c5dd203f27ea1f7e8f2663d865fd7a8fc2fa20c42734c6aec674735f5292c34cb3e4d6cf929847386fb1be06ecd38f50b3029ebe261e7f01164212903558888c6f68d371a9419cab42ebe3b436e6e3c30ad15139d0436a2d1b94f9ee61d299fbbee075089e0ad67dc6c3027633cb2652f81e1a066c5baa0c310a1fd76cce27acd840b1ef60ece9ac33d4d3b35eab04089a9f3770ad840dc0a8597f25a6702c51c712c4d32b66f8dfdedbeaf24e74062ea7682e19346a36e36014bb95189a9f127808b0245a57b18958740fd10f31c4eef26efc74b7e7d6b72b50d70e94c1d693c66270e825fbd708628782c87c79d06d6acb8054df311c585fe2f85fe4eceb373ac947ed0b9fd18bedd6c7b0958c8f7b94f8c6bc89f525da3d9a90fcab54d11db7a09dd13d650e1917975b7bd35e54372e70569a77e662ac801c9d368565a9edfc1a37588bcc18de498ef1c05ff6658933f4112d2107ce656de6c56e8e41f6a4292ec6e0ee40165826abeca2ca8d505a592a969ae8a8e4b9a454f949cb4c8986b33c6cc256ee1a461c37739a89c15b6a53d22f7787a5eaf859803f44038ee5392b273d5161ae8f22382019e7c6dcd4f8799a004b983a1ff9321d0cada2cac1a1b2189005488e689c414b22e1665737e03357fd85aabaecf0434b65e912f52f6fb011cab8397300dbbd91531bce2491e8ba7638fd1bc7da236a22bf1687cba290bff53359ca402622fce9a6419959be2d3c2174a1f08a58005949c2af779ce05ebfa7b4c7983ac2029f1ba7476298305c9c47467313e4056865e1d50b2018b944d8a149903ea5f1ff3e35e8b2e7326b719a7d19a9f5cbe6c7369957ae855f3b2b665333391840865e8cd0be2a6b09d0b99f49f3ee14b5efdccd9a0b3f358dd9043e2ffa28322fe0536a635be61d5a9c3c8951fa92e0d5ef30882ec7a8f2114ecad32643d8b824502ce33d35752ae751ef0b7c600d95cbdbaab7310e7aba5fd893d9efa39f566eb8e5bd34933f79c91cb9c0cc1efc61f29a9aa660228faf8d041021e4465d7194671fc416ffc39516fdca0ee781783c4633a9343cb6f98bfa7559fb7e49636414a6b8ff54140e8a8ef94af8ed0e67c300248637b77ebedb396c3735ed46cef8a214b175681ad1e03c8bd2ccbc1c6baf6ff1ee52772a3c08382cf6bf0c2f6c6febec68efe8aa5185f185230f59f528c15afd50e23794cd9ed26aa63ae26a2448c757d49dfe4aed3b15dad0242d10bd2e3e1bc4f81dcd697f3d2788593c1a305322ce07732915de9d8ac5087495ca710f95dc60700899e04bc6489957c0a9855ff9b439bf7aef269f589b81bee45465e0878abd12a8acc4b6208c7b1dd15c4f4eab240255a4d4d9080ab931bd6f8a8c473a285c3ab77e5f8c0250cff52c8e75ea7b39b6d119faac510af858e2505cce025b8cc1a0035b02517a5028f14c39e326cc696bc94d247dd660f3eff4fbcae19d830ed9d50b02b7d84b30ac6288f357f52c9d65d25998e41612199f8f3372f189e49257fcda522cc710ab3be4977456dfaf4aaf7fa592f8609a21e66df70a4b33490f578aaffe321c2781451842b2bf69e87df93988782d275cffa6c7ae835bafa1c7b01d60adc2891b739a78d8f4a8f7f140bbe0a0642f02af9ac3cfa0af2e14598a33e8483536f657ce9ea9be25081700951b9558ba8013b637e316706a9f5145c0ead316287486da8301d5f21e6ca666e5168ed1d318ce87d92bc510c071043d87f19c61e30966e20ef861b798bcbc288e92bf969d9bb9293fd921f0bf6f4bdaacc1e598c2edbe9fd5cb7f262814f2538870fed67885eaa36a5ba55259ceae0276219dd8c8dfddaef3ccdf989b20505669cc0d694b7b81f405f0788185544990c644c5f5e948711a233a84d590e385f004576efb9de843c4dab9236610b19d13597eec359f1ef3d6f41c64b75b6e60da020eac9ebe88c016727a3327aa76c08d6fb4b0b7475366939435940e7d7cfdc3523d1938318dfe14ed40569444a417e9df92330adc6d682ea659d0ff0d1e1901c17a1b929aba277c7bdef79fe6e763145078522a2558537e5d71c58195b366a8195ee81d03648a61aaa72ee5af4daac22bde335c3b5255f50f3368e0411394d244fb1bb23f81942cea838e2b29a7529889fe9b5976e86102c29799cb751e68ff146b3cd4bf6145592093b0d38b089c7c119b19ab9a2fa6761e882d02a1a779d305ccc571b1d1e997e0b13c6924e35b79b2a4838cc9d77ed1c4fb1c07f670d08346975ec0a13a536a72058ae0a4933f12b1a55ac9feef6393edcc065c49377d067e23cc10b3767fe6c6e9182f99f9f26fb3d81aae5696d4f0c2d403267ea0a25ef2410e499c5e668033236806ff0661901b4f176c64f89daa4fd2d8cbeb235462985f38c6023c0889141351da4a416829594b2a1ac4b7e2a9c29420aa5e50cfe00e8a00ca574cb55225252049dc45542e5837be95e08d7ffdfb2280238ea63eea7d0c7e988b3d02efb8ded4170e556d1f062c4350e836d862ca9441b33440a7e7b41f5755da8a9f98e5d808036bc76329eae7826449453cc95bf585ce3f316f82939f6cecc368b680a1e498ed73a6e501c5a12da97b18b3f88f4268d426e10ce90b723a20278200beaae6ebdc76424a7c452b2f21ad5fd92835f22cb3f596e6c882b07cd34fe892cdee921e5f2af83af4271cfb94ef902472b2a581b44fea4f5c3bc142662ad78bd9e13b55887bc83068a2b837f7920e7889bab7f9f8e985f766e78a4ab554a7bd78647238e87c8836ade18594d8e4f513fca679caac49ab1c6a3705eae8a285ce5424f5bbcb211fdd3e94bf41481ebee04987b9339dc5d909a76c726ff023dfa16d3e51b7c4c7a6901e7db1165a05f46ba84889dee23628572e9922bfde0a10b35440c233289b9755f85f06497dad2d08fc0aaa599db6d16f7d87d30586c8d3a6e7718adb351beaf39b60c7fba83f185ec5b40ac4d901077929fce0546d2a0f449e7c1e6e917b787a95e8a7cbb1098985c35543b161fadf415ee88100ef83f3b9fabbe5c5b7bb9113f7639b5b1602f55eb1551b95c007a4cb3fc1ed8ead66d9270524ee0fa697aa630100be4d0b3da8a84fd5fe424cf94c4b77000178d932e578eb8f45979d8b2997a90b425349a4b83aaa446acf8220fa8eb5d0ad96484e64dcd9e6bfa864a53b1acf4252b3407f77769028271c3a6bc37dd080a309dda6853e136defbf33a4276a24f683ded3e9c189f13f161ca2e71c08297db67719970e7e80bc996329239e51b07ac43c8495ecb975e8616c92786a78638260d1a1ca637f2d212af336e20b00c8b44669e51348d0a10af1ad69dc5ad571a7df5f87e6420717a48922d22f6e267f5640303da303720e32bdd2a2d1235f2eb43ffca53ba8226a9b5d471c285e082c466ae64934bfbd14f041b405e92b13a697d0881e7fb9750095ee090866eda591e0ef960ac519d2b7478cc33588a3936f743adf758d3e675235c0dab98e43c990a2302225390c0dadddbbf88c3472f11a5a8715a3313785293d63cafa7b5aefb6d2cc4286d873d78f7f6773f74ef497559184b8de170a5057cc7eb098029b2c2088b79b9bec1f0ff8ca67e8a9b89c8d51ae4139327ba739ee6478ff992b1ec9e9ae128e5c0faa0a24f98745acd43f0989b664addf096341dd6aa32c8db155a90d23c4a8ef5faaad07e755c8b910ebb26c3a23378cc4b5b50ff3c1b6750f6c795222bd3a657b51ea50a0826b58fb879dc0a2161e3b4d5657b3d166e56d3a"}) io_setup(0x283, &(0x7f0000000000)=0x0) dup2(r2, r6) io_submit(r9, 0x1, &(0x7f00000015c0)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x5, 0x0, r6, 0x0}]) ioctl$sock_inet_SIOCGARP(r6, 0x8954, &(0x7f0000000100)={{0x2, 0x4e21, @remote}, {0x1, @broadcast}, 0x20, {0x2, 0x0, @private=0xa010101}, 'ip6_vti0\x00'}) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r1, 0x6, 0x15, &(0x7f0000000080)=0x2, 0x4) ioctl$FITRIM(r1, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfffefffffffffffd, 0x7}) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000000)={0x9, 0x100, 0x4}) 17:38:45 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898", 0x4f, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:38:45 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x81, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c6163636573733d616e792c646566636f6e746578743d73797334656d5f752c6d6561737572652c736d61636b6673666c6f6f723dd2403a2d3a403a2424402c6f626a5f7c7970653d2c00"]) write$binfmt_elf64(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0xa, 0x7, 0x81, 0x0, 0x3, 0x3, 0xfffffff8, 0x14d, 0x40, 0x1cf, 0xe7, 0x20, 0x38, 0x1, 0x15, 0xe5, 0x8000}, [{0x4, 0x7, 0x80, 0x4, 0x7f, 0x3, 0x7, 0x9}, {0x60000000, 0x6, 0xfffffffffffffff8, 0x9, 0x5368, 0x1000, 0x5, 0x1ff}], "27ed17d2dc1a40b1b1c7167a00244e36efb97d88ff9b8165645e91ba58666eda1775e4cbc37855299ca49c92cb03556adc57c285677b260ca14e6c1b497e8fcfb3931c21addb3e955204c8d7780055c0740a09d4747cdcab5519b6a89d3890571e5cc2572109b1167c57ddb9dcf7f889440625760ce25f7b75e1a7b74ab65ba6379a0334342afc05ae690257a07adadce7d7f160f3c38eb246a62874998bf79622935bf849c7deffc3c00bd1e82171f75604a88f5d9f111a9199dd6673eeede896f0e71d3b97a7444c23ccee9d89b2a759e616209fb588f5c06f0bd6c5c2671197ce69f0a2", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x995) 17:38:45 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f0000000100)='./file0\x00') r2 = getpgrp(0x0) pidfd_open(r2, 0x0) getpgrp(r2) 17:38:45 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:38:45 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x300, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:38:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019080000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:38:45 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898", 0x4f, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:38:45 executing program 3: clone3(&(0x7f0000000400)={0x40000000, &(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140)=0x0, {0x1d}, &(0x7f0000000180)=""/49, 0x31, &(0x7f0000000340)=""/147, &(0x7f0000000200)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff], 0x5}, 0x58) wait4(r0, &(0x7f0000000480), 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c6163636573733d616e792c646566636f6e746505746394797374656d5f752c6d6561737572652c566d6163dc300f72b88ed68e1032cc253dfa6b6673666c6f6f723dd2402d2d3a403a24"]) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000000)) 17:38:45 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 39) 17:38:45 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898", 0x4f, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) [ 2595.412097] FAULT_INJECTION: forcing a failure. [ 2595.412097] name failslab, interval 1, probability 0, space 0, times 0 [ 2595.413654] CPU: 0 PID: 25593 Comm: syz-executor.4 Not tainted 5.10.194 #1 [ 2595.414521] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2595.415540] Call Trace: [ 2595.415872] dump_stack+0x107/0x167 [ 2595.416328] should_fail.cold+0x5/0xa [ 2595.416792] ? create_object.isra.0+0x3a/0xa20 [ 2595.417333] should_failslab+0x5/0x20 [ 2595.417785] kmem_cache_alloc+0x5b/0x310 [ 2595.418270] create_object.isra.0+0x3a/0xa20 [ 2595.418795] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2595.419398] kmem_cache_alloc+0x159/0x310 [ 2595.419894] p9_client_prepare_req.part.0+0x3a/0xac0 [ 2595.420490] p9_client_rpc+0x220/0x1360 [ 2595.420968] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2595.421598] ? p9_client_prepare_req.part.0+0xac0/0xac0 [ 2595.422225] ? pipe_poll+0x21b/0x7f0 [ 2595.422658] ? p9_fd_close+0x4a0/0x4a0 [ 2595.423118] ? anon_pipe_buf_release+0x280/0x280 [ 2595.423675] ? p9_fd_poll+0x1e0/0x2c0 [ 2595.424166] ? p9_fd_create+0x357/0x4a0 [ 2595.424640] ? p9_conn_create+0x510/0x510 [ 2595.425146] ? p9_client_create+0x798/0x11c0 [ 2595.425681] ? kfree+0xd7/0x340 [ 2595.426076] ? do_raw_spin_unlock+0x4f/0x220 [ 2595.426631] p9_client_create+0xa76/0x11c0 [ 2595.427158] ? p9_client_flush+0x430/0x430 [ 2595.427671] ? trace_hardirqs_on+0x5b/0x180 [ 2595.428203] ? lockdep_init_map_type+0x2c7/0x780 [ 2595.428786] ? __raw_spin_lock_init+0x36/0x110 [ 2595.429343] v9fs_session_init+0x1dd/0x1680 [ 2595.429876] ? lock_release+0x680/0x680 [ 2595.430360] ? kmem_cache_alloc_trace+0x151/0x320 [ 2595.430933] ? v9fs_show_options+0x690/0x690 [ 2595.431479] ? trace_hardirqs_on+0x5b/0x180 [ 2595.432010] ? kasan_unpoison_shadow+0x33/0x50 [ 2595.432558] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2595.433170] v9fs_mount+0x79/0x8f0 [ 2595.433624] ? v9fs_write_inode+0x60/0x60 [ 2595.434141] legacy_get_tree+0x105/0x220 [ 2595.434641] vfs_get_tree+0x8e/0x300 [ 2595.435100] path_mount+0x13be/0x20b0 [ 2595.435569] ? strncpy_from_user+0x9e/0x470 [ 2595.436104] ? finish_automount+0xa90/0xa90 [ 2595.436632] ? getname_flags.part.0+0x1dd/0x4f0 [ 2595.437199] ? _copy_from_user+0xfb/0x1b0 [ 2595.437736] __x64_sys_mount+0x282/0x300 [ 2595.438233] ? copy_mnt_ns+0xa00/0xa00 [ 2595.438734] do_syscall_64+0x33/0x40 [ 2595.439186] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 2595.439822] RIP: 0033:0x7f2cab73ab19 [ 2595.440271] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2595.442496] RSP: 002b:00007f2ca8cb0188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 2595.443428] RAX: ffffffffffffffda RBX: 00007f2cab84df60 RCX: 00007f2cab73ab19 [ 2595.444289] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 2595.445153] RBP: 00007f2ca8cb01d0 R08: 0000000020000280 R09: 0000000000000000 [ 2595.446034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2595.446890] R13: 00007ffd6c2ac3ef R14: 00007f2ca8cb0300 R15: 0000000000022000 17:38:45 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3e6, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:38:45 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2010, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:38:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019180000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:38:45 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setxattr$security_selinux(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000180), &(0x7f0000000200)='system_u:object_r:selinux_config_t:s0\x00', 0x26, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0xff, 0x0, 0x0, 0x1, 0x0, 0x8c6, 0x200, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x200, 0x1, @perf_bp={&(0x7f0000000300), 0xe}, 0x200, 0x800, 0x10000, 0x4, 0x2, 0x1, 0x5, 0x0, 0x81, 0x0, 0x1f}, 0xffffffffffffffff, 0x0, r0, 0x3) sendfile(r0, r1, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x24000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x81, 0x0, 0x0, 0x0, 0x5e, 0xb7ef61e8a0396fd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_bp={&(0x7f0000000280), 0x6}, 0x1000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r2, 0x0, 0x80000001) 17:38:45 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) clone3(&(0x7f0000000100)={0x81040100, 0x0, 0x0, 0x0, {0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x52) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:38:45 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd", 0x77, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:38:45 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000020000191c0000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:38:45 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) (fail_nth: 40) 17:38:45 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd", 0x77, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:38:59 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3201, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:38:59 executing program 3: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = dup(r1) mq_notify(r2, 0x0) read(r2, &(0x7f0000000000)=""/56, 0x38) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r4 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x3, 0xff, 0xff, 0x0, 0x0, 0x200, 0x1c7, 0x2, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffe1, 0x1, @perf_config_ext={0x5, 0x2}, 0x90, 0x1, 0x400, 0x9, 0x3, 0x5, 0x9, 0x0, 0x7c, 0x0, 0x7}, r4, 0xb, r3, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='rf\x00'/15, @ANYRESHEX=r5, @ANYBLOB=',=', @ANYRESHEX=r6, @ANYBLOB="2c6163636573733d616e792c646566636f6e746578743d73797374656d5f752c6d6561737572652c736d61636b6673666c6f6f723dd2403a2d3a403a2424402c6f626a5f747970653d2c00"]) 17:38:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000000020000196b0000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:38:59 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd", 0x77, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:38:59 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3e9, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:38:59 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:38:59 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee01}}, './file1\x00'}) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000340)={@in6={{0xa, 0x4e21, 0x3, @private2, 0x5}}, 0x0, 0x0, 0x2a, 0x0, "39b0f1f98925acb4575e2cd236982e83bedb193218f583140a7b596b8f35439cd4014006c63a3d22e81236b69851696dca60dbb1a614c0116e258aea52f81913de8f39bad4ee59ac8e9a2a5c4389bdf5"}, 0xd8) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = fcntl$dupfd(r5, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000000d40)={0x2, 0x80, 0x5, 0x9, 0x5, 0x0, 0x0, 0xfffffffffffffff7, 0x11020, 0x6, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3ff, 0x4, @perf_config_ext={0x94, 0x20}, 0x1410, 0xff, 0x3, 0x9, 0x6, 0xe9, 0x5, 0x0, 0x1000, 0x0, 0xbbeb}, 0xffffffffffffffff, 0xffffffffffffffff, r6, 0xb) sendmmsg$sock(r5, &(0x7f0000000c80)=[{{&(0x7f0000000100)=@pptp={0x18, 0x2, {0x3, @multicast1}}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000440)="4bac3670c8fecc41d28361f557303176542927dc3a0ce44d4f2b41c00f9bcfa2928de5a801205b8c7f0457dc346387a30594b84c12a3e516cb34958cdbed2b35292f5239da24073fdbefdd70ce0ab6979f9f65c8883783369fe12766834b7f5009267ec718aeda285ae477f07e7edad216069b00b4cf99120c52c0825458276aca05f34fb4cfe2730a0f098e", 0x8c}, {&(0x7f0000000500)="52f0a4e52057a3b242cf07309ce3e629b4ffd8fbb83e0274a77c6a188483c6aaed0fc797df6bd7227be629ad0343e1e13a4a421d64e40342b7ec3bab6e04e2add5867d44460bde0b2e66f92f88b3b4969bf99d727913c513da5878a4ca5d954d048dff8551b60936a678243d858c1983d1cdd146b85caced3a3a4486c1d7e5116f23bed88d4c10cce1b7f0baa2b8fab177590f4e2912507329412637831ad95ba5b8ca8ec57f44f094815482c360b13abb84ab3087025f1e49540ab662232e18758226dd", 0xc4}, {&(0x7f0000000600)="3bf519474f2d9674886b45da17aa1354220f35600d678d1e56510c5794d86b431bebf8a0f55b7e37d5ad2a36496a5dbc73ca34d3c9382bd0f9cc6db4bb9f734023d681f8cb8773f18e871671a5f2661d935d7e8c4122baed2f87bbbd1ec9f1a509f77d85b96aa678a9bca4a93083cc890f913612c3eec73485f001bfa27c0a4fdcb2ea1a663f2da2fa864bf34a6f310c693a282a91b352f59f113145361337cbac0a4b33de4d6726c2b245f4771e0e6087c05b55a18e648c64960ee4c4e2b9498344b9d416131b79bd086406a763040739ab188e", 0xd4}], 0x3, &(0x7f0000000700)=[@mark={{0x14, 0x1, 0x24, 0x1}}, @txtime={{0x18, 0x1, 0x3d, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @txtime={{0x18, 0x1, 0x3d, 0x1}}], 0x60}}, {{&(0x7f0000000780)=@nfc_llcp={0x27, 0x1, 0x0, 0x0, 0x7c, 0x1, "0d787a3ca75dc8eadc956db652b7f8a1713b76211c035cc1e8def1ff95f9c6cf9af0507d29bf05dadb41e3825b0d42d33efeca60a425570623fcc0ee95c47a", 0x3c}, 0x80, &(0x7f0000000880)=[{&(0x7f0000000200)="2e2ae954333ea6f3c46d393e38ae39843777cbcd63dbf47537e8814bbfc23faae552659b1be3f6941846ee9e50f5f50e564cecc3e7c2f4a90aa0", 0x3a}, {&(0x7f0000000940)="2a3013a212e34e384258c775997ba99eea2dfd7415ac72287463b862141213d179dcd3e2f531dc6ee90958e56f45c7afd82c49a9e6fb016f7f65431bf6c94e4485a84db34110369fa54816f8a4751b21d8321ec706173f47155932bea5b8b1229317cd6304372ac4e0e1b30a54b99bc58202864cfe2171d183323d73d07b3ade22fb46e3b60c72cdfe321df5a10f3f44ece397c8a32b21e39773fa3bf65e027ab26db77fdaea5a50ef7213dedaf9c05e86726a85ba2c8b2848b52c83d33ecd8849da02b26aff6f9946158cff0e1995ce083e264e824cf989944c0d80e3c38a4a904312f07a93b6c604d0", 0xea}, {&(0x7f0000000800)="be2e76f60ba908a1c62fd0efad2fc0e940bb0c04b095829670c344e08e7b1cfb2f790b5cd02379bfa640cdc5847b8163c903645c08f6ef1a1fa3f0ae2dce5fdabdceb77baa609f6c05c21280adf8201af435c86e7aa853f8c3aeec8ae6a471bdf04f9937d0177ebfaa4a5eca37fb", 0x6e}, {&(0x7f0000000a40)="864d670e455592b2218b7bf3a79ae4676af6160a36dbc38cf78519816f1897b94fa9aa47e43f9681662ba69a4558ec8e839fe5ca5e4aebefb88b5c4322fc75ca4afee8", 0x43}], 0x4, &(0x7f0000000ac0)=[@timestamping={{0x14, 0x1, 0x25, 0x3}}, @timestamping={{0x14, 0x1, 0x25, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x20}}, @timestamping={{0x14, 0x1, 0x25, 0x4}}, @mark={{0x14, 0x1, 0x24, 0x101}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}, @txtime={{0x18}}, @mark={{0x14, 0x1, 0x24, 0x8}}, @timestamping={{0x14, 0x1, 0x25, 0x8}}], 0xf0}}, {{0x0, 0x0, &(0x7f0000000c40)=[{&(0x7f0000000bc0)="3bbe91de4623bd3500b56910dda5ab693c8fd90cb74a2ea61781f90ff949996f597967b74a75042e9a4f", 0x2a}, {&(0x7f0000000c00)="ef64b8cdf3465afc166f89a349280d46835ca08796fe4e", 0x17}], 0x2}}], 0x3, 0x20000000) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:38:59 executing program 0: ftruncate(0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x2, 0xff, 0x9, 0x6, 0x0, 0xef, 0x10020, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x71}, 0x12, 0x8000, 0x3, 0x1, 0x0, 0x8, 0x2, 0x0, 0xa2b80000, 0x0, 0x7}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x9) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) lseek(r0, 0x800, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000001c0)={0x1, 0x80, 0x0, 0x43, 0x0, 0x8, 0x0, 0x1, 0x2004, 0xb, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x5, @perf_bp={&(0x7f0000000040), 0x4}, 0x140, 0x8000, 0xfff, 0x5, 0x4, 0x800, 0x0, 0x0, 0x7fff, 0x0, 0x2000000000007f}) 17:38:59 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019f00000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:38:59 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd5", 0x8b, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:39:00 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:39:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000300600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:39:15 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x500, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:39:15 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:39:15 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd5", 0x8b, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:39:15 executing program 3: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = dup(r1) mq_notify(r2, 0x0) setsockopt$IP_VS_SO_SET_TIMEOUT(r2, 0x0, 0x48a, &(0x7f0000000000)={0x6, 0xfffffffe, 0x3f}, 0xc) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r4, @ANYBLOB=',wfdno=', @ANYRESHEX=r5, @ANYBLOB="2c6163636573733d616e792c64656663a824ae788ee3e75b797374656d5f752c6d6561737572652c736d61636b6673666c6f6f723dd2403a2d3a403a2424402c6f626a5f747970653d2c003086495cd1dd9c728b7185bb233269c2704abad1dfa8059dda24cd8469cff4defd94dbe7f76491d20c804c830955aac10c200e855bf0970f20144a294108bdcf92a2e557fdf1334eb670892c790be53ded9eca0c9f1548dcf741f4466b93ea88edac7bd358db553d6ca685de1aaa430d23c2048dcd2f4a6b1bce4015082bf91c5fbaed0ea69e888d6c293607"]) ioctl$BTRFS_IOC_ADD_DEV(r5, 0x5000940a, &(0x7f0000000940)={{r3}, "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"}) 17:39:15 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') r3 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000000, 0x1010, r2, 0x0) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) r5 = mmap$IORING_OFF_SQES(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xb, 0x11, 0xffffffffffffffff, 0x10000000) syz_io_uring_submit(r3, r5, &(0x7f0000000140)=@IORING_OP_WRITE={0x17, 0x3, 0x2000, @fd_index, 0x100, &(0x7f0000000100)="50904ad1b0270842ab4f3e2dee2944072682326db6c6d13e524e2b60d9eb627416bd3eab11d99b10", 0x28, 0x0, 0x0, {0x0, r4}}, 0x0) getpgrp(0x0) 17:39:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4084, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:39:15 executing program 0: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd5", 0x8b, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:39:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019800400600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:39:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7e01, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:39:15 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:39:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000500600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:39:15 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd5", 0x8b, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:39:15 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=@allocspi={0xf8, 0x16, 0x1, 0x0, 0x0, {{{@in6=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee01}, {@in6=@dev, 0x0, 0x6c}, @in=@loopback}}}, 0xf8}}, 0x0) sendmsg$nl_generic(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000040)=ANY=[@ANYBLOB="200a000000080000000000000e00"/24, @ANYRESHEX=r1, @ANYBLOB="04001e80"], 0x20}}, 0x0) r2 = syz_io_uring_setup(0x12ef, &(0x7f0000000000)={0x0, 0xd222, 0x8, 0x0, 0x8c}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000340)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYRES32=0xee01, @ANYRES32=0xee01, @ANYBLOB="2e2f666988653000"]) io_uring_enter(r3, 0x2612, 0x500b, 0x2, &(0x7f0000000380)={[0x2]}, 0x8) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000000, 0x810, r2, 0x8000000) syz_io_uring_submit(r4, 0x0, &(0x7f00000002c0)=@IORING_OP_MADVISE={0x19, 0x1, 0x0, 0x0, 0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x64, 0x1}, 0x4) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_PROBE(0xffffffffffffffff, 0x8, &(0x7f0000000400)=ANY=[], 0x16) r5 = syz_open_procfs(0x0, &(0x7f0000000080)='smaps\x00') pread64(r5, &(0x7f0000001100)=""/4095, 0xae3, 0x6800) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r7 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x13, r6, 0x0) syz_io_uring_setup(0x21, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) eventfd(0x0) syz_io_uring_complete(r7) syz_io_uring_setup(0x3253, &(0x7f0000000100)={0x0, 0x65f1, 0x4, 0x0, 0x1e5, 0x0, r2}, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000180), &(0x7f00000001c0)) 17:39:15 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000600600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:39:15 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x600, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:39:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xe603, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:39:33 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x700, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:39:33 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b", 0x95, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:39:33 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x85}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000340)={{0x8, 0xff}, 0x100, './file1\x00'}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000740), 0x4, 0x0) r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) r6 = getpgid(r4) r7 = fcntl$getown(r2, 0x9) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f0000000200)=0xc) r9 = getpgrp(0x0) pidfd_open(r9, 0x0) r10 = getpgrp(0x0) pidfd_open(r10, 0x0) clone3(&(0x7f00000002c0)={0x80008000, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000100), {0x1a}, &(0x7f0000000140)=""/15, 0xf, &(0x7f0000000600)=""/248, &(0x7f0000000280)=[r6, r4, r7, r8, r9, r4, r10], 0x7, {r3}}, 0x58) r11 = dup(r5) mq_notify(r11, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="7472f4ecb76e6a13dbf546de771b0c", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYBLOB="f95db6218f7ef7484523e5396dbfa0d355c8803ac10a144ace20b353ad8fe44af1b0e97c3398fa5b8d87069c7f505da63fe51d1be3da49657576dc2f306397f7dc997d97d25b9b2d1ba27704d236945b251a0421786408fb083859a24436ba2a664826b9264df98f0d6bd65965aba23d391b9233e9f0460d0e3c705867a4714e4e6f1191f7ba0c1c1187b655408238c7739206b9203a698b1eeea5a742060ce3d7e435f9e535de786cd53c54283820fb86230fa019d99b7bfa420e7fe44f1c8fa9113094f6ab7c1ff5cf", @ANYBLOB="2c6163636573733d616e792c646566636f6e746578743d73797374656d5f752c6d6561737572652c736d61636b6673666c6f6f723dd2403a2d3a403a2424402c6f626a5f747970653d2c00", @ANYRESDEC, @ANYRESHEX=r4]) 17:39:33 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = dup(r1) mq_notify(r2, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000180)={'wlan0\x00'}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpeername$unix(r4, &(0x7f0000000100), &(0x7f0000000080)=0x6e) getpgrp(0x0) 17:39:33 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002ec0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_COOKIE(r2, 0x1, 0x39, &(0x7f0000002f00), &(0x7f0000002f40)=0x8) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="300000001200210c00002d0000000000b5618c2f8465371ac55dfbbea03ee0020000008ee9e2069e00000014000100ff010000000000000000000000000001c94af31f2ffdb23a94e776f93e88"], 0x30}, 0x1, 0x0, 0x0, 0x10008094}, 0x0) 17:39:33 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:39:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000700600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2642.885133] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 2642.905986] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. 17:39:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019001800600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:39:33 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_io_uring_setup(0x4d4f, &(0x7f0000000080)={0x0, 0x0, 0x1}, &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_SENDMSG={0x9, 0x6, 0x0, r0, 0x0, 0x0}, 0x0) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) syz_io_uring_submit(r4, r3, &(0x7f0000000100)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index, 0x0, 0x0}, 0x4) io_uring_enter(r1, 0x50d4, 0x0, 0x0, 0x0, 0x1f) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_STATX={0x15, 0x1, 0x0, 0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000040)='./file0\x00', 0x2, 0x2000}, 0xffffffff) 17:39:33 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b", 0x95, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:39:33 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x900, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:39:33 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat2(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)={0x121402, 0x100, 0xc}, 0x18) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:39:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xe903, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:39:33 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x5, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:39:33 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019001c00600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:39:33 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b", 0x95, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:39:50 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:39:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xedc0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:39:50 executing program 0: chroot(&(0x7f0000000000)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000200)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}], 0x0, &(0x7f0000000240)={[{@data_err_abort}, {@usrjquota}, {@nojournal_checksum}, {@sysvgroups}, {@data_err_ignore}, {@data_ordered}, {@nogrpid}, {@quota}, {@nobarrier}, {@commit={'commit', 0x3d, 0x800}}]}) 17:39:50 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfVno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733d616e792c646566656d5f752c6d6561737572652c736d61636b6673666c6f6f723dd2403a2d3a403a2424402c6f626a5f747970653d2ced79de530800"/79]) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x0, 0x7f}}, './file1\x00'}) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xdb}}, './file1\x00'}) flock(r1, 0x2) 17:39:50 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adf", 0x9a, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:39:50 executing program 7: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000200), 0x141000, 0x0) fsconfig$FSCONFIG_SET_FD(r0, 0x5, &(0x7f0000000280)='.#\'-&\\\'}\'^\x00', 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0x30}, 0x0, 0xffffffffffffffc9, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000180)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB="2c67616368653d6e6fb6042c00"]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000080)={0x0, 0x0, 0x800}) r5 = getpgrp(0x0) r6 = pidfd_open(r5, 0x0) r7 = dup(r6) mq_notify(r7, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7f, 0x3, 0xff, 0x3, 0x0, 0x6, 0x8000, 0xb, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x100, 0xfffffffffffffff9, 0x2c2c, 0x4, 0x3, 0x40, 0x1, 0x0, 0x6, 0x0, 0x3f}, r2, 0xb, r7, 0x2) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:39:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019002000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:39:50 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa00, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) [ 2660.480091] 9pnet: Insufficient options for proto=fd [ 2660.518475] EXT4-fs (loop0): Mount option "nojournal_checksum" incompatible with ext3 17:39:50 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019003f00600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:39:50 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adf", 0x9a, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:39:50 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x12a20, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:39:50 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat(r0, &(0x7f0000000000)='./file1\x00', 0x0, 0x28) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:39:51 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:39:51 executing program 0: r0 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x82081, 0x0) writev(r0, &(0x7f0000000300)=[{&(0x7f0000000040)="8b26847e45e3c57872fed084944dfb", 0xf}, {&(0x7f00000001c0)='f', 0x1}], 0x2) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r3, 0x40286608, &(0x7f00000000c0)={0x7fffffff, 0xffffffff, 0x101, 0xffffffffffffff0d, 0x10000, 0x4}) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/vmallocinfo\x00', 0x0, 0x0) preadv(r4, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0xffffff9f}], 0x58, 0x64f, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000000280), 0x202900, 0x0) mq_notify(0xffffffffffffffff, 0x0) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={'netdevsim0\x00', &(0x7f0000000100)=@ethtool_cmd={0x32, 0x0, 0x7, 0x5, 0x1, 0xff, 0x5, 0x5, 0x9, 0xc2, 0x1, 0x369a8196, 0x8, 0x0, 0x78, 0x20, [0x6]}}) syz_open_pts(r4, 0x1) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) fcntl$setlease(r5, 0x400, 0x1) fcntl$setlease(r5, 0x400, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_int(r6, 0x1, 0xe, 0x0, &(0x7f0000000140)) 17:40:09 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adf", 0x9a, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:40:09 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_fscache}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:40:09 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:40:09 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) r4 = dup(r3) mq_notify(r4, 0x0) openat2(r4, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100)={0x80203, 0x0, 0x16}, 0x18) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:40:09 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x12a21, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:40:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = dup3(r0, r0, 0x0) sendmsg$nl_generic(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f00000005c0)={0x11e4, 0x23, 0x400, 0x70bd27, 0x25dfdbfd, {0x3}, [@nested={0x11cf, 0x1e, 0x0, 0x1, [@typed={0x8, 0xa, 0x0, 0x0, @u32=0x4}, @typed={0x4, 0x22}, @generic="d629d2500b7aaf1438bdc0d903a228bab85d0c819c59d8f3e8af5a67d9a770b62c8283e85ab9ab57b2cd92b251e75b258056011c9af4069223675bff3e06a0ef6901551357a75d8bacba5dcc95503ed584d54128e31f63eb710a1d1545102f28afe8231f186529fce60b0526216e72fda69710960effde71850549db985cd9375d9fabf136330f3bc10dfd1c7a2c0e5b6a493a7e8da0525c72e971", @typed={0x98, 0x15, 0x0, 0x0, @binary="4360073e507c7077eebff8f91bd77c8546524dd523d453cef969bbe9b263e8f792c0ebc970236dcc273e9e447497f688950e6f00b562aefcac76721771f16121127afc350321e58d69d0cc5f2f8da220e6913614e49e8030eee993b88efa5605b32b913993076a9b306e81bbe5c0273407c739266a4c622d629d97f349daa312ee76f1a637a153ce402eaac967a34b1e94e778dc"}, @typed={0x14, 0x11, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @typed={0x14, 0x68, 0x0, 0x0, @ipv6=@remote}, @generic="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", @generic="bf9093cec736ec66e838ad75c7738644b7f9c00b1d89c8a884d70ac69c0368e0b37f36e63b44c687c45975791ab336778a7866c3199e5d3495607fa84f5efc27bef65a1b70c422a3e5d7e9b8121e28188ac91991fd1f13a00d7132ed23ec9f74853a50a9"]}]}, 0x11e4}, 0x1, 0x0, 0x0, 0xc040}, 0x40) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000480), 0xffffffffffffffff) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r5, &(0x7f0000000380)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x1c4, r2, 0x2, 0x70bd26, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_WANTED={0x1ac, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0xce, 0x5, "24514e19facf442f00f84490c6c6611ad69c3228bbe59c9a001219fae8c30681094fd1d27267b919b89c68ee00568745f75aaab1a9e301091529d7e65a608117fe1a415965830bb57d03463defda7f7924504b4f0335c753d41e487365af827d099e08ebfaab32893946a2dcfb544c9a7d98d077d70438029adaa16bccead727e4720a8337ccfe34d3912b20db8cdc061f67d75d82d287e902d73e1fbbdf12fad5a607bc91c405aef5698230d5e6de62afce91cc841b6ed562e1de644068b455fce618d82c63903fbcd1"}, @ETHTOOL_A_BITSET_MASK={0xd7, 0x5, "09b74b69e14093d9a9d6e203e1135ff6e0cbb15ec26e7e827d9b43659cdbed5f45dd642517e10c8aa1bc46ae56371ed6f3ff691ca7a750c846605edaeefa93aacf06584e533230f6defbe23f7372e114a551c9752395dedd98c5a98ff4e2efcb2903ee93d797ba95b778c72226d73b6bfa794a0aacdd8456ab27072ff6891dafce82e267f242df5a5a594ceb7810d110ba32d5d67f07356b84ae12cea9cdda33dff23dd4f0ace6853e00f98c472e74781da18d880cd783bbc5237cd73498f632ce349400e171ffa4729c9c17e3ed5e615a3e86"}]}, @ETHTOOL_A_FEATURES_WANTED={0x4}]}, 0x1c4}, 0x1, 0x0, 0x0, 0x4000}, 0x4044000) sendmsg$ETHTOOL_MSG_TSINFO_GET(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)={0x20, r2, 0x321, 0x0, 0x0, {0x13}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x20}}, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), r0) sendmsg$TIPC_NL_MEDIA_GET(r8, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f00000017c0)={0x30c, r9, 0x2, 0x70bd26, 0x25dfdbff, {}, [@TIPC_NLA_LINK={0x14c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7f}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xfffff000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x20}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x68fb}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xddf}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfdae}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xafa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_NET={0x40, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x3}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x4}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x20000000}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}]}, @TIPC_NLA_NET={0x44, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xbc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}]}, @TIPC_NLA_LINK={0x18, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x5c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0xf462}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4f34}, @TIPC_NLA_SOCK_CON={0x4}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x2}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x5}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x3}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}, @TIPC_NLA_SOCK_CON={0x4}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x1ff}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}]}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK={0x5c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}]}]}, @TIPC_NLA_NET={0x28, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x1}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}]}, @TIPC_NLA_PUBL={0x24, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x5}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x2}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x574}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x3}]}, @TIPC_NLA_PUBL={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0xfff}]}]}, 0x30c}, 0x1, 0x0, 0x0, 0x84}, 0x240488c0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r10}) accept$packet(r5, &(0x7f0000001cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000001d00)=0x14) sendmsg$ETHTOOL_MSG_LINKMODES_GET(0xffffffffffffffff, &(0x7f0000001f40)={&(0x7f0000001b00)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001f00)={&(0x7f0000001d40)={0x198, 0x0, 0x200, 0x70bd2b, 0x25dfdbff, {}, [@HEADER={0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'virt_wifi0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0x78, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vcan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'caif0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}]}, 0x198}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) 17:40:09 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019006b00600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:40:10 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb00, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:40:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019048000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:40:10 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106", 0x9c, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:40:10 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x12a22, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:40:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000200001900f000600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:40:10 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x9, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:40:10 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) execveat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000380), &(0x7f0000000440)=[&(0x7f00000005c0)='\x00Zz;\x92\xd0\xab&N\x97]v\xa8\xad\xd9\xd9UZ\xe8u\n}/\xa1\x01\xeb\xec}\xb4q\x89-\x80\x10\xe5\xdd\xa5\x00\x829I?\x9ar\x13\xf6x&\xca\xfe\xc9[F\xe1I:\xe8\x16\xa9\x01\x14\xbf8\xcc9V3\x8e\xbb\x83F/8\xbf\xd0\x0e\xc3.\xa42\x00\xff\x15\xca\x92\xd0W\xeb+]\xe9/\x86\xce\x9b\ttB\x01A\xb8\xba\xd6\t\x00\x05\xf3\xd3\x98\x8a\x10;-\xf8\x17\xd71%\xc7\x8a]u\xb3\xeaN\x06|\xc1\xf8T\xcc\xbb{\xbe\x04\xfb\xbeMZS\f*\xe4\xbdK\x90Fy\xb3m\az\x82\xfd', &(0x7f00000003c0)=']$-\x00'], 0x1000) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) ftruncate(r0, 0x1000003) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, r1) r2 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x40, 0x9a) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in6=@empty}}, {{@in=@broadcast}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) fsetxattr$security_capability(r0, &(0x7f0000000040), &(0x7f0000000080)=@v2={0x2000000, [{}, {0x8000000, 0x3}]}, 0x14, 0x0) stat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)) socket$netlink(0x10, 0x3, 0x0) ioctl$KDSKBLED(r2, 0x4b65, 0x8) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(0xffffffffffffffff, 0x80089419, &(0x7f0000000480)) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x1, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) 17:40:10 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xe01, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:40:10 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106", 0x9c, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:40:10 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x1ffffffffe, 0x0, 0x0, 0x2180085, 0x0) r1 = openat(r0, &(0x7f0000000080)='./file1\x00', 0x200, 0x12c) openat(r0, &(0x7f0000000340)='./file0\x00', 0x200000, 0xe0) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x100010, r1, 0x10000000) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) dup(r4) r5 = syz_io_uring_setup(0x4d53, &(0x7f0000000180), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, r9}}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000100)=@IORING_OP_SYNC_FILE_RANGE={0x8, 0x5, 0x0, @fd=r4, 0x2, 0x0, 0x1ff, 0x5, 0x0, {0x0, r9}}, 0x72d) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e733d6664a7c505dfbff14a", @ANYRESHEX=r10, @ANYBLOB=',y_dno=', @ANYRESHEX=r11, @ANYBLOB="2c6163636573733d616e792c646566636f6e746578743d73797374656d5f752c6d6561737572652c736d61636b6673666c6f6f723dd2403a2d3a403a2424402c6f626a5f747970653d2c00"]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:40:10 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000200600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) [ 2680.268245] 9pnet: Could not find request transport: fd§Åß¿ñJ0x0000000000000008 17:40:10 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3da1b260e863c5ebefd650d3fe8ea3c98707eec2e7c82491cef30b0f1b807611fd02dd1bca58041f15e71f52b55cbf1b53d105b09a736a332e79d7f112e7961c9337feeec121350f9d16487c024fe47ba4af24e882a97503317bc883d4b0dc809aecb25ddba767e00de2bbd013eaf1dbe3174a679c8c", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733d61cd3f2c646566636f6e746578743d73797374656d5f752c736d61636b6673666c6f6f723dd2403a2d3a403a2424402c6f626a5f747970653d2c00"]) 17:40:10 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106", 0x9c, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:40:10 executing program 0: openat(0xffffffffffffffff, 0x0, 0x0, 0x3a1) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101, 0x9}, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) lseek(r0, 0x3, 0xb5e46223464a3991) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r1, 0x29, 0x1, &(0x7f0000000040), 0x4) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) shutdown(r2, 0x1) setsockopt$inet6_udp_int(r1, 0x11, 0x1, &(0x7f0000000000)=0x8, 0x4) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0xda8, @any, 0x0, 0x2}, 0xe) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x3550, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$SMC_PNETID_FLUSH(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x34, 0x0, 0x100, 0x70bd28, 0x25dfdbfb, {}, [@SMC_PNETID_ETHNAME={0x14, 0x2, 'veth1_to_bond\x00'}, @SMC_PNETID_NAME={0x9, 0x1, 'syz0\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x4000000}, 0x1) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x105142, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x12, r3, 0x0) [ 2680.361528] 9pnet: Insufficient options for proto=fd 17:40:24 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:40:24 executing program 7: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e023d66642c98e5646e6f3d", @ANYRESHEX=r1, @ANYBLOB="2c775f64e01500", @ANYRESHEX=r2, @ANYBLOB="2c6163636573733d616e792c646566636f6e746578743d73797374656d5f752c6d6561737572652c736d61636b6673666c6f6f723dd2403a2d3a403a2424402c6f626a5f747970653d2c00"]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000080)={r0, 0x2, 0x2, 0x7}) pidfd_getfd(r3, r0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:40:24 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c6", 0x9d, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:40:24 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1020, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:40:24 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000000)=0x1000000, 0x4) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000180)=@ax25={{0x3, @default, 0x4}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast]}, 0x80, &(0x7f00000006c0)=[{&(0x7f0000000040)="050300000013890000004c435ce0f87181858ced753d49d8ecb2a18956fd475167c74940c9f170abcef15a2646cc6bc18bc7ea42b0a819b9aa6d6e0a40de161036b064c609c453dcc0193484715e01a3cf7350060000007a6365dbffdfe98717e7ebff0f36cec6bce2ec8f103a63900770d3e65bceb99a05540bc374fa63951f3f5e61d7b8f42a0c424f365c06a2c48ceeb861cac6", 0x95}, {&(0x7f00000003c0)="ac62de50be91", 0x6}, {&(0x7f0000000200)="1d88f33eb734f99290d4142f4edc59a594cfc9fb67620dbdba1784f3323692094fdf82550226cc26494ec4df2e49bb187238a5db8d0df95064a14be67d4907f87cfd8893ec11e8e0fd602bb13524829f4895933df68534ee53e6e4782c97f76087923da074be6a4b8d55e9432c426bf88d20c82678f53b65ff639c5fad2a2f0e0cbbbfe5efdad306799646f8ab9dd3", 0x8f}, {&(0x7f00000002c0)="aa5fff62080faf4b1c497849cea8f23ffe8708a44d1cdf38148d467e7decb4efede080d5f3ba3b599962f88509c64e27d8654dc189194485401c8c0f08d739a5483a2ed410627538b919468c62840d37d2bf6a750e1a2c53a65a41b09f7456a15ae0386c5ee2e1c889670e9d50a16e33ca9a5be644b75d796951616c2db77a0a05a7b040627aa375b2b930d115a2e42f41ddf2e089d7bc8373cbd57c717b1ff9e197153af3067d7cdd80627478f4d84247690a3240fa507a6cddb7d534325566", 0xc0}, {&(0x7f0000000640)="881a5d23ffa1e46c0bed3f2d82a53b692cc806c162ef6bbd169ef32255d63a7c8ba7f080635bbf590601313e2a46e874d5515db386f646dc50ccb5a5b20ca0616f890cb9c6c616538f31fe7ca775fd85cb4f46ec79bfb6244b301cdb26942ff79bfb1c6b15f0a5b9a57994468fe49bb328b222f2aa55cf342245fe92", 0x7c}, {&(0x7f0000000480)="7be887d31ecb2dabb7e54c2f0b5201cb37e480d2199c7c43e85085fab697be9ee18fcf54429a45ec084ebf6966e83db254fc277bcc584dd2dda73e0ef7857aa4fa3e9c24b76c04ccb35289c8047a8fdcacb94f144cdb97e1b7a6eb4b51ec35a2ec468cb50cbb7a72750707dd8a112f0eed24d61bc8ec0e5acabd04d40d3d91074d09eac57b3254c41c305327c1415352bbd0a9b54c4f49caef54d46c35d0ee965ea9826d6451ba49a4e3435c1aab32372ef0c0c5b0c2516e37d08fd5c47b7a745ff04d30fc723459907fb27316c9b264393eafbd4ab063ecc402e24aae1827412c5a", 0xe2}, {&(0x7f0000000580)="21af94334e8071ecb726f2c788b3b39ec53d083a7b5084343f5fa42e50e2287d63b9d1cf6b5a66fd158ec726a82bf3ccacecf5d130db87950bb69e2ae50fb0e025573c28d72a59012f2d05968d2da2997d5aef4b07b1c77815345afccd45f523be984c59e64b8c2bd6be8e3240bc1a116c5cf1ad33287d833fd3283fa43e58db269c9d3d05687465957275be7856958c4661c2ada3db1840ff4ae82834b0389fd524e01a343212ef399138628f", 0xad}], 0x7}, 0x0) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x100, 0x4}}, './file0\x00'}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000380)={'gretap0\x00', &(0x7f0000000400)={'ip_vti0\x00', 0x0, 0x7800, 0x8001, 0x8001, 0x1c547d15, {{0x13, 0x4, 0x2, 0x5, 0x4c, 0x68, 0x0, 0x5, 0x2f, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x20}, {[@timestamp_addr={0x44, 0x4, 0x56}, @rr={0x7, 0xf, 0x72, [@initdev={0xac, 0x1e, 0x0, 0x0}, @dev={0xac, 0x14, 0x14, 0x1b}, @loopback]}, @timestamp_prespec={0x44, 0x24, 0xf6, 0x3, 0x9, [{@multicast1, 0x8}, {@loopback, 0x7fff}, {@empty, 0x1}, {@remote, 0x1}]}]}}}}}) sendto$packet(r1, &(0x7f0000000740)="eef79ab462edc5b8acb2e3e41fc7468094c88baa4a0e7ae0bb9b4e9d4138cb58a62dea211cb7ee90e85598d3c508b93a77ba14dbe53e1713d6f96333cf840b0a0dc07758f4586984eec3ff1e0c243354058ecd982fd2326a116c0d42007db19ee54faf7c91eca7028859422a9869de8b77ffb372f73e9e87012e1ea12b997fb69609debad5ed9c3aba50968c045935369e7476", 0x93, 0x0, &(0x7f0000000800)={0x11, 0xf6, r2, 0x1, 0x6}, 0x14) 17:40:24 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000300600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:40:24 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0xfc, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0xfffd, 0x0, 0x200, 0x0, 0x10000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = getpgrp(0x0) pidfd_open(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000300)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400028020000400000004f80000200040000300000000000000010000000000000002", 0x2d}, {&(0x7f0000000100)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="a5347ad59412406de6185bed0a6c06000000570ee2fa4bfe0f77f7cf1b413207859fa5c08d094d1de51c34bdaad48ba41f0000003a90b2db77c41bf8de99eb"]) r1 = openat$null(0xffffffffffffff9c, 0x0, 0x54000, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000b00)={0x0, 0x800}, 0xc) ioctl$F2FS_IOC_GET_FEATURES(0xffffffffffffffff, 0x8004f50c, 0x0) r2 = creat(0x0, 0x0) fallocate(0xffffffffffffffff, 0x8, 0x0, 0x8000) write$9p(r2, &(0x7f00000000c0), 0x0) writev(0xffffffffffffffff, 0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) 17:40:24 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x12a23, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:40:40 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c6", 0x9d, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:40:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000400600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:40:40 executing program 3: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x12800, 0x10c) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$nl_sock_diag(0x10, 0x3, 0x4) signalfd4(r2, &(0x7f0000000000)={[0x4]}, 0x8, 0x800) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x20008, &(0x7f0000000100)=ANY=[@ANYRESOCT=r2, @ANYRES32=r0, @ANYRES64=r2, @ANYRESHEX=r1, @ANYBLOB="2c6163636573733d616e792c646566636f6e746578743d73797374656d5f752c6d6561737572652c736d61636b6673666c6f6f723dd2403a2d3a403a2424402c6f626a5f747970653d2c00"]) 17:40:40 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) chdir(&(0x7f0000000080)='./file0\x00') mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB='=\x00'/15, @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6163636573733d616e792c646566636f6e746578743d73797374656d5f752c6d6561737572652c736d61636b6673666c6f6f723dd2403a2d3a403a2424402c6f626a5f747970653d2c00"]) open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') r2 = getpgrp(0x0) pidfd_open(r2, 0x0) 17:40:40 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:40:40 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x12a24, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:40:40 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:40:40 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000600)={0x3060180, 0x0, 0x0, 0x0, {0xe}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = open(&(0x7f0000000040)='./file1\x00', 0x20002, 0x2) openat(r0, &(0x7f0000000080)='./file1\x00', 0x40000, 0x42) 17:40:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000500600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:40:40 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c6", 0x9d, 0x5, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) 17:40:40 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x12a25, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:40:40 executing program 7: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x1e5) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000180)=0x100000) r6 = dup(r4) mq_notify(r6, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0xc0, &(0x7f0000000340)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@noextend}, {@privport}, {@access_uid={'access', 0x3d, 0xee01}}, {@version_9p2000}, {@fscache}], [{@subj_user={'subj_user', 0x3d, 'system_u'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}]}}) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x40086602, &(0x7f0000000000)) unlink(&(0x7f00000000c0)='./file0\x00') getpgrp(0x0) 17:40:40 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) read(r5, &(0x7f0000000280)=""/137, 0x89) r6 = dup(r2) mq_notify(r6, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000100)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type={'obj_type', 0x3d, 'L\x99t\xb4#\xf7\x84IA\x04\"\x86\x80\f\x91)_\x8ft\xafe\xee\xac\xa9\xf0M\xe5Q\xdf'}}]}}) unlinkat(r0, &(0x7f0000000000)='./file1\x00', 0x200) 17:40:41 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2010, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:40:40 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000600600100000f000000000000000200000006000000000008000080000020000000dbf4655fdbf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='journal_path=>/file0,\x00']) 17:40:40 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x10, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_any}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xd2@:-:@:$$@'}}, {@obj_type}]}}) 17:40:40 executing program 2: ftruncate(0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x101}, 0x4c20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = dup(r2) mq_notify(r3, 0x0) getpgrp(0x0) r4 = pidfd_open(0x0, 0x0) r5 = dup(r4) mq_notify(r5, 0x0) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) r8 = dup(r7) mq_notify(r8, 0x0) io_submit(0x0, 0x8, &(0x7f00000007c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x7, r0, &(0x7f0000000080)="4704e665537dec251d8a17f8c71fd95fb7c9dfc1", 0x14, 0x2, 0x0, 0x1}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x1, 0x101, 0xffffffffffffffff, &(0x7f0000000140)="1ae1c9e55ddb1e417d9e2ecd1e213430bac49b4f891d89567a0a9c6f35405581fe7b83b06a47e745d6c440c5cfbadc56efc00086c80412888baf16ad791859387b2a061464916cdaede3a0eaaf9ba672775b1116f0c33f854ff7a9adc8d4c8aa40f8f9c7ded8b74eb96edd5e24223b01dce3fd5d4be880b381ab71a87cea71e394870d3c50308935d3e4010515275251bdb53791d84f4b2904973893b7ad01d6a74fffdc9712b767de35ff6c3264", 0xae, 0x7, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xa, 0xffffffffffffffff, &(0x7f0000000240)="6fda", 0x2, 0x7fff, 0x0, 0x1}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x2, 0x9e7d, 0xffffffffffffffff, &(0x7f00000002c0)="912e4b9092d8db2a7f88ff29f7f699269c481e7c3837b39f172d5422ab7f22b320cd2478d6b213a8c6889deedb0246c2d2a87b2ce22b063eec73081db33dcfd061beb6c0f670eba453b415fc8a7ce9dbeab81dd8fb9618645fa13cfd35826475914e3335353e73f51cf0b26b5f8af517c742486f8376fe702f0118d8e6fc2fc279d1633ffd38e9e1d489697e377e7fcc2a6d9063684e276c22ce85481d8d2eb01956e50ce8007ed1a1f596c6ec354d244195df65d9c03ea5f33696fc59bcec9487a31a2ec67a84999776bc5930a94095c769939e321e02d6a0f48eddb7909c83c589f1d3bf100b4bb3f1cba8551d", 0xee, 0x3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x7ff, 0xffffffffffffffff, &(0x7f0000000400)="fef902c6fbbff12568b2de39067841671b77e5a167902ebbfba23f882693d0a547e8fdccd0d04bf95a711430dacf50825d9356be0dd5ed29d567fef81d2823c837c82e08a3481d395cda1d449901643bc0f43039c1a64f474d442dabbe5f33dfc94a45145ccb76fec5ec683267201712384aeef73c54d6df0d015c3692ce0b55db05fccc2f52c025cd2b3be7513584ac515919cd53f54be0423bb34e7932583e519be26ce7fdb0547d82846b8299ca55cbdc16c90e2a92cc32b36555168af0c43c405fbc238ff4eef51a9c4b286a614c206d1ceee3d75519", 0xd8, 0x100000001, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x5, 0x1, 0xffffffffffffffff, &(0x7f0000000540)="7ec7c2a924f2fca7cd8304c668a880bcf9dba257d4d63c93de363d9b50efa72fe7", 0x21, 0x2, 0x0, 0x1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x1, 0x9, r3, &(0x7f00000005c0)="7efed1fa1fd59ad78f3456169fe724095061fe91cedf5e7c11c54eff3f1b0b28e477766f9f397f706368677fb283b7e7db9acc70c5b4e3c635dda9b4e19ff721dc57ad04ec4e1c751594274acab1940c043c593f2b3f557d8f49fb8e39634895b24dd7379491020b0afee1aaef7a8bd006b66473b6820679dafd1734849ee9251f88ca743cefdf578b25d8152bd153d1d85ae84310", 0x95, 0x6, 0x0, 0x0, r5}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x3, 0x3f, 0xffffffffffffffff, &(0x7f00000006c0)="776e32956ef1924c397c9319f3c93eddba4e01024be6ed7da04a20180c6a3cb2f35b80cd05909bf2d5e9c9ff77ff7241a5bfd23843baab0ec4643dd15fa1a2e75b782f0ada78a1d013e851831d7898f8b357468c20a6915a8859a3e651c64b0c6a9e8256b22881a4050246a1e7eb8550082952cbdfdedd92540f636b71a76003d60e225162cb8281f65bd54fee0d7a21fb0255686b4ad3c14adff106c61e", 0x9e, 0x0, 0x0, 0x3, r8}]) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(0xffffffffffffffff, 0x40046210, &(0x7f0000000040)=0x1) r9 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r9, 0x0, 0x100000001) VM DIAGNOSIS: 17:45:45 Registers: info registers vcpu 0 RAX=ffffffff83e55320 RBX=0000000000000000 RCX=ffffffff83e3d3dc RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e55928 RBP=fffffbfff09c6450 RSP=ffffffff84e07e38 R8 =0000000000000001 R9 =ffff88806ce3c16b R10=ffffed100d9c782d R11=0000000000000001 R12=0000000000000000 R13=ffffffff85671548 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e5532e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fb499952010 CR3=00000000196fa000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000412a64d000000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e55320 RBX=0000000000000001 RCX=ffffffff83e3d3dc RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e55928 RBP=ffffed100112e000 RSP=ffff88800897fe70 R8 =0000000000000001 R9 =ffff88806cf3c16b R10=ffffed100d9e782d R11=0000000000000001 R12=0000000000000001 R13=ffffffff85671548 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e5532e RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055cdc5136678 CR3=00000000196fa000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=000000000000000042959c574f8e4800 XMM02=00000000000000003fde666666666666 XMM03=00000000000000003fde666666666666 XMM04=00000000000000003fdae46cc095f450 XMM05=000000c0000ee870000000c0000ee840 XMM06=00000000000000003fd3333333333333 XMM07=00000000000000003fd0000000000000 XMM08=00000000000000003f49386f3bf31800 XMM09=0000000000000000bfde59ca2ec86cda XMM10=00000000000000003f999999999999a0 XMM11=000000c0000ee960000000c0000ee930 XMM12=000000c0000ee9c0000000c0000ee990 XMM13=000000c0000eea20000000c0000ee9f0 XMM14=000000c0000eea80000000c0000eea50 XMM15=000000c0000f6f20000000c0000eeab0