4, 0xa}, {0x5}, {0x2, 0x8}, {0x3, 0x1}, {0x2, 0x4}, {0x0, 0x3}, {0x0, 0x8}, {0x3, 0x6}, {0x0, 0x5}, {0x1}, {0x3, 0x9}, {0x7, 0x3}, {}, {0x1, 0x1}, {0x7, 0x4}, {0x0, 0x7}, {0x3, 0x4}, {0x2, 0x4}, {0x4, 0x1}, {0x0, 0x1}, {0x4, 0x6}, {0x3, 0x7}, {0x5, 0xa}, {0x7, 0x2}, {0x1, 0x8}, {0x4, 0x4}]}, @NL80211_TXRATE_HT={0x6, 0x2, [{0x1, 0x9}, {0x2, 0x9}]}, @NL80211_TXRATE_LEGACY={0x1c, 0x1, [0x3, 0x6c, 0x6, 0x12, 0x12, 0xb, 0x30, 0x5, 0xb, 0x1, 0x16, 0x3, 0x16, 0x6, 0x1, 0x60, 0x4, 0x36, 0x6c, 0x1, 0x1, 0x5, 0x1b, 0x1c]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_6GHZ={0x98, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x6d27, 0x0, 0x60, 0xfff7, 0x6, 0xff, 0x3f, 0x3ff]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x1d, 0x1, [0x30, 0x12, 0x3, 0x30, 0x16, 0x3, 0x1b, 0x69, 0x9, 0x2, 0x4, 0x60, 0x19, 0x4, 0x1, 0x12, 0x3f, 0x3, 0xa4c046eb454be536, 0x3, 0x24, 0x3, 0x9, 0x47, 0x48]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1f, 0x7, 0x4, 0x8, 0xffb, 0x4, 0x3, 0x8001]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0x1a, 0x1, [0x0, 0x6c, 0x48, 0x30, 0x0, 0x36, 0x6, 0x16, 0x48, 0x2, 0x2, 0x5, 0xb, 0x6c, 0x57, 0x0, 0x6, 0x4, 0x5, 0x36, 0x9, 0xc]}, @NL80211_TXRATE_LEGACY={0x1e, 0x1, [0x6, 0xc, 0x48, 0x4, 0x8, 0x12, 0x41, 0x12, 0x4, 0x39, 0x1, 0x6, 0x18, 0x30, 0x5, 0x18, 0xc, 0x18, 0x5, 0xb, 0x16, 0x9, 0x48, 0x3, 0x1b, 0x3]}]}]}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}]}, {0x18, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_NOACK={0x5}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x20}]}, {0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0x6c}]}]}]}, 0x75c}, 0x1, 0x0, 0x0, 0x40080}, 0x2004c814) clone3(&(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000000440)=[0x0, 0x0, 0x0], 0x3}, 0x58) 19:15:49 executing program 3: getpgrp(0x0) waitid(0x2, 0x0, &(0x7f0000000700), 0x8, &(0x7f00000007c0)) 19:15:49 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:15:49 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x5, 0x2, &(0x7f0000001240)=[{&(0x7f0000000180)="2f65deeb855c7923265ba4c8d90c0046885c3a5474f8cafb6e59ea06baab21be2b2257fa76607e8d7a8549852fa717626a249ec6b8ff8107c45f02a7c4789f49534112d137f7e6a2a4570c29f60a9c1c2e876e6a908abc401e0f1a716fa933ab385f9dc4b1cc213f896b3efa36e40d855ab83cc9010a5bc7f6c3447ca581ce38ee6ca2c72e9e83cca2a4c5111fee06e67eb03b51c25d794d45391d1b2348f2ebc178d9b3877901c6b13b467104a9a75a32a3f6b17e6d", 0xb6, 0xa7e}, {&(0x7f0000000240)="24ba39957bf2bb2dee378231b4a8d4a755d6a0e9e881587a299e4312b5cc6bb2b3e095fb66da450b3c77eeb30f916de229a359d76edd4d0d88735d64f86e8634cd7e920d8fe3de6b4186dd63c4eda51822d843e9228c734ed5636970fe2e5aaa8748740de6261770ef5c05ee1aca4cdca19fd42e7bcfb49a82a802036f1fc214b39f73341527849b53369dd9181f8c51e0224f951f6f718af298b6de27fd97f049c8dcb0bc9885b230db7c6e58a8e715d2f6a2847d78ca28b97d057b4f3c57c42d0d4a011c7b765ce001fed2eb5cdb8a0e7bbacbd272ee93713b5c06b427343fa84dd839efab2eeaccb26f49a1e7374caecbb1ecae5fb83b7cf836671b86ff3e8c1789508a57a10380304ab940d32df4a7f8d22a165d92cae352ec650cbddedcf75429ff49d7432f1fe24a8fad6409d4e3e67a2e9b58f31b900fc939e1c6a50d6deb53b0c266c761c61a5c3d33ee5021deba794f5fd8c03eeaa26d5a964fe629fbb50af805a0dd6734f0ea76550c6813233d6b729eec3a8af4ca6480f42e97830a07b4c00602b022d68092724f13c3b27c11abbc985f610289bd30a42b72d6bcb6bf0dd4f1999398e596608fea2843204d831d50a88693f40b1be2361a7a67133829f118e5fc0645ad02023522669fc1e9ccd402009e823abbe3a8c24b8aa52fcb214cf1c2b81593ea7e655310504362c717b869c4acec4dfae723def2d49270ab4c9062b8d09f42a7baf26d4c280b59f7c8e08a5be51f97c7c4acf03a0e0b1b604abf00c99929356ea9630c5313a45c8c33a5eb5cc32489693cfd6ed8a050ca4cbc9902a89d1fa457d681cde28921d7b0649cd21d79e77c4a9a88380c40a975db1750f5411b05ae766dd422036af63b009c9ff27a5e1b070578029f42c0bf1bf3b839d24ce4f87601e37d74126210c02664de239d5310389634e58ae1d54791300f1e3ba076cba3886721f592d18af895faa8306065e768fb4f065ebe45d2cb68c1910476bff683501109fd01665609b20d586de8999688edaf057154e57b53615c01e9298539d67159bcc1e1d8db85511ab76c613443072ba15c8c51a8408d2ba3c77402495f1d2976567c87daea65674ed00eda83f859bfad3641a9a3ed396741c9fd06d142ff99c597974c16991a971b169272b82d9a70cbaf183388524caa656c95978baef03bd8869e5510ecfe96fda8476161d99c9c8e3e9c54e1c8adee3ab4272abf7d67ac9454c80c3934516dad426652d4e5e90163d2e1dfe147ee90299be9c9be8d3ae95008b0034b94a3016ee7d42b40008885cb1c5f3ab8707dab7a14a08a65b4d652f271187932f6254baa5e7e1460b5b546f6c1b74478fb86ae9ff3add13ecc1b59e6c55c6b2659f508d4342ff0b049eb4db492fe2b98e9611067cd5e6f99bc6d09802254851797f8640d1999498b87c294a2fde833b79492455eeea805f5cc299d8b3047b494c98e1148f370fa953d6b380bad70f6efee228f5867b50ae0c8a55bc2e258a84964d6053b43ca9b890bfde24287e222f145643ce30cd94b884b1718d61ec06977ea1a6362ce314183d8a8d85fb77973e880984a2660611701a480578ffb8ac5603abf75cfc50f0d4956442b59848fd71755959c2dae0c007b095492656f26f4833ed4213514f7aced47f677e7bee0505416e15f9a7090724ae4585f0799ffe85b8f20e2474c311a71e2ff71db2b7d5923a7d23d9ba0a0991a0f2b221a19c5223bb4fb224d926d0bec45d2945b85071c2b424cae41a78114e8274bcfcb28a5613c5810c5ee8a6bb27fd153a1ee0b032acda8c8078348b90f142f1029b5978fb9beb02a8ded8f4f0eec5dc878a4eaef8d8760314fa24c6a2ff1198e7c4108aed74df8a02fe7c6504fa069b6546134363e239cc63306256c50d45f7d569f0369bbfe77967ff3506e0d8f8f76b975627068aa0416bd2bd6d07aa0a1021e2edb3f535d4ee7e61b343ae40f5a642d8dd1a52db299a1003fcdcbe04f49f00ac3f1d1a57132ecb0b2c021c42d167a1f427da3ae47d0e9398ecbac835bde82cffd8514f03d52acdf07e2d2f14be681e69da3ede0b0097e5b966e76f097d88e94c5a437b78e7415808002f3747f03108ff5fcf8a76a2a4424be365b2b99272e229c0c8952b1ce43ba9616d2c11471ac16ec2a635dd1ba038ad98f14d1675624451307843621f2f47366015d1ac4c97506eb6ddc08b5455eca809b618ddb08b6ae3d005616e67d690683d23d1b79dd67430e403446c1ae0807fd4636e90c0e733677b6b94ed61c01d34c9f6ef8d897f41f548837215091bcf56d9c5563dab82c02e9bd17043138155eb19bd166b80cd90ecb9fd22e4180dd404ed13e1badb4b6260fe679ee92899edc430a6855ec4c2c3291a613c2ead56ed0bd8c0ba910452f503e02e71a9961344b08bf0d305c03b6e28776f9fd71d59dd33f68fad395cc3d10e228684e1a6f7e4e20a57cbf47dc04e818547c4f0d2411422e8d026e7dd39675ff1bf07ce53e4c7a39b5e34973909f15e17d5ddd69932dde2b26881da66cd1b4afeb12bfecf29c4bd70ba985b366c700709160a7ddf3308f13069b7729f0ec901fb09017bcb067ac5ceea74dd2ad9d1234451c8158322cabad04e62542c4ad326cb3a1719ed274f79168f8b6bb5faf62417be186f79e23841c06ae8227e8c1a9b7e442f6d27a1eaa85bcaa42c0a331d0edd94b9f656387b8ab1ccac37f46881b1779762027e2afc5069e20df856409175b46249d8b58bca501b05b3db469a3cc36fb61123a815462202c9a9b3886fea5b3ae6a911faf1f5f22d83aaed15e22e5bdc6ca574b58bcb9087a4d0a2ef9f9cbe187551be8bc6fbe1bec86cb0937e6c7dae9f9ed81fad4c30250523085f7f3d8f2a2ca384dcf78da45e6393e27f65f9d9bf56e9a30167335c1fd17d40427536f579dccc3c86b4d33ba4dfc415e42fa8ca5a849ee1bf274b192067b1a7a397fe28c1857fa4101d525e2b719407500d03a1fbd98ce509bedc2c180c6fb97efdb995dd011732ca25d4d87a639600ce0a4c369c6b10279eb1289857920734c9ceead1793ecf73b30449e45e64a864b77526ed043ef311dce6a0b8ae83744a0e78a975b4cbf38ce30e9ac0c3d882cedf89a81ce1494fab98c2b09446fa833d5a988f7546d1cb1a3f777c2fe768f74536589e863cbb39cc9350ed0fbf33ff2baaa6cee8490f50cd729980a8a4796fabfe42009b15b76e8a48799b3c884417217356a786eedace4c3f0cb924f0efa6276b54831dbd9bc649a811a809a53169542ded8e71494f2df70cde9b29ebbd1ada042383597c0ece63247b96dd8360d441e632a13e121f756122d35a23e9575f9ee11ae7ffe7d953d388d7b0fdbc6018dd11416b1b77c9b01627e7a19e84a9d6c6768a38a856f8ffd65c9ee3459312cedc6d4e01555ca6d8ef6aa7b259020f04963382d0e5ea8aaa9a8a3dda18ced341c34e88986b4edc5476449791810710e7a084d19f64bfdbd5e0a42287b1505f3438b9d5adcfcaf9b8b99dd10480ff2f2cf1b975240db9663ef2cc1a1fc7fa9b95018843576c1ae6b18ff51edb9ecc6b6bf3942c58368fbb11cef86ef9fa9aa261b5ec9fc7b4fd6f90240602c9a6424c2f6dcbb02a074cfffe6651852ebbee9a933e9755bfbe0456bdc13b9e13c59d401e7f464c396addfeb3e372c87f22debc500a79a0d19bdeddbd4a3a206d45a5f01167c042b04fdda0f7951e7f037f391c6fbf0e1eaa121c8b5e20cb168c1f51504288331b2b1a72516cb17d5b33b16001ea293bbd7fb2851335869b3fca88155728a2fc16185bd9eb889816a5b0d2c0b3b6b83e31ab926b6a2ecaa7ec8c059a62da91d0422a8444cbc15e3520c3b98d66ca569e3e777c65c71ea006890af214f6500233061c4a2adb21576ab6796c130653e6c0a446ad3c88e9f1f7060e7e2c92f04c76af306bab0df88e7695d78a1240a57a6c3da21cf28347f4dd833fbdc31d71414f94aca90e4d1b28e6c69700a0c57989f65b2560d9180a2dddddb51624e5efd98735dbfc693e23511218add2f98c7bb9260534826a2ecc368d0371139c3e585e4c8a3be7534d57f5b3c56cf599bd1194ce67d99f2aabfd2691c7a4046eef33cb13913c57bde2c5064273103140caa46075b18c6469a058699008852f6e8aebfe4cbf06fbb143865a02221d5df8f9a90ee5ad442a7b5f5cbb6b60d9aa2a2042a7c32621837bbf4db7a268da4865a33ffbe33b6da25df4d1e935d6bf5853643d30e0d6e6ce7565ad6b4ef9ce9e14d3c2cd50446b68e103ca9bff1d1f7b6b17ac9769a18a2137e713642fc12edd416e663ed51f1a7f37ff844d260816ee9b09e13a4c0b9251f8d863fc275534900cf7463b16fd6477a2c6f6a909fb47963fddc722ff2a58eed7180ac647fd95afa1b9e7682cee91f6d31ace186ffda77a3e65701fe58e4bb44d7bfdb4a576fe0bc60df444ee144f3956e3615e087d7baf31b91add44e87f169f29125ebbc08392af021ddb10d34f30be7ba400a46638ad716f39eabcbf1c5a532d93db320f3b53dbce85659f1e5ae5c97e9db08a6f77b34e1a51695195fd11db62e47b3a6ee012b689df50c66d484e1ed9e018ce2e883b98a83b73070e55e003baa64f3479882f5a4d8d68fe50897be1aaec38ab1971e3f53d86ced368a04554799bd141bfefd03f21dfdac91543f59b56a1cb40bbc6b9402c0046810fa35f3af94db96de9b1a45555508f78c378081907887a75325759866d09894133379f42c41e616f73575aac93b497d745c78567b119f1dc466bc24292066e176d4a3d04dba934be4777c9cae3dfdc4d87ab4e378570cb37e534c119374f43d98abd4d76621c5824af8e2c64ab3301287a59582e9956f02c60d6b8789edb9500fccfb87ed1ccc61952393229fd285fffe13186891f5410dea312c792341cd1efcb05be2311744185e75501606faf2fd13b3517bdc8998632ee734ef1fa44f2f1f2c50620d3d0328bee5fd8f64d18a1248372bf805c243657b998f6aa463bca27f54c4abf67f4ee5ab8677addae4c6c6c17831b94b134f7422b5a19f081c9a2f0fa98bfb4d91e44342b043c5c8017e371eea1f1441cd283801d321508829631665f91ed6db672c76443d06c2d592a59ddac9c18931d501d7e7eeec272492b2e395176ff6c8b2539c2fb13bd20b8d0db7d21ec822c8918cf4cd52612d3bc1e2be7efd99426ab81a8207c7541c86f7266313df260146d1b16436c45bdfa3bde322b71592060296f9eedb21088625ff70873a2e3a2d34cea3cb3c0dc77a79a0d1dee3b958ef276d40997dcaed8c59688fae62ef45ca1846f7ccef18686ca7b4cf4084041c440c0174546c67122510fd565c641337371d4e47498c48bd1383027d56030edd5ed24275645830d74c53fabdad882eb15c95d287f4dd27bb5953f07ae0259395e7e892c6f66223e1093dfe280103938b78994e1ec72bc569ce497f31ef1d7dea5bbfa5c16fd183c9c6295fb8491ffdb738849ef1dd0e627d5a9a417fdc27df1f0822efe91cd6e5f2de44213f4338d5702561e4665e599b463d930ff51eb2071177b7a3286b90e797b68243b96ff5fe7f2abaf15f6ea77c60baec1f8b39968cd452422ce7a89aac6e241aed3a577f306c0d17a2b4be55974632a78be1e65cddff87e8c71a8742b9a975b77765aa58989dd1473420beeccadb81014da5285a37c7abebddc941c4d2dfb220d8c756e5198706d97b033b62d7ee9b12ca4d6629609b2453eaafdd6d206b5de609027b6a1b766f54134f5f9585", 0x1000, 0x8001}], 0x300c000, &(0x7f0000001280)={[{@nonumtail}, {@utf8no}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xf6\',-'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@audit}, {@obj_role={'obj_role', 0x3d, '/]/\x00'}}]}) 19:15:49 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, &(0x7f00000007c0)) 19:15:49 executing program 5: waitid(0x2, 0x0, &(0x7f0000000700), 0x8, &(0x7f00000007c0)) 19:15:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400b4, 0x0) [ 673.447632] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:16:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:16:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:16:09 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x0, &(0x7f00000007c0)) 19:16:09 executing program 2: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x81, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x4}}, '.\x00'}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe52a}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r1, &(0x7f0000000040)={0x1f, @fixed}, 0x8) r2 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x6) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2, 0x1f012, r2, 0x0) fork() 19:16:09 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x5, 0x2, &(0x7f0000001240)=[{&(0x7f0000000180)="2f65deeb855c7923265ba4c8d90c0046885c3a5474f8cafb6e59ea06baab21be2b2257fa76607e8d7a8549852fa717626a249ec6b8ff8107c45f02a7c4789f49534112d137f7e6a2a4570c29f60a9c1c2e876e6a908abc401e0f1a716fa933ab385f9dc4b1cc213f896b3efa36e40d855ab83cc9010a5bc7f6c3447ca581ce38ee6ca2c72e9e83cca2a4c5111fee06e67eb03b51c25d794d45391d1b2348f2ebc178d9b3877901c6b13b467104a9a75a32a3f6b17e6d", 0xb6, 0xa7e}, {&(0x7f0000000240)="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", 0x1000, 0x8001}], 0x300c000, &(0x7f0000001280)={[{@nonumtail}, {@utf8no}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xf6\',-'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@audit}, {@obj_role={'obj_role', 0x3d, '/]/\x00'}}]}) 19:16:09 executing program 5: waitid(0x2, 0x0, &(0x7f0000000700), 0x8, &(0x7f00000007c0)) 19:16:09 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, 0x0, 0x4) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) pipe2(&(0x7f0000000240)={0xffffffffffffffff}, 0x80000) sendmsg$nl_generic(r2, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x18, 0x41, 0x10, 0x70bd2c, 0x25dfdbff, {0xe}, [@typed={0x4, 0x8d}]}, 0x18}, 0x1, 0x0, 0x0, 0x20000004}, 0x8000) dup2(r1, r0) openat(0xffffffffffffff9c, 0x0, 0x84e00, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_ORIGINATORS(r3, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) keyctl$setperm(0x5, 0x0, 0x0) 19:16:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400b5, 0x0) 19:16:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:16:09 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x5, 0x2, &(0x7f0000001240)=[{&(0x7f0000000180)="2f65deeb855c7923265ba4c8d90c0046885c3a5474f8cafb6e59ea06baab21be2b2257fa76607e8d7a8549852fa717626a249ec6b8ff8107c45f02a7c4789f49534112d137f7e6a2a4570c29f60a9c1c2e876e6a908abc401e0f1a716fa933ab385f9dc4b1cc213f896b3efa36e40d855ab83cc9010a5bc7f6c3447ca581ce38ee6ca2c72e9e83cca2a4c5111fee06e67eb03b51c25d794d45391d1b2348f2ebc178d9b3877901c6b13b467104a9a75a32a3f6b17e6d", 0xb6, 0xa7e}, {&(0x7f0000000240)="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", 0x1000, 0x8001}], 0x300c000, &(0x7f0000001280)={[{@nonumtail}, {@utf8no}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xf6\',-'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@audit}, {@obj_role={'obj_role', 0x3d, '/]/\x00'}}]}) 19:16:09 executing program 5: r0 = getpgrp(0x0) waitid(0x0, r0, &(0x7f0000000700), 0x8, &(0x7f00000007c0)) 19:16:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400b6, 0x0) 19:16:09 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x0, &(0x7f00000007c0)) 19:16:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:16:10 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x0, &(0x7f00000007c0)) 19:16:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400b7, 0x0) [ 696.080699] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:16:31 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) syz_emit_ethernet(0xc1, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffff31f5269946420800450000b300000000001190289d340100ffffffff00004e20009f907801000000dea94a08b2c27411a26b7bd25b3fd3527a334323e3a27967b81313239d556014ad619924ce90be2d10a8fa1f6701c7175609ace40fb56638c8ea923b6cf876f0998fcbe898e1561f11b7d4b3533786b0b1ba6d52c2035a42fc98a1e484010cdbc4a0e21da93f42c2ec6817af011946f24ec305933dbc04c16c3da42b93acfa9d8bdfd136122391116873af1f04693bcb8476f9"], 0x0) 19:16:31 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:16:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:16:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400b8, 0x0) 19:16:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x5, 0x2, &(0x7f0000001240)=[{&(0x7f0000000180)="2f65deeb855c7923265ba4c8d90c0046885c3a5474f8cafb6e59ea06baab21be2b2257fa76607e8d7a8549852fa717626a249ec6b8ff8107c45f02a7c4789f49534112d137f7e6a2a4570c29f60a9c1c2e876e6a908abc401e0f1a716fa933ab385f9dc4b1cc213f896b3efa36e40d855ab83cc9010a5bc7f6c3447ca581ce38ee6ca2c72e9e83cca2a4c5111fee06e67eb03b51c25d794d45391d1b2348f2ebc178d9b3877901c6b13b467104a9a75a32a3f6b17e6d", 0xb6, 0xa7e}, {&(0x7f0000000240)="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", 0x1000, 0x8001}], 0x300c000, &(0x7f0000001280)={[{@nonumtail}, {@utf8no}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xf6\',-'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@audit}, {@obj_role={'obj_role', 0x3d, '/]/\x00'}}]}) 19:16:31 executing program 5: r0 = getpgrp(0x0) waitid(0x0, r0, &(0x7f0000000700), 0x8, &(0x7f00000007c0)) 19:16:31 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:16:31 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(0xffffffffffffffff, &(0x7f0000000040)={0x1f, @none}, 0x8) bind$bt_sco(r0, &(0x7f0000000000)={0x1f, @none}, 0x8) fstatfs(r0, &(0x7f00000001c0)=""/193) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setsockopt$sock_timeval(r0, 0x1, 0x14, &(0x7f0000000100)={r2, r3/1000+60000}, 0x10) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000180)=""/17) listen(r0, 0x0) 19:16:31 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, 0x0) [ 703.936004] FAULT_INJECTION: forcing a failure. [ 703.936004] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 703.938809] CPU: 0 PID: 5759 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 703.940237] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 703.942013] Call Trace: [ 703.942574] dump_stack+0x107/0x167 [ 703.943344] should_fail.cold+0x5/0xa [ 703.944166] _copy_to_user+0x2e/0x180 [ 703.944980] simple_read_from_buffer+0xcc/0x160 [ 703.945964] proc_fail_nth_read+0x198/0x230 [ 703.946874] ? proc_sessionid_read+0x230/0x230 [ 703.947829] ? security_file_permission+0x24e/0x570 [ 703.948869] ? perf_trace_initcall_start+0x101/0x380 [ 703.949963] ? proc_sessionid_read+0x230/0x230 [ 703.950922] vfs_read+0x228/0x580 [ 703.951657] ksys_read+0x12d/0x260 [ 703.952409] ? __ia32_sys_pwrite64+0x230/0x230 [ 703.953375] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 703.954470] ? syscall_enter_from_user_mode+0x1d/0x50 [ 703.955554] do_syscall_64+0x33/0x40 [ 703.956333] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 703.957408] RIP: 0033:0x7f4b858bd69c [ 703.958185] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 703.962049] RSP: 002b:00007f4b82e80170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 703.963639] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f4b858bd69c [ 703.965124] RDX: 000000000000000f RSI: 00007f4b82e801e0 RDI: 0000000000000003 [ 703.966619] RBP: 00007f4b82e801d0 R08: 0000000000000000 R09: 0000000000000000 [ 703.968103] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000001 [ 703.969604] R13: 00007ffdbd7b6def R14: 00007f4b82e80300 R15: 0000000000022000 19:16:31 executing program 5: r0 = getpgrp(0x0) waitid(0x0, r0, &(0x7f0000000700), 0x8, &(0x7f00000007c0)) 19:16:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), 0x0, 0x5, 0x2, &(0x7f0000001240)=[{&(0x7f0000000180)="2f65deeb855c7923265ba4c8d90c0046885c3a5474f8cafb6e59ea06baab21be2b2257fa76607e8d7a8549852fa717626a249ec6b8ff8107c45f02a7c4789f49534112d137f7e6a2a4570c29f60a9c1c2e876e6a908abc401e0f1a716fa933ab385f9dc4b1cc213f896b3efa36e40d855ab83cc9010a5bc7f6c3447ca581ce38ee6ca2c72e9e83cca2a4c5111fee06e67eb03b51c25d794d45391d1b2348f2ebc178d9b3877901c6b13b467104a9a75a32a3f6b17e6d", 0xb6, 0xa7e}, {&(0x7f0000000240)="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", 0x1000, 0x8001}], 0x300c000, &(0x7f0000001280)={[{@nonumtail}, {@utf8no}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xf6\',-'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@audit}, {@obj_role={'obj_role', 0x3d, '/]/\x00'}}]}) 19:16:31 executing program 0: syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) prctl$PR_SET_IO_FLUSHER(0x39, 0x1) syz_io_uring_setup(0x579f, &(0x7f00000000c0)={0x0, 0xef1b, 0x8, 0x0, 0x4}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000400), &(0x7f0000000440)) prctl$PR_SET_IO_FLUSHER(0x39, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) write$P9_RREADDIR(r0, &(0x7f0000000000)={0xa6, 0x29, 0x2, {0x2, [{{0x1, 0x4, 0x4}, 0x3, 0x1, 0x7, './file0'}, {{0x2, 0x4, 0x2}, 0xc9f, 0x7, 0x7, './file0'}, {{0x659576226dc4330b, 0x0, 0x7}, 0x1, 0x8, 0x7, './file0'}, {{0x0, 0x1, 0x7}, 0x80000000, 0x0, 0x7, './file0'}, {{0x0, 0x0, 0x8}, 0xfa, 0x5, 0x7, './file0'}]}}, 0xa6) 19:16:31 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) (fail_nth: 1) 19:16:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400b9, 0x0) 19:16:31 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, 0x0) 19:16:31 executing program 5: getpgrp(0x0) waitid(0x2, 0x0, &(0x7f0000000700), 0x8, &(0x7f00000007c0)) [ 716.618354] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:16:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:16:51 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000009c0)='./file0\x00', 0x40000, 0x3, &(0x7f0000000440)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000d5f4655fd6f4655f0100ffff53ef010001000000d5f4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000d5f4655fd5f4655fd5f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="6e6f10e3e9b1305d67f3583b32bf01ab1471dd2db100"]) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) name_to_handle_at(r0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=@FILEID_UDF_WITH_PARENT={0x14, 0x52, {{0xbc, 0x1, 0x400, 0x3}, 0xfffffffc, 0x6}}, &(0x7f0000000100), 0x3c00) 19:16:51 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, &(0x7f0000001240)=[{&(0x7f0000000180)="2f65deeb855c7923265ba4c8d90c0046885c3a5474f8cafb6e59ea06baab21be2b2257fa76607e8d7a8549852fa717626a249ec6b8ff8107c45f02a7c4789f49534112d137f7e6a2a4570c29f60a9c1c2e876e6a908abc401e0f1a716fa933ab385f9dc4b1cc213f896b3efa36e40d855ab83cc9010a5bc7f6c3447ca581ce38ee6ca2c72e9e83cca2a4c5111fee06e67eb03b51c25d794d45391d1b2348f2ebc178d9b3877901c6b13b467104a9a75a32a3f6b17e6d", 0xb6, 0xa7e}, {&(0x7f0000000240)="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", 0x1000, 0x8001}], 0x300c000, &(0x7f0000001280)={[{@nonumtail}, {@utf8no}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xf6\',-'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@audit}, {@obj_role={'obj_role', 0x3d, '/]/\x00'}}]}) 19:16:51 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000880)={'fscrypt:', @desc4}, &(0x7f0000000540)={0x0, "65a6cf5b9c07642a3340db90bee4874c94ec4fdd53be77d8805520d91682233c045247ee072dddb4606017c18511ee7cc2005a83f5d5bbc07333a25fce3d1db4", 0x35}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "2e9add4446b12aa3fc3cf3dd1e3b866c2e5f2be9bb5d373aed73e52673803055fc89df3311285e8632aaebad2b5d2b22782779207a7559f167c1a71c751629d9", 0x38}, 0x48, 0xfffffffffffffffa) keyctl$setperm(0x5, r1, 0x8200008) r2 = request_key(&(0x7f0000000440)='cifs.spnego\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000500)='e8dab99234bb312e', r1) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r2, 0x0) keyctl$revoke(0x3, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x3) keyctl$KEYCTL_MOVE(0x1e, r1, 0x0, r0, 0x0) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "6ae3a2279441c8bccb61a522f5e4e661ce0cb09305967cbd5b3e03bcee0579af6f2b79a27a599a8947acb47fc038d0c2a8bf68feedeeb2fcfcb3f785bb85aec9"}, 0x78bd, 0xfffffffffffffffd) stat(&(0x7f0000000680)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r3, r4, 0x0) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/240, 0xf0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x17}, 0x3}, 0x1c) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x24004011) r6 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "1e962aaa403851b2ba51fc94d06077c0d780c9cb83784e2d15a54a30e93ee68feb3179c487b15a41d69316cb3744d946c557ad2e830b3ac62e4d461357dbde0c", 0x2f}, 0x48, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r6) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0xfc, 0x2, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000640), 0x4}, 0x0, 0x0, 0x40000}, 0x0, 0xb, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r5, &(0x7f0000004d00)=[{{0x0, 0x1100, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 19:16:51 executing program 5: getpgrp(0x0) waitid(0x2, 0x0, &(0x7f0000000700), 0x8, &(0x7f00000007c0)) 19:16:51 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, 0x0) 19:16:51 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:16:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400ba, 0x0) [ 724.115633] SELinux: duplicate or incompatible mount options 19:16:51 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) [ 724.143864] EXT4-fs (loop0): Unrecognized mount option "noãé±0]góX;2¿«qÝ-±" or missing value 19:16:51 executing program 5: getpgrp(0x0) waitid(0x2, 0x0, &(0x7f0000000700), 0x8, &(0x7f00000007c0)) 19:16:51 executing program 3: r0 = getpgrp(0x0) waitid(0x3, r0, 0x0, 0x8, 0x0) 19:16:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400bb, 0x0) 19:16:51 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x300c000, &(0x7f0000001280)={[{@nonumtail}, {@utf8no}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xf6\',-'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@audit}, {@obj_role={'obj_role', 0x3d, '/]/\x00'}}]}) [ 724.232205] EXT4-fs (loop0): Unrecognized mount option "noãé±0]góX;2¿«qÝ-±" or missing value [ 724.238266] 9pnet: Insufficient options for proto=fd [ 724.309324] SELinux: duplicate or incompatible mount options 19:16:51 executing program 3: r0 = getpgrp(0x0) pidfd_open(r0, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:16:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r1, 0x330b) sendmsg$DEVLINK_CMD_RATE_DEL(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xa0, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @handle=@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_PORT_INDEX={0x8}, @DEVLINK_ATTR_RATE_NODE_NAME={0x2e, 0xa8, @random="3d16e566d81ccc3fcb0312824cf4bb92c377c60085240f495c1d87fa5163b520a31f1c14ec27e6cacb92"}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}]}, 0xa0}, 0x1, 0x0, 0x0, 0x44000}, 0x1) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x24, 0x18, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, 0x0, 0x0, @pid}, @nested={0x8, 0x8, 0x0, 0x1, [@typed={0x4, 0x10}]}]}, 0x24}}, 0x0) 19:16:51 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, &(0x7f00000007c0)) [ 738.127219] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:17:20 executing program 2: r0 = add_key$fscrypt_v1(&(0x7f00000005c0), &(0x7f0000000880)={'fscrypt:', @desc4}, &(0x7f0000000540)={0x0, "65a6cf5b9c07642a3340db90bee4874c94ec4fdd53be77d8805520d91682233c045247ee072dddb4606017c18511ee7cc2005a83f5d5bbc07333a25fce3d1db4", 0x35}, 0x48, 0xfffffffffffffffb) r1 = add_key$fscrypt_v1(&(0x7f0000000240), &(0x7f0000000280)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "2e9add4446b12aa3fc3cf3dd1e3b866c2e5f2be9bb5d373aed73e52673803055fc89df3311285e8632aaebad2b5d2b22782779207a7559f167c1a71c751629d9", 0x38}, 0x48, 0xfffffffffffffffa) keyctl$setperm(0x5, r1, 0x8200008) r2 = request_key(&(0x7f0000000440)='cifs.spnego\x00', &(0x7f0000000480)={'syz', 0x0}, &(0x7f0000000500)='e8dab99234bb312e', r1) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r2, 0x0) keyctl$revoke(0x3, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, 0x0) keyctl$get_keyring_id(0x0, 0x0, 0x3) keyctl$KEYCTL_MOVE(0x1e, r1, 0x0, r0, 0x0) r3 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "6ae3a2279441c8bccb61a522f5e4e661ce0cb09305967cbd5b3e03bcee0579af6f2b79a27a599a8947acb47fc038d0c2a8bf68feedeeb2fcfcb3f785bb85aec9"}, 0x78bd, 0xfffffffffffffffd) stat(&(0x7f0000000680)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r3, r4, 0x0) keyctl$get_security(0x11, r3, &(0x7f0000000340)=""/240, 0xf0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x17}, 0x3}, 0x1c) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x24004011) r6 = add_key$fscrypt_v1(&(0x7f00000000c0), &(0x7f0000000180)={'fscrypt:', @desc3}, &(0x7f00000001c0)={0x0, "1e962aaa403851b2ba51fc94d06077c0d780c9cb83784e2d15a54a30e93ee68feb3179c487b15a41d69316cb3744d946c557ad2e830b3ac62e4d461357dbde0c", 0x2f}, 0x48, 0x0) add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, r6) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x0, 0xfc, 0x2, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000640), 0x4}, 0x0, 0x0, 0x40000}, 0x0, 0xb, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r5, &(0x7f0000004d00)=[{{0x0, 0x1100, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 19:17:20 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r2 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000180)=""/17) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000080)=0x0) sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1c5f45cfa5e91d03}, 0xc, &(0x7f0000000100)={&(0x7f00000001c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="000128bd7000fddbdf251400000008001c00", @ANYRES32=r3, @ANYBLOB="08001d00", @ANYRES32, @ANYBLOB="e25a978fbe3faefe3e273b3ade0a227550e20f5c0b5cc33d77b19437615a029b6a2f07009b2f66a594b822075e1901343adfa045c7464f9aa6094fbc6ffd111bd5"], 0x24}, 0x1, 0x0, 0x0, 0x4008004}, 0x4000080) ftruncate(r2, 0x4) 19:17:20 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:17:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:17:20 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[{@nonumtail}, {@utf8no}, {@utf8no}, {@iocharset={'iocharset', 0x3d, 'cp1251'}}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xf6\',-'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@audit}, {@obj_role={'obj_role', 0x3d, '/]/\x00'}}]}) 19:17:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400bc, 0x0) 19:17:20 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x0, &(0x7f00000007c0)) 19:17:20 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r1, 0x330b) sendmsg$DEVLINK_CMD_RATE_DEL(r1, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0xa0, 0x0, 0x100, 0x70bd26, 0x25dfdbfe, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @handle=@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_PORT_INDEX={0x8}, @DEVLINK_ATTR_RATE_NODE_NAME={0x2e, 0xa8, @random="3d16e566d81ccc3fcb0312824cf4bb92c377c60085240f495c1d87fa5163b520a31f1c14ec27e6cacb92"}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @DEVLINK_ATTR_RATE_NODE_NAME={0xf, 0xa8, @name2}]}, 0xa0}, 0x1, 0x0, 0x0, 0x44000}, 0x1) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)={0x24, 0x18, 0x1, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, 0x0, 0x0, @pid}, @nested={0x8, 0x8, 0x0, 0x1, [@typed={0x4, 0x10}]}]}, 0x24}}, 0x0) [ 753.034965] 9pnet: Insufficient options for proto=fd [ 753.039524] SELinux: duplicate or incompatible mount options 19:17:20 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) [ 753.057085] 9pnet: Insufficient options for proto=fd 19:17:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:17:20 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 19:17:20 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x0, &(0x7f00000007c0)) 19:17:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400bd, 0x0) [ 753.148817] 9pnet: Insufficient options for proto=fd 19:17:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 753.173077] 9pnet: Insufficient options for proto=fd 19:17:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:17:20 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) tkill(r0, 0x5) waitid(0x2a402741ffe46ce0, r0, &(0x7f0000000000), 0x1, &(0x7f0000000080)) [ 753.258806] 9pnet: Insufficient options for proto=fd [ 753.308352] 9pnet: Insufficient options for proto=fd [ 767.086753] kmemleak: 46 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:17:43 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:17:43 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) (fail_nth: 1) 19:17:43 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:17:43 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x0, &(0x7f00000007c0)) [ 776.235608] FAULT_INJECTION: forcing a failure. [ 776.235608] name failslab, interval 1, probability 0, space 0, times 0 [ 776.238059] CPU: 1 PID: 5898 Comm: syz-executor.2 Not tainted 5.10.153 #1 [ 776.239485] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 776.241496] Call Trace: [ 776.242045] dump_stack+0x107/0x167 [ 776.242942] should_fail.cold+0x5/0xa [ 776.243722] should_failslab+0x5/0x20 [ 776.244647] __kmalloc_track_caller+0x79/0x3c0 [ 776.245569] ? strndup_user+0x74/0xe0 [ 776.246607] memdup_user+0x22/0xd0 [ 776.247419] strndup_user+0x74/0xe0 [ 776.248252] __x64_sys_mount+0x133/0x300 [ 776.249170] ? path_mount+0x20b0/0x20b0 [ 776.250295] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 776.251487] ? syscall_enter_from_user_mode+0x1d/0x50 [ 776.252658] do_syscall_64+0x33/0x40 [ 776.253502] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 776.254334] 9pnet: Insufficient options for proto=fd [ 776.254677] RIP: 0033:0x7f9e7d561b19 [ 776.256663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 776.260793] RSP: 002b:00007f9e7aad7188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 776.262513] RAX: ffffffffffffffda RBX: 00007f9e7d674f60 RCX: 00007f9e7d561b19 [ 776.264120] RDX: 00000000200001c0 RSI: 00000000200000c0 RDI: 0000000000000000 [ 776.265721] RBP: 00007f9e7aad71d0 R08: 00000000200002c0 R09: 0000000000000000 [ 776.267351] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 776.268952] R13: 00007ffd71373eaf R14: 00007f9e7aad7300 R15: 0000000000022000 19:17:43 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 19:17:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:17:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400be, 0x0) 19:17:43 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ptrace$setsig(0x4203, r2, 0x4, &(0x7f0000000040)={0x38, 0x0, 0x5}) getpgrp(r1) getrusage(0x0, &(0x7f00000000c0)) 19:17:43 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:17:43 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:17:43 executing program 3: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = getpgrp(r0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)=0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r1, {0xfc9d}}, './file0\x00'}) clone3(&(0x7f00000001c0)={0x200000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x3d}, &(0x7f0000000240)=""/32, 0x20, &(0x7f0000000100)=""/41, &(0x7f0000000180)=[r3], 0x1, {r4}}, 0x58) waitid(0x2, r2, 0x0, 0x8, 0x0) [ 776.344515] 9pnet: Insufficient options for proto=fd 19:17:43 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 19:17:43 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:17:43 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) [ 776.382908] 9pnet: Insufficient options for proto=fd 19:17:43 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400bf, 0x0) 19:17:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:17:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 776.525353] 9pnet: Insufficient options for proto=fd [ 788.832526] kmemleak: 39 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:18:04 executing program 7: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000000140)="db3c906d6b66732e666b7400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="94686f727429616dffff00000000000000"]) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000030c0)='mountinfo\x00') preadv(r0, &(0x7f0000002400)=[{&(0x7f0000000140)=""/203, 0xcb}], 0x1, 0x7ff, 0x0) 19:18:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:18:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:18:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400c0, 0x0) 19:18:04 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) waitid(0x2, 0x0, &(0x7f0000000000), 0x3, &(0x7f0000000080)) 19:18:04 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[{@nonumtail}, {@utf8no}, {@utf8no}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xf6\',-'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@audit}, {@obj_role={'obj_role', 0x3d, '/]/\x00'}}]}) 19:18:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:18:04 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) (fail_nth: 1) [ 796.535682] 9pnet: Insufficient options for proto=fd [ 796.566806] FAULT_INJECTION: forcing a failure. [ 796.566806] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 796.569213] CPU: 0 PID: 5963 Comm: syz-executor.5 Not tainted 5.10.153 #1 [ 796.570692] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 796.572412] Call Trace: [ 796.572983] dump_stack+0x107/0x167 [ 796.573735] should_fail.cold+0x5/0xa [ 796.574571] _copy_to_user+0x2e/0x180 [ 796.575380] simple_read_from_buffer+0xcc/0x160 [ 796.576360] proc_fail_nth_read+0x198/0x230 [ 796.577282] ? proc_sessionid_read+0x230/0x230 [ 796.578252] ? security_file_permission+0x24e/0x570 [ 796.579330] ? perf_trace_initcall_start+0x101/0x380 [ 796.580403] ? proc_sessionid_read+0x230/0x230 [ 796.581358] vfs_read+0x228/0x580 [ 796.582098] ksys_read+0x12d/0x260 [ 796.582874] ? __ia32_sys_pwrite64+0x230/0x230 [ 796.583837] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 796.584937] ? syscall_enter_from_user_mode+0x1d/0x50 [ 796.586021] do_syscall_64+0x33/0x40 [ 796.586818] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 796.587410] SELinux: duplicate or incompatible mount options [ 796.587890] RIP: 0033:0x7fd0e899269c [ 796.587939] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 796.587960] RSP: 002b:00007fd0e5f55170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 796.595510] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fd0e899269c [ 796.597004] RDX: 000000000000000f RSI: 00007fd0e5f551e0 RDI: 0000000000000003 [ 796.598504] RBP: 00007fd0e5f551d0 R08: 0000000000000000 R09: 0000000000000000 [ 796.600004] R10: 0000000000000008 R11: 0000000000000246 R12: 0000000000000001 [ 796.600472] FAT-fs (loop7): Unrecognized mount option "”hort)amÿÿ" or missing value [ 796.601508] R13: 00007ffd1b89912f R14: 00007fd0e5f55300 R15: 0000000000022000 19:18:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x3, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 796.652169] FAT-fs (loop7): Unrecognized mount option "”hort)amÿÿ" or missing value 19:18:04 executing program 3: r0 = getpgrp(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) pidfd_open(r1, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:18:04 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[{@nonumtail}, {@utf8no}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xf6\',-'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@audit}, {@obj_role={'obj_role', 0x3d, '/]/\x00'}}]}) 19:18:04 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400c1, 0x0) 19:18:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:18:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:18:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x4, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 796.759150] SELinux: duplicate or incompatible mount options [ 796.781744] 9pnet: Insufficient options for proto=fd 19:18:04 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x11170}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r1, r0) write$binfmt_aout(r1, &(0x7f0000000240)={{0xcc, 0x4, 0x3, 0x19c, 0x323, 0x7fffffff, 0x19d, 0x401}, "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", ['\x00', '\x00']}, 0x1220) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r3, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) setsockopt$inet6_tcp_int(r3, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @private0}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r3, r2, 0x0, 0x9bbb) 19:18:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:18:04 executing program 3: waitid(0x2, 0x0, 0x0, 0x8, 0x0) 19:18:04 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[{@nonumtail}], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xf6\',-'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@audit}, {@obj_role={'obj_role', 0x3d, '/]/\x00'}}]}) [ 796.898714] SELinux: duplicate or incompatible mount options [ 811.307176] kmemleak: 29 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:18:26 executing program 0: clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:18:26 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:18:26 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r0, &(0x7f0000000040)={0x1f, @fixed}, 0x8) listen(r0, 0x0) 19:18:26 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) tgkill(r1, r2, 0x27) 19:18:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x5, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:18:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:18:26 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xf6\',-'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@audit}, {@obj_role={'obj_role', 0x3d, '/]/\x00'}}]}) 19:18:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400c2, 0x0) 19:18:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:18:26 executing program 0: clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:18:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x6, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 818.974684] SELinux: duplicate or incompatible mount options 19:18:26 executing program 5: r0 = getpgrp(0x0) waitid(0x3, r0, 0x0, 0x8, 0x0) 19:18:26 executing program 3: bind(0xffffffffffffffff, &(0x7f0000000000)=@can, 0x80) r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = gettid() ptrace$setsig(0x4203, r1, 0x72, &(0x7f0000000080)={0x41, 0x5, 0x7}) 19:18:26 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xf6\',-'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@audit}]}) 19:18:26 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400c3, 0x0) 19:18:26 executing program 7: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000040)={0x1c, 0x2, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_ZONE={0x6}]}, 0x1c}}, 0x40) 19:18:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:18:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x7, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 819.133824] SELinux: duplicate or incompatible mount options 19:18:26 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x2, 0x0) waitid(0x2, r0, &(0x7f00000000c0), 0x8, &(0x7f0000000140)) waitid(0x2, r0, 0x0, 0x2, &(0x7f0000000000)) [ 832.150729] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:18:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, 0x0) 19:18:47 executing program 0: clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) [ 839.747675] SELinux: duplicate or incompatible mount options 19:18:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x8, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:18:47 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xf6\',-'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 19:18:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400c4, 0x0) 19:18:47 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet(r0, &(0x7f00000017c0)={0x2, 0x0, @empty}, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="14000000000000000000000807000000c40900000000200000001fe1ffffffffffff6ef80625aa530000", @ANYRES32=r2], 0x38}}], 0x1, 0x0) r3 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f0000000180)=""/17) ioctl$sock_SIOCDELDLCI(r3, 0x8981, &(0x7f0000000000)={'veth1_to_team\x00', 0x7}) sendto$inet(r0, &(0x7f0000000040)="f705b63fdf985b7c1b19ba771f11635828eda17f14d22eca4d4a0df922010849c05a030f380674cfae18452ad793a22577531dd2c079d7c5f124638bdb9b3781892ce889fc8b05b9", 0x48, 0x8000, 0x0, 0x0) 19:18:47 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x0, 0x8, 0x40, 0x40, 0x0, 0x6, 0x84400, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0xff6f, 0x1, @perf_bp={&(0x7f0000000000), 0x2}, 0x85a43ad49aa3a926, 0x7, 0x3, 0x3, 0x9, 0x6, 0xfffa, 0x0, 0xd575, 0x0, 0xb0}, r1, 0x9, 0xffffffffffffffff, 0x1) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) pidfd_open(r2, 0x0) waitid(0x2, r0, 0x0, 0x1, 0x0) 19:18:47 executing program 3: syz_genetlink_get_family_id$l2tp(&(0x7f0000000000), 0xffffffffffffffff) r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:18:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, 0x0) 19:18:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x9, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 852.133951] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:19:07 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, 0x0) 19:19:07 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)) r0 = getpgrp(0x0) pidfd_open(r0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) getpgrp(r1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) waitid(0x2, r2, 0x0, 0x1, 0x0) 19:19:07 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xf6\',-'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:19:07 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000000)=0x0) waitid(0xe348f2785176fdc6, r1, 0x0, 0x0, &(0x7f0000000040)) 19:19:07 executing program 7: r0 = gettid() perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x70800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x7fffffff}, r0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) fcntl$getownex(r2, 0x10, &(0x7f0000000440)={0x0, 0x0}) process_vm_readv(r3, &(0x7f0000000300)=[{&(0x7f0000000480)=""/41, 0x29}, {&(0x7f0000000040)=""/5, 0x5}, {&(0x7f0000000080)=""/75, 0x4b}, {&(0x7f0000000100)=""/234, 0xea}, {&(0x7f00000007c0)=""/222, 0xde}, {&(0x7f0000001e00)=""/4096, 0x1000}], 0x6, &(0x7f0000000740)=[{&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000000200)=""/238, 0xee}, {&(0x7f0000002e00)=""/4096, 0x1000}, {&(0x7f0000000540)=""/81, 0x51}, {&(0x7f0000004e00)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/49, 0x31}, {&(0x7f0000000600)=""/251, 0xfb}, {&(0x7f0000000700)=""/45, 0x2d}], 0x8, 0x0) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) bind$bt_l2cap(r4, &(0x7f0000001080)={0x1f, 0x3, @fixed}, 0xe) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 19:19:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400c5, 0x0) 19:19:07 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:19:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xa, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 860.363583] SELinux: duplicate or incompatible mount options 19:19:07 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:19:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xb, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:19:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}}) 19:19:08 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xf6\',-'}}]}) 19:19:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) ioctl$BTRFS_IOC_BALANCE(r0, 0x5000940c, 0x0) ioctl$F2FS_IOC_GET_FEATURES(r0, 0x8004f50c, &(0x7f00000007c0)) r1 = getpgrp(0x0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) process_vm_writev(r2, &(0x7f0000000500)=[{&(0x7f0000000000)=""/153, 0x99}, {&(0x7f00000000c0)=""/225, 0xe1}, {&(0x7f00000001c0)=""/60, 0x3c}, {&(0x7f0000000200)=""/184, 0xb8}, {&(0x7f00000002c0)=""/183, 0xb7}, {&(0x7f0000000380)=""/128, 0x80}, {&(0x7f0000000400)=""/249, 0xf9}], 0x7, &(0x7f0000000780)=[{&(0x7f0000000580)=""/41, 0x29}, {&(0x7f00000005c0)=""/17, 0x11}, {&(0x7f0000000600)=""/242, 0xf2}, {&(0x7f0000000700)=""/126, 0x7e}], 0x4, 0x0) waitid(0x2, r1, 0x0, 0x8, 0x0) 19:19:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400c6, 0x0) 19:19:08 executing program 7: clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:19:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) r1 = openat(r0, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r1, 0x330b) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) r3 = getpgrp(r2) waitid(0x2, r3, 0x0, 0x8, 0x0) 19:19:08 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) [ 860.555951] 9pnet: Insufficient options for proto=fd 19:19:08 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x2, 0x0, 0x10000, 0x1}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000540)='./file0\x00', 0x80) pwrite64(r2, &(0x7f00000000c0), 0x17, 0x10001) openat$tun(0xffffffffffffff9c, &(0x7f00000190c0), 0x0, 0x0) eventfd2(0x9, 0x80001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x3, 0xe3ff, 0x8000) 19:19:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}}) 19:19:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x10, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 860.677213] 9pnet: Insufficient options for proto=fd [ 875.296668] kmemleak: 23 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:19:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400c7, 0x0) 19:19:31 executing program 3: ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000000)=0xf5) r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:19:31 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x46e2, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x2, 0x0, 0x10000, 0x1}) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000540)='./file0\x00', 0x80) pwrite64(r2, &(0x7f00000000c0), 0x17, 0x10001) openat$tun(0xffffffffffffff9c, &(0x7f00000190c0), 0x0, 0x0) eventfd2(0x9, 0x80001) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fallocate(r1, 0x3, 0xe3ff, 0x8000) 19:19:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x300, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:19:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:19:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}}) 19:19:31 executing program 5: r0 = getpgrp(0x0) pidfd_open(r0, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = getpgrp(r0) waitid(0x2, r2, 0x0, 0x8, 0x0) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) ptrace$getregset(0x4204, r3, 0x3, &(0x7f0000001000)={&(0x7f0000000000)=""/4096, 0x1000}) 19:19:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xf6\',-'}}]}) 19:19:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) [ 883.978269] 9pnet: Insufficient options for proto=fd 19:19:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x500, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:19:31 executing program 3: r0 = getpgrp(0x0) syz_open_procfs(r0, &(0x7f0000000000)='oom_score\x00') waitid(0x2, r0, 0x0, 0x8, 0x0) 19:19:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@smackfsdef={'smackfsdef', 0x3d, '\xf6\',-'}}]}) 19:19:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:19:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400c8, 0x0) 19:19:31 executing program 5: r0 = getpgrp(0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000dc0)=[{{&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000280)=[{&(0x7f0000000080)=""/25, 0x19}, {&(0x7f00000000c0)=""/244, 0xf4}, {&(0x7f00000001c0)=""/157, 0x9d}], 0x3, &(0x7f00000002c0)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000300)=""/140, 0x8c}, {&(0x7f00000003c0)=""/156, 0x9c}, {&(0x7f0000000480)=""/71, 0x47}], 0x3, &(0x7f0000000540)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x130}}, {{&(0x7f0000000680), 0x6e, &(0x7f0000000c40)=[{&(0x7f0000000700)=""/187, 0xbb}, {&(0x7f00000007c0)=""/225, 0xe1}, {&(0x7f00000008c0)=""/54, 0x36}, {&(0x7f0000000900)=""/164, 0xa4}, {&(0x7f00000009c0)=""/175, 0xaf}, {&(0x7f0000000a80)=""/232, 0xe8}, {&(0x7f0000000b80)=""/144, 0x90}], 0x7, &(0x7f0000000cc0)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="34000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000020000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="28000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000100000002000000000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xd8}}], 0x3, 0x0, &(0x7f0000000e80)) rt_tgsigqueueinfo(r0, r1, 0x17, &(0x7f0000000ec0)={0x2e, 0x101, 0xebd}) waitid(0x1, r0, 0x0, 0x8, 0x0) [ 884.139149] 9pnet: Insufficient options for proto=fd [ 898.131052] kmemleak: 27 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:19:54 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xa) unshare(0x48020200) 19:19:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400c9, 0x0) 19:19:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:19:54 executing program 3: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000040)=0x5) r1 = getpgrp(r0) waitid(0x2, r1, 0x0, 0x8, 0x0) 19:19:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:19:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x600, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:19:54 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:19:54 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = syz_open_dev$vcsn(&(0x7f0000000000), 0x800, 0x10803) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) sendmsg$nl_generic(r1, &(0x7f00000003c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f00000000c0)={0x288, 0x22, 0x4, 0x70bd2c, 0x25dfdbfc, {0x1f}, [@typed={0x8, 0x3e, 0x0, 0x0, @ipv4=@multicast2}, @typed={0x8, 0x52, 0x0, 0x0, @fd=r2}, @typed={0xc, 0x88, 0x0, 0x0, @u64=0x89d}, @generic="d6bac3e5ffbb363707f0af60b78d7047db81ac0a98b46317daa0eaf438195d6fde96aad45d5a726df6e5d0e9dcc3ecbdef43307430569d80b4d7cced746afb296420a8fd99434b6285e401491490bc", @nested={0x13d, 0x79, 0x0, 0x1, [@typed={0x14, 0x54, 0x0, 0x0, @ipv6=@private2}, @generic="b97b5e704f0e389a2e8f95df6e395c410cb12dd173e9c129", @generic="d5680517f658531f6da3c6098d3a1b7e6a38b6e6d0a2e9fb2192cca6ec10c7edc2355f61425dcb4f8870b97a6fd316781b882faed5407a01c67bfa77b586e8f09589d1e7610db0aa0200618f64209f39d19d031969c67a89466aa50166ae5ec6566cce922679511064cb74f9e11028a0c4a97b60708a28cc37171a9884fa2c73533dcbca9ea7dd6236cc588d394731ebf1b2f5b5b22e4aa06199925340421c6ce0476bba0b93decf21e9c3d84b596cc2abc7b311cae6934b76d6845cc76133483b31cfb48487e858dfda9b0e5647cd99b7637ceaf748561069cceeeba21f4f4878d9b8fbd4", @typed={0x28, 0x10, 0x0, 0x0, @binary="362af1ade3215ca3b4852cc03ea53b44c6112202949ddcf6fa42866a571d4983b4a69658"}]}, @generic="b53fa6", @generic="d2181f5df5e3a1ccf83971e3ded03c0d7793626fac69d4129d650b98ae8197bf6ca9917d91db75a3b42ea9be7124168c0a4d3de320b5200c3e8abde4f049e057112604d681c738f089ac403e1b569cf63c62bc9511f3396929e9a58e50fca512fdba44f4f42ab04119675dec6159b8f1f23a31f73ce60f2762a60bc448eb93a71dfa7a720d375c2591581de6f5c11f316b0bec1d15ac70a2c72127cf33918237ad2ec814b91c18d5fc26dbd07dd52679035a42ac3ede95d2465d377cf96ef0ec31d2ca031b"]}, 0x288}, 0x1, 0x0, 0x0, 0x9800}, 0x4000000) 19:19:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) [ 907.112648] SELinux: duplicate or incompatible mount options 19:19:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x6d5, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 907.123108] 9pnet: Insufficient options for proto=fd 19:19:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400ca, 0x0) 19:19:54 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:19:54 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) pidfd_open(r1, 0x0) fork() waitid(0x2, r0, 0x0, 0x8, 0x0) [ 907.244705] 9pnet: Insufficient options for proto=fd 19:19:54 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) pidfd_open(r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000280)=""/65, 0x41}, {&(0x7f0000000300)=""/235, 0xeb}, {&(0x7f0000000400)=""/221, 0xdd}, {&(0x7f0000000500)=""/30, 0x1e}], 0x4, &(0x7f0000000580)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0xe8}, 0x10000) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) r3 = getpid() clone3(&(0x7f0000000700)={0xa00000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x2a}, &(0x7f00000000c0)=""/112, 0x70, &(0x7f0000000140)=""/152, &(0x7f00000006c0)=[r0, r1, r0, r2, r3, r0, r0], 0x7}, 0x58) pidfd_open(r0, 0x0) 19:19:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:19:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400cb, 0x0) [ 907.367997] 9pnet: Insufficient options for proto=fd [ 920.644300] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:20:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x700, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:20:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:20:17 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:20:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 1) 19:20:17 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) rt_sigtimedwait(&(0x7f0000000100)={[0x9]}, &(0x7f0000000040), &(0x7f00000000c0)={0x77359400}, 0x8) 19:20:17 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PIO_UNIMAP(0xffffffffffffffff, 0x4b67, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xa) unshare(0x48020200) [ 930.372589] 9pnet: Insufficient options for proto=fd 19:20:17 executing program 3: r0 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f00000000c0)={'ip6tnl0\x00', &(0x7f0000000040)={'ip6gre0\x00', 0x0, 0x4, 0x5, 0x8, 0xfffffc04, 0x48, @ipv4={'\x00', '\xff\xff', @loopback}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x8, 0x20, 0x4, 0x7}}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000006a00274e00000000640a00000000000043f1508713ba2c25872283c333ce34fafb35a9e98aeb6f949e41859fa7da9cc926b171eae1fdf4e482fcce9ec2e4bf96e30b76161c4b69bd2fb5df8c18c4a82cea686c2ba3b2ba91d13509ee40f0a29e684f0cd83edc9e65ffc4609f1d2af26c11994c8a284752dbde12e7c4047cee6de3978178380243ff096e582be133e327a9dc6c13553d25742c5687a687de2b3de737f5e7c1ccf4e50a35c4218cce0f6be153e55c9fa59bb516dbaab678407c9f38a1d949b6282836c1b051f94a98f97561a6dfe110da734c62478d3607ba11e74ee71c000000"], 0x14}}, 0x0) r4 = dup2(r3, r2) fsetxattr$security_capability(r2, &(0x7f0000000000), &(0x7f0000000180)=@v3={0x3000000, [{0x9, 0x9}, {0xfffffff8, 0x15f3}]}, 0x18, 0x1) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@private0, r6}, 0x14) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r7, 0x29, 0x1b, &(0x7f0000000100)={@private0, r9}, 0x14) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r4, 0x89fb, &(0x7f0000000c40)={'syztnl1\x00', &(0x7f0000000bc0)={'ip6gre0\x00', r1, 0x6, 0x2, 0x4, 0x4, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, @remote, 0x40, 0x0, 0x200, 0x72b4}}) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000001200)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000011c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="ec040000", @ANYRES16=0x0, @ANYBLOB="100029bd7000fbdbdf250100000008000100", @ANYRES32=r1, @ANYBLOB="f80002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="3c00010024000100757365725f6c696e6b757000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b000000080004002d8a0000080007000000000008000100", @ANYRES32=r1, @ANYBLOB="b400028038000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000100000040000100240001007072696f726974790000000000000000000000000000050003000e0000000800040001f0ffff08000600", @ANYRES32=0x0, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r1, @ANYBLOB="3401028040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000080000008000600", @ANYRES32=0x0, @ANYBLOB="3c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r1, @ANYBLOB="3c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006d6f64650000000000000000000000000000000000000000000000000000000005000300050000000f000400726f756e64726f62696e000038000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400ff03000008000100", @ANYRES32=r6, @ANYBLOB="0400028008000100", @ANYRES32=r1, @ANYBLOB="cc01028040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=r1, @ANYBLOB="080007000000000038000100240001006e6f746966795f70656572735f696e74657276616c00000000000000000000000500030003000000080004000300000038000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400000010003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r9, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c00000000000000050003000300000008000400080000003800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=r10, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004008400000038000100240001006e6f746966795f70656572735f636f756e74000000000000000000000000000005000300030000000800040007000000"], 0x4ec}, 0x1, 0x0, 0x0, 0x4008000}, 0x4001) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f0000000280)={'ip6gre0\x00', r1, 0x2f, 0xed, 0x9, 0x2, 0x40, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010102}, @loopback, 0x1, 0x24, 0x4, 0x2}}) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000100)={0x14, 0x0, 0x8, 0x70bd29, 0x25dfdbfb}, 0x14}, 0x1, 0x0, 0x0, 0x4040851}, 0x40) r11 = getpgrp(0x0) waitid(0x2, r11, 0x0, 0x8, 0x0) 19:20:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400cc, 0x0) [ 930.399554] FAULT_INJECTION: forcing a failure. [ 930.399554] name failslab, interval 1, probability 0, space 0, times 0 [ 930.401919] CPU: 1 PID: 6316 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 930.403312] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 930.405002] Call Trace: [ 930.405546] dump_stack+0x107/0x167 [ 930.406298] should_fail.cold+0x5/0xa [ 930.407090] should_failslab+0x5/0x20 [ 930.407878] __kmalloc_track_caller+0x79/0x3c0 [ 930.408842] ? strndup_user+0x74/0xe0 [ 930.409637] memdup_user+0x22/0xd0 [ 930.410373] strndup_user+0x74/0xe0 [ 930.411126] __x64_sys_mount+0x133/0x300 [ 930.411959] ? path_mount+0x20b0/0x20b0 [ 930.412786] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 930.413857] ? syscall_enter_from_user_mode+0x1d/0x50 [ 930.414917] do_syscall_64+0x33/0x40 [ 930.415682] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 930.416744] RIP: 0033:0x7f62cddd1b19 [ 930.417504] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 930.421276] RSP: 002b:00007f62cb347188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 930.422828] RAX: ffffffffffffffda RBX: 00007f62cdee4f60 RCX: 00007f62cddd1b19 [ 930.424285] RDX: 00000000200001c0 RSI: 00000000200000c0 RDI: 0000000000000000 [ 930.425745] RBP: 00007f62cb3471d0 R08: 00000000200002c0 R09: 0000000000000000 [ 930.427200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 930.428679] R13: 00007ffc3b138f3f R14: 00007f62cb347300 R15: 0000000000022000 19:20:18 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:20:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:20:18 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400cd, 0x0) [ 930.541981] 9pnet: Insufficient options for proto=fd 19:20:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x900, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:20:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xa00, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 943.811450] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:20:38 executing program 5: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) close_range(r0, 0xffffffffffffffff, 0x2) r1 = getpgrp(0x0) waitid(0x2, r1, 0x0, 0x8, 0x0) 19:20:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:20:38 executing program 3: getpgrp(0x0) r0 = getpgrp(0x0) pidfd_open(r0, 0x0) waitid(0x2, r0, 0x0, 0x2, 0x0) 19:20:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400ce, 0x0) 19:20:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) (fail_nth: 2) 19:20:38 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) pidfd_open(r1, 0x0) fork() waitid(0x2, r0, 0x0, 0x8, 0x0) 19:20:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xb00, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:20:38 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 1) [ 951.021674] FAULT_INJECTION: forcing a failure. [ 951.021674] name failslab, interval 1, probability 0, space 0, times 0 [ 951.024545] CPU: 1 PID: 6375 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 951.026269] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 951.028383] Call Trace: [ 951.029063] dump_stack+0x107/0x167 [ 951.029993] should_fail.cold+0x5/0xa [ 951.030969] ? getname_flags.part.0+0x50/0x4f0 [ 951.032127] should_failslab+0x5/0x20 [ 951.033104] kmem_cache_alloc+0x5b/0x360 [ 951.034148] getname_flags.part.0+0x50/0x4f0 [ 951.034446] FAULT_INJECTION: forcing a failure. [ 951.034446] name failslab, interval 1, probability 0, space 0, times 0 [ 951.035259] ? wait_for_completion+0x270/0x270 [ 951.035302] getname_flags+0x9a/0xe0 [ 951.039665] do_mkdirat+0x8d/0x2a0 [ 951.040610] ? user_path_create+0xf0/0xf0 [ 951.041677] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 951.043014] ? syscall_enter_from_user_mode+0x1d/0x50 [ 951.044321] do_syscall_64+0x33/0x40 [ 951.045107] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 951.046140] RIP: 0033:0x7f59f7910c27 [ 951.046888] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 951.050597] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 951.052132] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 951.053576] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 951.055005] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 951.056442] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 951.057878] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 951.059495] CPU: 0 PID: 6373 Comm: syz-executor.4 Not tainted 5.10.153 #1 [ 951.060937] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 951.062639] Call Trace: [ 951.063186] dump_stack+0x107/0x167 [ 951.063939] should_fail.cold+0x5/0xa [ 951.064731] ? create_object.isra.0+0x3a/0xa20 [ 951.065672] should_failslab+0x5/0x20 [ 951.066477] kmem_cache_alloc+0x5b/0x360 [ 951.067319] create_object.isra.0+0x3a/0xa20 [ 951.068222] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 951.069278] __kmalloc_track_caller+0x177/0x3c0 [ 951.070234] ? strndup_user+0x74/0xe0 [ 951.071023] memdup_user+0x22/0xd0 [ 951.071755] strndup_user+0x74/0xe0 [ 951.072539] __x64_sys_mount+0x133/0x300 [ 951.073535] ? path_mount+0x20b0/0x20b0 [ 951.074362] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 951.075450] ? syscall_enter_from_user_mode+0x1d/0x50 [ 951.076524] do_syscall_64+0x33/0x40 [ 951.077303] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 951.078356] RIP: 0033:0x7f62cddd1b19 [ 951.079122] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 951.082900] RSP: 002b:00007f62cb347188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 951.084479] RAX: ffffffffffffffda RBX: 00007f62cdee4f60 RCX: 00007f62cddd1b19 [ 951.085942] RDX: 00000000200001c0 RSI: 00000000200000c0 RDI: 0000000000000000 [ 951.087406] RBP: 00007f62cb3471d0 R08: 00000000200002c0 R09: 0000000000000000 [ 951.088880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 951.090346] R13: 00007ffc3b138f3f R14: 00007f62cb347300 R15: 0000000000022000 [ 951.094507] 9pnet: Insufficient options for proto=fd 19:20:38 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000006a00274e000000000000000000180000"], 0x14}}, 0x0) dup2(r1, r0) sendmsg$IPCTNL_MSG_CT_GET_UNCONFIRMED(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x7, 0x1, 0x201, 0x0, 0x0, {0x2, 0x0, 0x6}, ["", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xa08e5e15239f3ffe}, 0x4800) r2 = getpgrp(0x0) waitid(0x2, r2, 0x0, 0x8, 0x0) [ 951.155929] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=263 sclass=netlink_route_socket pid=6386 comm=syz-executor.5 19:20:38 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 2) 19:20:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x1020, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:20:38 executing program 3: r0 = getpgrp(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000180)=""/17) r2 = gettid() ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xb8d, 0x1, 0x2, 0x80, 0x0, r2}) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100), r1) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x24, r3, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x44}, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:20:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400cf, 0x0) [ 951.223738] FAULT_INJECTION: forcing a failure. [ 951.223738] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 951.226241] CPU: 0 PID: 6390 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 951.227636] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 951.229366] Call Trace: [ 951.229908] dump_stack+0x107/0x167 [ 951.230664] should_fail.cold+0x5/0xa [ 951.231462] __alloc_pages_nodemask+0x182/0x680 [ 951.232459] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 951.233937] ? kmem_cache_alloc+0x343/0x360 [ 951.234991] alloc_pages_current+0x187/0x280 [ 951.236075] allocate_slab+0x26f/0x380 [ 951.237052] ___slab_alloc+0x470/0x700 [ 951.238015] ? getname_flags.part.0+0x50/0x4f0 [ 951.239131] ? ksys_write+0x21a/0x260 [ 951.240065] ? lock_downgrade+0x6d0/0x6d0 [ 951.241093] ? getname_flags.part.0+0x50/0x4f0 [ 951.242215] ? kmem_cache_alloc+0x343/0x360 [ 951.243264] ? getname_flags.part.0+0x50/0x4f0 [ 951.244405] kmem_cache_alloc+0x343/0x360 [ 951.245349] getname_flags.part.0+0x50/0x4f0 [ 951.246301] ? wait_for_completion+0x270/0x270 [ 951.247298] getname_flags+0x9a/0xe0 [ 951.248115] do_mkdirat+0x8d/0x2a0 [ 951.248903] ? user_path_create+0xf0/0xf0 [ 951.249812] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 951.250948] ? syscall_enter_from_user_mode+0x1d/0x50 [ 951.252069] do_syscall_64+0x33/0x40 [ 951.252890] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 951.254000] RIP: 0033:0x7f59f7910c27 [ 951.254813] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 951.258818] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 951.258839] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 19:20:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:20:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 951.258849] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 19:20:38 executing program 5: r0 = getpgrp(0x0) wait4(r0, &(0x7f0000000000), 0x40000000, &(0x7f0000000040)) waitid(0x2, r0, 0x0, 0x8, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000002200)=[{{&(0x7f0000000100)=@abs, 0x6e, &(0x7f00000001c0)=[{&(0x7f0000001840)=""/65, 0x41}], 0x1}}, {{&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000001740)=[{&(0x7f0000000280)=""/205, 0xcd}, {&(0x7f0000000380)=""/93, 0x5d}, {&(0x7f0000000400)=""/196, 0xc4}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/81, 0x51}, {&(0x7f0000001580)=""/126, 0x7e}, {&(0x7f0000001600)=""/69, 0x45}, {&(0x7f0000001680)=""/133, 0x85}], 0x8}}, {{&(0x7f00000017c0)=@abs, 0x6e, &(0x7f0000001a40), 0x0, &(0x7f0000001a80)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}}, {{&(0x7f0000001b00), 0x6e, &(0x7f0000002140)=[{&(0x7f0000001b80)=""/45, 0x2d}, {&(0x7f0000001bc0)=""/253, 0xfd}, {&(0x7f0000001cc0)=""/60, 0x3c}, {&(0x7f0000001d00)=""/45, 0x2d}, {&(0x7f0000001d40)=""/151, 0x97}, {&(0x7f0000001e00)=""/80, 0x50}, {&(0x7f00000018c0)=""/224, 0xe0}, {&(0x7f0000001f80)=""/238, 0xee}, {&(0x7f0000002080)=""/49, 0x31}, {&(0x7f00000020c0)=""/110, 0x6e}], 0xa}}], 0x4, 0x40000023, &(0x7f0000000180)={0x0, 0x989680}) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000002580)=0x0) r5 = getpgrp(0x0) pidfd_open(r5, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f00000026c0)={0x6, 0x1000, 0x7, 0x44c, 0xe8d}) r6 = open_tree(0xffffffffffffffff, &(0x7f0000002600)='./file0\x00', 0x88100) clone3(&(0x7f0000002640)={0x20011000, &(0x7f00000023c0), &(0x7f0000002400), &(0x7f0000002440), {0x15}, &(0x7f0000002480)=""/111, 0x6f, &(0x7f0000002500)=""/125, &(0x7f00000025c0)=[r4, r5, 0xffffffffffffffff], 0x3, {r6}}, 0x58) ptrace$setsig(0x4203, r1, 0x1, &(0x7f0000002340)={0x22, 0x9, 0xf9c}) [ 951.258860] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 951.258871] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 951.258885] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 951.311069] SELinux: duplicate or incompatible mount options [ 951.344054] 9pnet: Insufficient options for proto=fd 19:20:38 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 3) [ 951.418089] FAULT_INJECTION: forcing a failure. [ 951.418089] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 951.420706] CPU: 0 PID: 6414 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 951.422115] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 951.423820] Call Trace: [ 951.424377] dump_stack+0x107/0x167 [ 951.425132] should_fail.cold+0x5/0xa [ 951.425926] strncpy_from_user+0x34/0x470 [ 951.426789] getname_flags.part.0+0x95/0x4f0 [ 951.427692] ? wait_for_completion+0x270/0x270 [ 951.428658] getname_flags+0x9a/0xe0 [ 951.429431] do_mkdirat+0x8d/0x2a0 [ 951.430169] ? user_path_create+0xf0/0xf0 [ 951.431025] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 951.432102] ? syscall_enter_from_user_mode+0x1d/0x50 [ 951.433171] do_syscall_64+0x33/0x40 [ 951.433937] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 951.434988] RIP: 0033:0x7f59f7910c27 [ 951.435751] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 951.439534] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 951.441106] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 951.442569] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 951.444034] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 951.445516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 951.446982] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 965.724548] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:21:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:21:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400d0, 0x0) 19:21:01 executing program 7: socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x1810c1, 0x0) writev(r0, &(0x7f00000000c0)=[{&(0x7f0000000200)="af", 0x1}], 0x1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x3, 0x0) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f0000000140), 0x4) pwrite64(0xffffffffffffffff, &(0x7f0000000240)="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", 0x1000, 0x0) fallocate(r2, 0x0, 0x0, 0x8000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) ioctl$FS_IOC_RESVSP(r4, 0x40305828, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x4000006}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0xff, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x8}, 0x20, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x2}) 19:21:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:21:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2010, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:21:01 executing program 3: getpgrp(0x0) pidfd_open(0x0, 0x0) waitid(0x2, 0x0, 0x0, 0x8, 0x0) 19:21:01 executing program 5: r0 = getpgrp(0x0) pidfd_open(r0, 0x0) clone3(&(0x7f00000002c0)={0x40000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x1a}, &(0x7f00000000c0)=""/195, 0xc3, &(0x7f00000001c0)=""/188, &(0x7f0000000280)=[0x0, r0, r0, r0, r0, r0, r0], 0x7}, 0x58) r1 = getpid() r2 = getpgrp(r1) waitid(0x2, r2, 0x0, 0x8, 0x0) 19:21:01 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 4) [ 973.504630] FAULT_INJECTION: forcing a failure. [ 973.504630] name failslab, interval 1, probability 0, space 0, times 0 [ 973.507408] CPU: 0 PID: 6421 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 973.508856] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 973.510578] Call Trace: [ 973.511135] dump_stack+0x107/0x167 [ 973.511897] should_fail.cold+0x5/0xa [ 973.512703] ? __d_alloc+0x2a/0x990 [ 973.513463] should_failslab+0x5/0x20 [ 973.514254] kmem_cache_alloc+0x5b/0x360 [ 973.515095] ? __d_lookup+0x3e8/0x710 [ 973.515895] __d_alloc+0x2a/0x990 [ 973.516649] d_alloc+0x46/0x1c0 [ 973.517348] __lookup_hash+0xcc/0x190 [ 973.518153] filename_create+0x186/0x4a0 [ 973.519009] ? filename_parentat+0x560/0x560 [ 973.519938] ? getname_flags.part.0+0x1dd/0x4f0 [ 973.520964] do_mkdirat+0xa0/0x2a0 [ 973.521712] ? user_path_create+0xf0/0xf0 [ 973.522577] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 973.523668] ? syscall_enter_from_user_mode+0x1d/0x50 [ 973.524763] do_syscall_64+0x33/0x40 [ 973.525539] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 973.526623] RIP: 0033:0x7f59f7910c27 [ 973.527403] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 973.531276] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 973.533013] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 973.534607] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 973.536092] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 973.537588] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 973.539072] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:21:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xd506, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:21:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400d1, 0x0) 19:21:01 executing program 3: r0 = getpgrp(0x0) waitid(0x0, r0, 0x0, 0x0, 0x0) [ 973.626895] 9pnet: Insufficient options for proto=fd 19:21:01 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 5) 19:21:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400d2, 0x0) 19:21:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:21:01 executing program 7: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) [ 973.724587] FAULT_INJECTION: forcing a failure. [ 973.724587] name failslab, interval 1, probability 0, space 0, times 0 [ 973.726948] CPU: 1 PID: 6453 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 973.728319] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 973.729998] Call Trace: [ 973.730541] dump_stack+0x107/0x167 [ 973.731282] should_fail.cold+0x5/0xa [ 973.732061] ? create_object.isra.0+0x3a/0xa20 [ 973.733013] should_failslab+0x5/0x20 [ 973.733789] kmem_cache_alloc+0x5b/0x360 [ 973.734619] create_object.isra.0+0x3a/0xa20 [ 973.735509] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 973.736542] kmem_cache_alloc+0x159/0x360 [ 973.737387] ? __d_lookup+0x3e8/0x710 [ 973.738164] __d_alloc+0x2a/0x990 [ 973.738877] d_alloc+0x46/0x1c0 [ 973.739553] __lookup_hash+0xcc/0x190 [ 973.740332] filename_create+0x186/0x4a0 [ 973.741168] ? filename_parentat+0x560/0x560 [ 973.742062] ? getname_flags.part.0+0x1dd/0x4f0 [ 973.743019] do_mkdirat+0xa0/0x2a0 [ 973.743745] ? user_path_create+0xf0/0xf0 [ 973.744590] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 973.745667] ? syscall_enter_from_user_mode+0x1d/0x50 [ 973.746712] do_syscall_64+0x33/0x40 [ 973.747466] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 973.748500] RIP: 0033:0x7f59f7910c27 [ 973.749260] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 973.752967] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 973.754503] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 973.755942] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 973.757397] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 973.758835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 973.760271] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:21:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xedc0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 973.915855] 9pnet: Insufficient options for proto=fd [ 973.927890] SELinux: duplicate or incompatible mount options [ 989.904381] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:21:27 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 6) 19:21:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x2, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:21:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400d3, 0x0) [ 999.489616] FAULT_INJECTION: forcing a failure. [ 999.489616] name failslab, interval 1, probability 0, space 0, times 0 [ 999.492346] CPU: 0 PID: 6485 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 999.493912] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 999.495773] Call Trace: [ 999.496375] dump_stack+0x107/0x167 [ 999.497207] should_fail.cold+0x5/0xa [ 999.498066] ? ext4_alloc_inode+0x1a/0x640 [ 999.499013] should_failslab+0x5/0x20 [ 999.499866] kmem_cache_alloc+0x5b/0x360 19:21:27 executing program 3: r0 = getpgrp(0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) getpgrp(r1) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:21:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:21:27 executing program 5: r0 = getpgrp(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000180)=""/17) ioctl$AUTOFS_IOC_ASKUMOUNT(r1, 0x80049370, &(0x7f0000000000)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x5, 0x1, 0x2, 0x7, 0x0, 0x6, 0x182c, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0xd52, 0x2, @perf_config_ext={0x2bd5, 0xff}, 0x20, 0xcb0, 0x3, 0x6, 0xc925, 0x8fb1, 0xe5, 0x0, 0x2, 0x0, 0x2}, r0, 0x8010, r1, 0xa) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:21:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x80000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 999.500782] ? security_compute_validatetrans.part.0+0x900/0x900 [ 999.502314] ? ext4_init_journal_params+0x350/0x350 [ 999.503431] ext4_alloc_inode+0x1a/0x640 [ 999.504340] ? ext4_init_journal_params+0x350/0x350 [ 999.505476] alloc_inode+0x63/0x240 [ 999.506291] new_inode+0x23/0x250 [ 999.507081] __ext4_new_inode+0x32c/0x5400 [ 999.508018] ? avc_has_extended_perms+0xec0/0xec0 [ 999.509131] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 999.510218] ? dquot_initialize_needed+0x290/0x290 [ 999.511309] ? selinux_determine_inode_label+0x1ab/0x340 [ 999.512529] ext4_mkdir+0x32c/0xb10 [ 999.513366] ? ext4_rmdir+0xf70/0xf70 [ 999.514236] vfs_mkdir+0x41f/0x660 [ 999.515041] do_mkdirat+0x145/0x2a0 [ 999.515863] ? user_path_create+0xf0/0xf0 [ 999.516795] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 999.517966] ? syscall_enter_from_user_mode+0x1d/0x50 [ 999.519109] do_syscall_64+0x33/0x40 [ 999.519935] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 999.521073] RIP: 0033:0x7f59f7910c27 [ 999.521895] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 999.525937] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 999.527726] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 999.529364] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 999.530940] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 999.532510] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 999.534116] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:21:27 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) writev(r1, &(0x7f0000000440)=[{&(0x7f0000000080)="6211", 0x2}], 0x1) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f00000000c0)={0x0, 0x4, 0x280000000000, 0xa71d}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) 19:21:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x7, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:21:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xe0ffff, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:21:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400d4, 0x0) 19:21:27 executing program 7: r0 = socket$inet(0x2, 0x3, 0x1) r1 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[]) dup3(r0, r1, 0x0) r2 = dup(r1) connect$inet(r2, &(0x7f0000000100)={0x2, 0x0, @remote}, 0x10) syz_emit_ethernet(0x94, &(0x7f0000000140)={@random="cb3325fc1a65", @empty, @void, {@llc={0x4, {@llc={0x0, 0xff, 'a<', "332ba2c9a0520b07d8362c43ecb64e0053a3b0513a65c5793deddc708512375e591072741562f6d536054dc8562a062ad18ebc37a38e7b08caae71bea8ebb2b08401a87a4539b5e188b5411b6fb1a9801f4c43e57a6d81236ecca4929f3fba202f4251fdf6e09a1cd3e9c9be4be1cd9e4746212b3ec7cb1be12d42a8db993e4ae25d"}}}}}, 0x0) 19:21:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:21:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x8, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:21:27 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(r0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r2) waitid(0x2, r1, 0x0, 0x8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000240)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) r4 = getpgid(r1) clone3(&(0x7f0000000300)={0x200000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x2c}, &(0x7f00000000c0)=""/94, 0x5e, &(0x7f0000000140)=""/243, &(0x7f00000002c0)=[r1, r1, r0, r2, r3, r4, r1, r1], 0x8}, 0x58) 19:21:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400d5, 0x0) 19:21:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, &(0x7f00000002c0)) 19:21:27 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 7) 19:21:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x1000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 999.864008] FAULT_INJECTION: forcing a failure. [ 999.864008] name failslab, interval 1, probability 0, space 0, times 0 [ 999.866599] CPU: 1 PID: 6537 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 999.868031] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 999.869789] Call Trace: [ 999.870346] dump_stack+0x107/0x167 [ 999.871115] should_fail.cold+0x5/0xa [ 999.871923] ? create_object.isra.0+0x3a/0xa20 [ 999.872892] should_failslab+0x5/0x20 [ 999.873707] kmem_cache_alloc+0x5b/0x360 [ 999.874568] create_object.isra.0+0x3a/0xa20 [ 999.875484] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 999.876547] kmem_cache_alloc+0x159/0x360 [ 999.877436] ? ext4_init_journal_params+0x350/0x350 [ 999.878476] ext4_alloc_inode+0x1a/0x640 [ 999.879304] ? ext4_init_journal_params+0x350/0x350 [ 999.880337] alloc_inode+0x63/0x240 [ 999.881124] new_inode+0x23/0x250 [ 999.882004] __ext4_new_inode+0x32c/0x5400 [ 999.883111] ? avc_has_extended_perms+0xec0/0xec0 [ 999.884310] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 999.885586] ? dquot_initialize_needed+0x290/0x290 [ 999.886615] ? selinux_determine_inode_label+0x1ab/0x340 [ 999.887737] ext4_mkdir+0x32c/0xb10 [ 999.888493] ? ext4_rmdir+0xf70/0xf70 [ 999.889311] vfs_mkdir+0x41f/0x660 [ 999.890077] do_mkdirat+0x145/0x2a0 [ 999.890833] ? user_path_create+0xf0/0xf0 [ 999.891713] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 999.892833] ? syscall_enter_from_user_mode+0x1d/0x50 [ 999.893949] do_syscall_64+0x33/0x40 [ 999.894755] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 999.895825] RIP: 0033:0x7f59f7910c27 [ 999.896593] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 999.900416] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 999.902029] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 999.903516] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 999.905017] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 999.906503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 999.907981] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 999.965525] SELinux: duplicate or incompatible mount options [ 1013.092370] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:21:49 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 8) 19:21:49 executing program 7: r0 = getpgrp(0x0) r1 = getpgrp(r0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, r2) waitid(0x2, r1, 0x0, 0x8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000240)) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) r4 = getpgid(r1) clone3(&(0x7f0000000300)={0x200000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x2c}, &(0x7f00000000c0)=""/94, 0x5e, &(0x7f0000000140)=""/243, &(0x7f00000002c0)=[r1, r1, r0, r2, r3, r4, r1, r1], 0x8}, 0x58) 19:21:49 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) waitid(0x0, r1, &(0x7f0000000180), 0x80000000, &(0x7f0000000200)) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) wait4(r2, &(0x7f0000000080), 0x8, &(0x7f00000000c0)) 19:21:49 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) waitid(0x0, r1, &(0x7f0000001900), 0x1, &(0x7f0000001840)) r2 = getpgrp(0x0) waitid(0x0, r0, &(0x7f0000000240), 0x8, 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, &(0x7f0000000340)) r3 = pidfd_open(r2, 0x0) ptrace$peeksig(0x4209, r2, &(0x7f0000000100)={0x7fff, 0x0, 0x1}, &(0x7f00000001c0)=[{}]) r4 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000003, 0x0) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000180)=""/4) r5 = gettid() ptrace$setsig(0x4203, r5, 0xff, &(0x7f00000002c0)={0xc, 0x7ff, 0x40}) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000040)={'\x00', 0xffff, 0x4, 0xfffffffd, 0x2, 0x5}) r6 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00') r7 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r7, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r7, 0x330b) sendmsg$nl_generic(r6, &(0x7f0000001780)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000001740)={&(0x7f0000001980)=ANY=[@ANYBLOB="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", @ANYRESHEX=r3, @ANYBLOB="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", @ANYBLOB="c552d0aa4bc7314cfdb7ea123b1654ad7f0ad6ab232b6984baa59e7f2f6224e83bc67931bfd0e3f7c9ae07e9c88694b503ed1fa37f753b784f121816dd4bf4828dc12e1da702783b54cb29237eeea0ebcab35128187fb2160000000029ba85bbdb047c77b29a6aa25b2f887f7cddc4f28053c56334ebbfc7a2015306f4e0e45b5210b9fb", @ANYBLOB="7340fb0459b217d76099186983395d7f0e4027cff088174b0d53566038a2968a6b74ad21c8d59dd051c85fb90f280f4815708f567a2f8653f6a0dc6782f8621d0c0ac28c6a6bd95bbef9bdf7a1de6ce41f54c9471b13b260607761ea75a9cffdfcb75362f13bbed351b9014da6f09627367873d8882f7436a4d5e55b91498b48394c41a5ec5ea2839bbef5ff5ccaca3a7583b6"], 0x1200}, 0x1, 0x0, 0x0, 0x4}, 0x4040880) 19:21:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, &(0x7f00000002c0)) 19:21:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x9, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:21:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400d6, 0x0) 19:21:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:21:49 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x3000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1021.632608] FAULT_INJECTION: forcing a failure. [ 1021.632608] name failslab, interval 1, probability 0, space 0, times 0 [ 1021.635123] CPU: 1 PID: 6568 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1021.636526] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1021.638225] Call Trace: [ 1021.638773] dump_stack+0x107/0x167 [ 1021.639523] should_fail.cold+0x5/0xa [ 1021.640305] ? security_inode_alloc+0x34/0x160 [ 1021.641263] should_failslab+0x5/0x20 [ 1021.642043] kmem_cache_alloc+0x5b/0x360 [ 1021.642878] security_inode_alloc+0x34/0x160 [ 1021.643779] inode_init_always+0xa4e/0xd10 [ 1021.644640] alloc_inode+0x84/0x240 [ 1021.645388] new_inode+0x23/0x250 [ 1021.646106] __ext4_new_inode+0x32c/0x5400 [ 1021.646965] ? avc_has_extended_perms+0xec0/0xec0 [ 1021.647974] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1021.648967] ? dquot_initialize_needed+0x290/0x290 [ 1021.649973] ? selinux_determine_inode_label+0x1ab/0x340 [ 1021.651087] ext4_mkdir+0x32c/0xb10 [ 1021.651840] ? ext4_rmdir+0xf70/0xf70 [ 1021.652633] vfs_mkdir+0x41f/0x660 [ 1021.653379] do_mkdirat+0x145/0x2a0 [ 1021.654124] ? user_path_create+0xf0/0xf0 [ 1021.654973] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1021.656037] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1021.657087] do_syscall_64+0x33/0x40 [ 1021.657853] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1021.658892] RIP: 0033:0x7f59f7910c27 [ 1021.659657] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1021.663389] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1021.664946] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 1021.666399] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1021.667846] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 1021.669296] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1021.670739] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:21:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0xa, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:21:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', 0x0, 0x0, &(0x7f00000002c0)) 19:21:49 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400d7, 0x0) 19:21:49 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(r0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x0, 0x7f, 0xd7, 0x7fe}, {0x9, 0xfb, 0x80, 0xfffffff8}, {0x1, 0x3, 0x36, 0x46480000}, {0x5, 0x6, 0x6, 0x4}, {0xb, 0x2, 0x57, 0x5}, {0xfb, 0x80, 0x40, 0xef2}]}) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000080)={0xffffffffffffffff, r2, 0x20}) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:21:49 executing program 3: getpeername(0xffffffffffffffff, &(0x7f0000000000)=@un=@abs, &(0x7f0000000080)=0x80) getpgrp(0x0) r0 = getpgrp(0x0) pidfd_open(r0, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f00000000c0)={0x1e, 0x37, 0x1, {0x3, 0xfc8b, 0xe4c7, r0}}, 0x1e) 19:21:49 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, 0x0) 19:21:49 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0xb, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1034.519370] kmemleak: 24 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:22:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, 0x0) 19:22:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x10, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:22:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x4000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:22:09 executing program 3: gettid() r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) getpgid(r0) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) r4 = getpgrp(0x0) pidfd_open(r4, 0x0) r5 = getpgrp(r4) pidfd_send_signal(r1, 0x9, &(0x7f0000000000)={0x24, 0x4, 0x4}, 0x0) waitid(0x2, r5, 0x0, 0x8, 0x0) 19:22:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400d8, 0x0) 19:22:09 executing program 7: ioctl$F2FS_IOC_RESIZE_FS(0xffffffffffffffff, 0x4008f510, &(0x7f0000000100)=0x6) mq_open(&(0x7f0000000000)='+\\,)-\x00', 0x40, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000180)=""/17) mq_timedsend(r0, &(0x7f0000000040)="4e6edae902d874f129a0e0bc77e641e59af34c266602e2fa2cce0157453a695a052a606523868852d678a1a3fb0724", 0x2f, 0x8, &(0x7f0000000080)={0x0, 0x3938700}) 19:22:09 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) syz_open_procfs(r1, &(0x7f0000000000)='net/mcfilter\x00') 19:22:09 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 9) 19:22:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x5000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1042.037717] FAULT_INJECTION: forcing a failure. [ 1042.037717] name failslab, interval 1, probability 0, space 0, times 0 [ 1042.040285] CPU: 0 PID: 6637 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1042.041781] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1042.043572] Call Trace: [ 1042.044146] dump_stack+0x107/0x167 [ 1042.044937] should_fail.cold+0x5/0xa [ 1042.045744] ? create_object.isra.0+0x3a/0xa20 [ 1042.046696] should_failslab+0x5/0x20 [ 1042.047469] kmem_cache_alloc+0x5b/0x360 [ 1042.048307] create_object.isra.0+0x3a/0xa20 [ 1042.049216] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1042.050277] kmem_cache_alloc+0x159/0x360 [ 1042.051130] security_inode_alloc+0x34/0x160 [ 1042.052022] inode_init_always+0xa4e/0xd10 [ 1042.052911] alloc_inode+0x84/0x240 [ 1042.053672] new_inode+0x23/0x250 [ 1042.054396] __ext4_new_inode+0x32c/0x5400 [ 1042.055270] ? avc_has_extended_perms+0xec0/0xec0 [ 1042.056294] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1042.057299] ? dquot_initialize_needed+0x290/0x290 [ 1042.058317] ? selinux_determine_inode_label+0x1ab/0x340 [ 1042.059445] ext4_mkdir+0x32c/0xb10 [ 1042.060207] ? ext4_rmdir+0xf70/0xf70 [ 1042.061028] vfs_mkdir+0x41f/0x660 [ 1042.061792] do_mkdirat+0x145/0x2a0 [ 1042.062564] ? user_path_create+0xf0/0xf0 [ 1042.063426] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1042.064506] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1042.065584] do_syscall_64+0x33/0x40 [ 1042.066354] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1042.067409] RIP: 0033:0x7f59f7910c27 [ 1042.068179] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1042.072057] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1042.073667] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 1042.075166] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1042.076663] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 1042.078202] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1042.079701] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:22:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, 0x0) 19:22:09 executing program 3: r0 = getpgrp(0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f00000000c0), 0x81, 0x0) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0xef, 0x3, 0x75, 0x7f, 0x0, 0x2, 0x8000, 0x5, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_config_ext={0xe00, 0x5}, 0x4000, 0x80000000, 0x0, 0x9, 0x0, 0x7ff, 0x8, 0x0, 0x5522, 0x0, 0x9}, 0x0, 0xa, r1, 0x8) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x3, 0x81, 0xf9, 0x5, 0x0, 0x1ff, 0x8000, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x400, 0x1, 0xeae, 0x1, 0x6, 0x8, 0x9, 0x0, 0x8, 0x0, 0x6}, r0, 0x4, r1, 0x1) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:22:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400d9, 0x0) [ 1042.112797] SELinux: duplicate or incompatible mount options 19:22:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x700, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:22:09 executing program 5: r0 = getpgrp(0x0) r1 = gettid() wait4(r1, 0x0, 0x1, &(0x7f0000000000)) waitid(0x2, r0, 0x0, 0x8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) prlimit64(r2, 0x16, &(0x7f0000000140)={0x400, 0x6}, 0x0) 19:22:09 executing program 7: ioctl$F2FS_IOC_RESIZE_FS(0xffffffffffffffff, 0x4008f510, &(0x7f0000000100)=0x6) mq_open(&(0x7f0000000000)='+\\,)-\x00', 0x40, 0x0, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000180)=""/17) mq_timedsend(r0, &(0x7f0000000040)="4e6edae902d874f129a0e0bc77e641e59af34c266602e2fa2cce0157453a695a052a606523868852d678a1a3fb0724", 0x2f, 0x8, &(0x7f0000000080)={0x0, 0x3938700}) 19:22:09 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) waitid(0x1, r0, &(0x7f0000000000), 0x0, &(0x7f0000000080)) [ 1055.588949] kmemleak: 28 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:22:30 executing program 5: getpgrp(0x0) getpid() ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000080)={0x0, 0x0}) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000002800)={{0x5d06, 0x3}, 0x100, './file0\x00'}) waitid(0x2, r0, 0x0, 0x1, 0x0) process_vm_readv(r0, &(0x7f00000014c0)=[{&(0x7f0000000100)=""/253, 0xfd}, {&(0x7f0000000000)=""/4, 0x4}, {&(0x7f0000000200)=""/212, 0xd4}, {&(0x7f0000000300)=""/83, 0x53}, {&(0x7f0000000380)=""/69, 0x45}, {&(0x7f0000000400)=""/167, 0xa7}, {&(0x7f0000000040)=""/17, 0x11}, {&(0x7f00000004c0)=""/4096, 0x1000}], 0x8, &(0x7f0000002780)=[{&(0x7f0000001540)=""/141, 0x8d}, {&(0x7f0000001600)=""/29, 0x1d}, {&(0x7f0000001640)=""/39, 0x27}, {&(0x7f0000001680)=""/228, 0xe4}, {&(0x7f0000001780)=""/4096, 0x1000}], 0x5, 0x0) 19:22:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x6000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:22:30 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000040)='./file1\x00', 0x80, 0x49) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) lstat(0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)={'U-', 0x6}, 0x16, 0x3) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 19:22:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400da, 0x0) 19:22:30 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 10) 19:22:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x900, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:22:30 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) (fail_nth: 1) 19:22:30 executing program 3: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x3f, 0x0, 0x6, 0x7f, 0x0, 0x7f, 0x44, 0xa, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, @perf_bp={&(0x7f0000000100), 0x3}, 0x9, 0x9, 0x5, 0x4, 0x1, 0x2da, 0x6, 0x0, 0x10001, 0x0, 0x1}, r0, 0xf, 0xffffffffffffffff, 0x2) waitid(0x0, r0, 0x0, 0x8, 0x0) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000000)={0x1a, 0x7f, 0x7ff}) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x0, 0xee00}}, './file0\x00'}) setsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={r1, r2, r3}, 0xc) 19:22:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x7000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1063.177685] FAULT_INJECTION: forcing a failure. [ 1063.177685] name failslab, interval 1, probability 0, space 0, times 0 [ 1063.179240] CPU: 0 PID: 6689 Comm: syz-executor.0 Not tainted 5.10.153 #1 [ 1063.180129] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1063.181174] Call Trace: [ 1063.181544] dump_stack+0x107/0x167 [ 1063.182032] should_fail.cold+0x5/0xa [ 1063.182541] should_failslab+0x5/0x20 [ 1063.183038] __kmalloc_track_caller+0x79/0x3c0 [ 1063.183634] ? strndup_user+0x74/0xe0 [ 1063.183695] FAULT_INJECTION: forcing a failure. [ 1063.183695] name failslab, interval 1, probability 0, space 0, times 0 [ 1063.184134] memdup_user+0x22/0xd0 [ 1063.184148] strndup_user+0x74/0xe0 [ 1063.184163] __x64_sys_mount+0x133/0x300 [ 1063.184184] ? path_mount+0x20b0/0x20b0 [ 1063.188423] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1063.189127] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1063.189815] do_syscall_64+0x33/0x40 [ 1063.190301] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1063.190977] RIP: 0033:0x7f08a272fb19 [ 1063.191456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1063.193858] RSP: 002b:00007f089fca5188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1063.194852] RAX: ffffffffffffffda RBX: 00007f08a2842f60 RCX: 00007f08a272fb19 [ 1063.195822] RDX: 00000000200001c0 RSI: 00000000200000c0 RDI: 0000000000000000 [ 1063.196776] RBP: 00007f089fca51d0 R08: 00000000200002c0 R09: 0000000000000000 [ 1063.197682] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1063.198617] R13: 00007ffee2d0982f R14: 00007f089fca5300 R15: 0000000000022000 [ 1063.199570] CPU: 1 PID: 6695 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1063.200980] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1063.202685] Call Trace: [ 1063.203231] dump_stack+0x107/0x167 [ 1063.203988] should_fail.cold+0x5/0xa [ 1063.204763] ? jbd2__journal_start+0x190/0x890 [ 1063.205689] should_failslab+0x5/0x20 [ 1063.206462] kmem_cache_alloc+0x5b/0x360 [ 1063.207293] jbd2__journal_start+0x190/0x890 [ 1063.208191] __ext4_journal_start_sb+0x214/0x430 [ 1063.209161] __ext4_new_inode+0x2db0/0x5400 [ 1063.210089] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1063.211091] ? dquot_initialize_needed+0x290/0x290 [ 1063.212109] ? selinux_determine_inode_label+0x1ab/0x340 [ 1063.213230] ext4_mkdir+0x32c/0xb10 [ 1063.214023] ? ext4_rmdir+0xf70/0xf70 [ 1063.214822] vfs_mkdir+0x41f/0x660 [ 1063.215572] do_mkdirat+0x145/0x2a0 [ 1063.216331] ? user_path_create+0xf0/0xf0 [ 1063.217223] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1063.218299] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1063.219375] do_syscall_64+0x33/0x40 [ 1063.220133] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1063.221181] RIP: 0033:0x7f59f7910c27 [ 1063.221958] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1063.225884] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1063.227438] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 1063.228882] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1063.230359] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 1063.231804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1063.233262] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 1063.234809] EXT4-fs error (device sda) in __ext4_new_inode:1082: Out of memory [ 1076.816460] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:22:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0xa00, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:22:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x8000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:22:53 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000040)='./file1\x00', 0x80, 0x49) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) lstat(0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)={'U-', 0x6}, 0x16, 0x3) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 19:22:53 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 11) 19:22:53 executing program 5: r0 = getpgrp(0x0) r1 = pidfd_open(0xffffffffffffffff, 0x0) pidfd_getfd(r1, r1, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) capget(&(0x7f0000000000)={0x19980330, r0}, &(0x7f0000000040)={0x85, 0x7c, 0x6, 0x800, 0x200, 0x1fc}) 19:22:53 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x20000001, 0x0) 19:22:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:22:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400db, 0x0) [ 1085.670399] FAULT_INJECTION: forcing a failure. [ 1085.670399] name failslab, interval 1, probability 0, space 0, times 0 [ 1085.672873] CPU: 0 PID: 6737 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1085.674306] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1085.676004] Call Trace: [ 1085.676557] dump_stack+0x107/0x167 [ 1085.677312] should_fail.cold+0x5/0xa [ 1085.678109] ? create_object.isra.0+0x3a/0xa20 [ 1085.679053] should_failslab+0x5/0x20 [ 1085.679841] kmem_cache_alloc+0x5b/0x360 [ 1085.680680] create_object.isra.0+0x3a/0xa20 [ 1085.681583] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1085.682639] kmem_cache_alloc+0x159/0x360 [ 1085.683504] jbd2__journal_start+0x190/0x890 [ 1085.684426] __ext4_journal_start_sb+0x214/0x430 [ 1085.685413] __ext4_new_inode+0x2db0/0x5400 [ 1085.686355] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1085.687360] ? dquot_initialize_needed+0x290/0x290 [ 1085.688381] ? selinux_determine_inode_label+0x1ab/0x340 [ 1085.689508] ext4_mkdir+0x32c/0xb10 [ 1085.690288] ? ext4_rmdir+0xf70/0xf70 [ 1085.691092] vfs_mkdir+0x41f/0x660 [ 1085.691833] do_mkdirat+0x145/0x2a0 [ 1085.692588] ? user_path_create+0xf0/0xf0 [ 1085.693447] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1085.694541] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1085.695606] do_syscall_64+0x33/0x40 [ 1085.696372] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1085.697473] RIP: 0033:0x7f59f7910c27 [ 1085.698312] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1085.702410] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1085.704103] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 1085.705681] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1085.707293] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 1085.708880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1085.710483] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:22:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0xb00, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1085.727088] 9pnet: Insufficient options for proto=fd 19:22:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:22:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x9000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:22:53 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = fork() r2 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r2, 0x330b) waitid(0x1, r1, 0x0, 0x2, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x3, 0xff, 0x9, 0x3f, 0x0, 0xfffffffffffff8d3, 0x22920, 0x8, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xffff7a12, 0x4, @perf_bp={&(0x7f0000000000), 0x8}, 0x40088, 0x401, 0x5, 0x1, 0x0, 0x7, 0x1, 0x0, 0x7}, r1, 0x8, r2, 0x2) 19:22:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400dc, 0x0) 19:22:53 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:22:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x3, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:22:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xa000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1085.858265] SELinux: duplicate or incompatible mount options 19:22:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x1020, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:22:53 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 12) [ 1086.011336] FAULT_INJECTION: forcing a failure. [ 1086.011336] name failslab, interval 1, probability 0, space 0, times 0 [ 1086.014615] CPU: 0 PID: 6788 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1086.016308] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1086.018423] Call Trace: [ 1086.019083] dump_stack+0x107/0x167 [ 1086.019999] should_fail.cold+0x5/0xa [ 1086.020943] should_failslab+0x5/0x20 [ 1086.021909] __kmalloc_track_caller+0x79/0x3c0 [ 1086.023045] ? sidtab_sid2str_get+0x17e/0x670 [ 1086.024245] kmemdup+0x23/0x50 [ 1086.025075] sidtab_sid2str_get+0x17e/0x670 [ 1086.026183] sidtab_entry_to_string+0x33/0x110 [ 1086.027376] security_sid_to_context_core+0x33d/0x570 [ 1086.028661] selinux_inode_init_security+0x4a6/0x690 [ 1086.029977] ? selinux_dentry_init_security+0x280/0x280 [ 1086.031305] ? get_cached_acl_rcu+0x110/0x110 [ 1086.032421] ? find_held_lock+0x2c/0x110 [ 1086.033443] security_inode_init_security+0x151/0x360 [ 1086.034730] ? ext4_init_acl+0x310/0x310 [ 1086.035770] ? inode_free_by_rcu+0x20/0x20 [ 1086.036844] ? chksum_update+0x4c/0xb0 [ 1086.037873] __ext4_new_inode+0x383f/0x5400 [ 1086.038981] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1086.040245] ? dquot_initialize_needed+0x290/0x290 [ 1086.041434] ? selinux_determine_inode_label+0x1ab/0x340 [ 1086.042854] ext4_mkdir+0x32c/0xb10 [ 1086.043759] ? ext4_rmdir+0xf70/0xf70 [ 1086.044762] vfs_mkdir+0x41f/0x660 [ 1086.045636] do_mkdirat+0x145/0x2a0 [ 1086.046581] ? user_path_create+0xf0/0xf0 [ 1086.047603] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1086.048943] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1086.050277] do_syscall_64+0x33/0x40 [ 1086.051186] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1086.052455] RIP: 0033:0x7f59f7910c27 [ 1086.053362] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1086.057911] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1086.059785] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 1086.061578] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1086.063337] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 1086.065021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1086.066732] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 1099.532622] kmemleak: 21 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:23:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400dd, 0x0) 19:23:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x4, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:23:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xb000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:23:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x2000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:23:15 executing program 5: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000180)=""/17) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000180)=""/17) ioctl$BTRFS_IOC_SUBVOL_CREATE(r1, 0x5000940e, &(0x7f0000000200)={{r0}, "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"}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000180)=""/17) getdents(r4, &(0x7f0000001200)=""/178, 0xb2) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000100)={@private0, r5}, 0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000001c0)={'veth1\x00'}) sendto(r0, &(0x7f0000000080)="2e1c7ff430619b628c6089fcb8d0b8900e475c387f11c46b7ef761df1d0f080556cdc1dfef3d47579f071847164aa76c134ac37ae664acbdbf0cbf95387b85aa75987b1f7ed2839bdfdbd5212e86b2c72f8fba1c7c", 0x55, 0x24000004, &(0x7f0000000100)=@can={0x1d, r5}, 0x80) r6 = getpgrp(0x0) waitid(0x2, r6, 0x0, 0x8, 0x0) r7 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$setsig(0x4203, r7, 0x183, &(0x7f0000000000)={0x3f, 0xffffffff, 0x10000}) 19:23:15 executing program 7: syz_mount_image$vfat(0x0, 0x0, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[]) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000040)='./file1\x00', 0x80, 0x49) r0 = openat(0xffffffffffffff9c, &(0x7f0000001340)='./file1\x00', 0x105142, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) lstat(0x0, 0x0) setxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)={'U-', 0x6}, 0x16, 0x3) copy_file_range(r1, 0x0, r0, 0x0, 0x200f5ef, 0x0) 19:23:15 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 13) 19:23:15 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000080)={0x2, 0x3, 0x7ba, 0x6, r1}) ptrace$setsig(0x4203, r0, 0x88d, &(0x7f0000000000)={0x34, 0x5, 0x8000}) [ 1108.142980] FAULT_INJECTION: forcing a failure. [ 1108.142980] name failslab, interval 1, probability 0, space 0, times 0 [ 1108.145827] CPU: 0 PID: 6818 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1108.147549] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1108.149579] Call Trace: [ 1108.150231] dump_stack+0x107/0x167 [ 1108.151145] should_fail.cold+0x5/0xa [ 1108.152092] should_failslab+0x5/0x20 [ 1108.153024] __kmalloc_track_caller+0x79/0x3c0 [ 1108.154147] ? sidtab_sid2str_get+0x17e/0x670 [ 1108.155279] kmemdup+0x23/0x50 [ 1108.156074] sidtab_sid2str_get+0x17e/0x670 [ 1108.157118] sidtab_entry_to_string+0x33/0x110 [ 1108.158227] security_sid_to_context_core+0x33d/0x570 [ 1108.159487] selinux_inode_init_security+0x4a6/0x690 [ 1108.160746] ? selinux_dentry_init_security+0x280/0x280 [ 1108.162053] ? get_cached_acl_rcu+0x110/0x110 [ 1108.163212] ? find_held_lock+0x2c/0x110 [ 1108.164219] security_inode_init_security+0x151/0x360 [ 1108.165474] ? ext4_init_acl+0x310/0x310 [ 1108.166475] ? inode_free_by_rcu+0x20/0x20 [ 1108.167536] ? chksum_update+0x4c/0xb0 [ 1108.168500] __ext4_new_inode+0x383f/0x5400 [ 1108.169603] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1108.170814] ? dquot_initialize_needed+0x290/0x290 [ 1108.172009] ? selinux_determine_inode_label+0x1ab/0x340 [ 1108.173347] ext4_mkdir+0x32c/0xb10 [ 1108.174257] ? ext4_rmdir+0xf70/0xf70 [ 1108.175236] vfs_mkdir+0x41f/0x660 [ 1108.176146] do_mkdirat+0x145/0x2a0 [ 1108.177047] ? user_path_create+0xf0/0xf0 [ 1108.178309] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1108.179592] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1108.180881] do_syscall_64+0x33/0x40 [ 1108.181803] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1108.183079] RIP: 0033:0x7f59f7910c27 [ 1108.183990] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1108.188476] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1108.190335] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 1108.192072] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1108.193787] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 1108.195531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1108.197246] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:23:15 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) ptrace(0x11, 0xffffffffffffffff) 19:23:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400de, 0x0) 19:23:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x2010, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:23:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x5, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:23:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x10000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:23:15 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 14) 19:23:16 executing program 5: r0 = getpgrp(0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000080)=0x80, 0x80800) r3 = gettid() ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f00000000c0)=ANY=[@ANYBLOB="05000000000000000001ff00", @ANYRES32=r1, @ANYBLOB="5fab0000000000002e2f66696c653000"]) r4 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000180)=""/17) kcmp$KCMP_EPOLL_TFD(r3, r0, 0x7, 0xffffffffffffffff, &(0x7f0000000100)={r4, r2, 0x1}) r5 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r5, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r5, 0x330b) recvmsg(r5, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000001c0)=""/95, 0x5f}, {&(0x7f0000000240)=""/235, 0xeb}], 0x2, &(0x7f0000000380)=""/184, 0xb8}, 0x10002) waitid(0x2, r0, 0x0, 0x8, 0x0) r6 = getpgrp(0x0) pidfd_open(r6, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={'\x00', 0x4, 0x3ff, 0x0, 0x7, 0x6, r6}) [ 1108.418420] FAULT_INJECTION: forcing a failure. [ 1108.418420] name failslab, interval 1, probability 0, space 0, times 0 [ 1108.419977] CPU: 1 PID: 6849 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1108.420783] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1108.421762] Call Trace: [ 1108.422087] dump_stack+0x107/0x167 [ 1108.422528] should_fail.cold+0x5/0xa [ 1108.422985] ? ext4_find_extent+0xa3d/0xd30 [ 1108.423492] should_failslab+0x5/0x20 [ 1108.423939] __kmalloc+0x72/0x3f0 [ 1108.424355] ext4_find_extent+0xa3d/0xd30 [ 1108.424853] ext4_ext_map_blocks+0x1c8/0x5b90 [ 1108.425393] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1108.426018] ? perf_trace_lock+0xac/0x490 [ 1108.426531] ? ext4_ext_release+0x10/0x10 [ 1108.427020] ? lock_release+0x6b0/0x6b0 [ 1108.427482] ? perf_trace_ext4_es_lookup_extent_exit+0x459/0x700 [ 1108.428201] ? ext4_es_lookup_extent+0x48d/0xbe0 [ 1108.428765] ? down_read+0x10f/0x430 [ 1108.429210] ? down_write_killable+0x180/0x180 [ 1108.429748] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1108.430321] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 1108.430872] ext4_map_blocks+0x9cc/0x1970 [ 1108.431367] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1108.431901] ? __brelse+0x84/0xa0 [ 1108.432309] ? __ext4_new_inode+0x148/0x5400 [ 1108.432843] ext4_append+0x1b8/0x4e0 [ 1108.433278] ? ext4_move_extents+0x3270/0x3270 [ 1108.433819] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1108.434401] ext4_init_new_dir+0x25e/0x4d0 [ 1108.434900] ? ext4_init_dot_dotdot+0x610/0x610 [ 1108.435475] ext4_mkdir+0x3c1/0xb10 [ 1108.435906] ? ext4_rmdir+0xf70/0xf70 [ 1108.436367] vfs_mkdir+0x41f/0x660 [ 1108.436791] do_mkdirat+0x145/0x2a0 [ 1108.437222] ? user_path_create+0xf0/0xf0 [ 1108.437719] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1108.438372] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1108.438993] do_syscall_64+0x33/0x40 [ 1108.439432] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1108.440036] RIP: 0033:0x7f59f7910c27 [ 1108.440478] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1108.442612] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1108.443497] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 1108.444334] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1108.445162] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 1108.445976] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1108.446816] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:23:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x6, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:23:16 executing program 3: r0 = getpgrp(0x0) waitid(0x1, r0, &(0x7f0000000140), 0x1000000, &(0x7f00000001c0)) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) ptrace$setsig(0x4203, r1, 0x2, &(0x7f00000000c0)={0x17, 0x9, 0x3f}) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x3, r0, 0x3, 0x0) tkill(r2, 0x28) waitid(0x0, r0, 0x0, 0x8, &(0x7f0000000000)) pidfd_open(r2, 0x0) [ 1121.269581] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:23:36 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 15) 19:23:36 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x7, 0x7, 0x7, 0x2b, 0x0, 0x9, 0xf00, 0x5, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, @perf_config_ext={0x9f, 0x7ff}, 0x10200, 0x6, 0xffff4100, 0x1, 0x10000, 0x8, 0x6, 0x0, 0x2, 0x0, 0x902d}, r1, 0xf, 0xffffffffffffffff, 0x9) tgkill(r2, 0xffffffffffffffff, 0x23) 19:23:36 executing program 7: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000180)=""/17) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000180)=""/17) ioctl$BTRFS_IOC_SUBVOL_CREATE(r1, 0x5000940e, &(0x7f0000000200)={{r0}, "88d37bc1475273f412646d3c1c7aa30eebb8a3349eeb13b303c39dbbd99ed0304f2db6a9a234677c630d675ea6cc39fa4e4a0131daeb13756f0e1b937eeea63ce5b6bb4d8be0a1eb07d5933aced465158bb431643617a6968f52be742bb0b2c654a9a098cbe93dcbb15e2ba468de41a53aec8c4eb3b009a22ed8323dc8be95c9b0e99e206d374417480068e079938cfcc533addb6ea10ffe26e16320f3a9661db9e2429340b99a09fb96c142d955077900b4fc72bc78b7687242b8ff71a90349090bb1b793bb85416249ec917bea323fb61287624a9d1636b60c7c8e10138214c04a50a180d56796ab19a0bb3861fae1c65e18c8d3f648ccb3963407e92ef788046fd1307b7d4a6eee3c31380fdd28c24c03a7a05189160c3f8389ffb813cedae1e136bbbeaa3d09976115d8e81cb2fd36290db3be53a9cfbb20664dadfc1e496caee68a58c9d1973e9810b5afe99235c157c91b6a29103354e7e9e700b0431bdd0d3a49a62d617db47767773850163398deafc29f68fcbe80a3dcb1c77c1a92df81356493966ea41cb37e9c4c5a3acad3b82bf1bfddf393dcef3c0b711a6f2a7cc3b94e69565c25c36545d3b3f45459dcf5483d8125a3592c2bb3fd9541a822a65102c5c45ce617798f1ca074e3731fb592034315a70b5f8515df6af0c1f3005fdc4bb98a73e6ec8f85b02d1b8a74f63d546b6c4da8a0c02ca52f8de7ad94e355fb1fb8c2d0740bb22b34aaeaf3c6f01465f5d79bc1baf79e66c77cd7905438426a1a4e5500ce50b775d2006450550d7d906149d6cb95ad1590c8f98e80e65a3b17678884099ac7e4869825cbe75dd88cceef8c721c5d7452c2d0d56145031b093c18116ddd1d2397c1230561a4bf2ed48142d934bae0654052334116098066614f8752f706e55fcbe802827e017669dde1b30f4fa70cddb23846fc8af29620808e05b7d261c8fa696f290bdfd72ffbdeae28f0660fecec7882d9718366baa8037d8d1427bef054b757cf1bdbd7e7e30e329fb576cdfe14efaccce45f09ad240954b2707a59bf5360eef558fd7dbdb9340cb7b95b9a720dcdf2a6a4d782a72dd97fe8ac26e8b19c56ede809e2ef279497526ddc307a38e64d6a2aa653ee3ccffbc51d889220031c408af7426609d00b4acacc65ec6c37845d3304e213e6641557ce32e21f3e6240c6b54c005b8962acb954df3b7fcdd64e5d188d8153c36f61485dfe6a09bc8b4bb084fae0b289084f1eb0dd6a9a83ea5ca621c0dc18307ea00f0a3d008371c378c6552a1b5dc906b78f6e0245a5a1d5a17f3135af7e9c4ae217c46c0bd9213e4b76c3eef6e61d2858774aaa70e0e2941de152572abb22f30d0918f7ce1ec78ca164e0f912c199995286b2402d7d237c71f893099797f669c7644396334ce4711bc86e48193f99d480dc3446724d6eed9b439cf967726da73a7ded5a2010b8c0357213c559982bdb842322bd6ad2c941dec709ea7d4a8b11cde6991732391791b2756a0b9e8ac70ef262fe0932309d80893220f5e8045a0a2fe7968457d9d358c6090e61206d87dda26ac33b7f8abffe8ee6f64333aef06cb8a7d90ca10bf3d8887992c3787419b383c73d34992cc4b42ab17800d17006c14bba39ff336b68d4a1d27821242d6e3efc31715413cc191fd9098e4fb99c432341cef7f7874f3f68ba2718570196dc74d6b10750de283695900d47984f3cea393195905b174efe052cde0558b9cf7a50c78e4bf22c88ff2dcdf39721101b42fffaa20d04373362834859fa1687990e5f47a81853e6da59c123540f6ad20cd6b9550fe2ec18d31668560b6ca7d83ea26986e8a5ddc130fca539b74c8549c052d4de01b136e428c31ef9359625c654316e1fff864f8eff382c815e424f6aa837ec1747146f848ceff1e0772778f366c2133f3b9f4fdff24be026b9b0b239a214b5b621537061673c5b547bceff2622d585030a15b63d1b44d926f2a3381766b1e9af49e4c6c7ba30e0f5b5a9ba66db40110c15869eec9fa2ec32d5d65b350b928395ca635473512e59e58f558fab42feefdd95ad327654258ec6d2b599aac4063dbc34af725a9bb482461407274ad8443957e273faf69b385bac4d9fe171e94e1b60d1cb4c759d4c77f3231eb27ed921f98f69a453aad90904027a8ea99524e3f1770b15232d0818a438e6420551f0342f319fb953ccfb68334aa9639763fa31af729fe074fc89bd9e0919b15e47e359a55a9142deb408a534168d3f2ebdbcbef8d36396b99c727153f4efa65b8e047cb7c84c8e87bdf27a8b347d708feb600efd902c96c05f97b280533a7e0a4a647d99d9d9debd422ba91a225e664b4ab134a26b9d2247ef54adf64e90fd42c2de74a44bae5317f7653ab91315aa91bfc1e66ff9a299de77bff869f64037f6c8bde834ee5905e2df3250bc3fdcd2883d9cafb697b6a24f3e692cad0758962d0ec4778905fa69499f1e4fde34be15d897519a90f391e1a6665e70da2d246fc40fdf284a4cd225df188ebd26808173d84fc1fc63c786612ca2e942c32c1ad290407199baa27e5cf34c639da9b17f7f91413b2965c4c2fbd1a1cb0194124f021c67de4bf93ebe910cfdfbb68b92a13ac17a89e3544768967a12168bee8e10a3c6c7cc1c05a1ebb67d94f53495a7045a796765bdd1c6ab38a65ad35bd097a12549ce8eca94e5360a57f05c3ceb389fbfc7ca9c385c9b8a10c3e60549a250b9842c9f7b1f53a2f2ecb04727812f5591df68eafaca8bec601dd7a4e6561b313b8e9ef782d425ab98f179d0c2a01e22a7f27099dd739f5541c9674a1b8ea5380edcf9ab1321b2c1ac6ddf6b8243539fab90ad93c0ae27d3e9c13004cfff4493dd797bb4d763a6a57a2fce45084ba2b00480a5cfa163bd14af26983147e8a3b5d5111f1a4db1daf875b9d780c7780896e1b47c5446af55ee52f0b78e01e6e3beb8a6ca6a8675814737bdf16cd926ade2b1317306b5f9acca090a06aa4a72a9aeb054b89a9b8372beecbc40531b1b8d681dba39eaaabd9411b60fe385ac996c7bea09ab6a9c94ef7180fe05a2c307a57afa388944003e3c33c6ab06e1aefa4505e9fe06aa244293eddd69c4cb8b3a5f2f8fe841e95e74f2b738ab8823b87b751efcec6e6c66b193d77ae7dac91e728a99a2ca79ff057f6552415851108243f359a0b13dd517764c7834ff0c92f336b1039e5926abdfb58c50e4f35c33187991e39ded538c0764f9d52701b8963f89125a3e6f383d9a475d493f58a78d3d7142e2e8fb4862b8d55217199205cb8104287f885e4ebbc90448919ac4f741ad7480602d0ec241ccd0b450579c8fd6dedf1aa2d3913d1b0516691229de2350ddb454d1517540532eff467ef0e923956770f32b2188a37a97fe4bf91f185e2a95df47a83aadfaaa836560126daa5b4722564bebfb7b4be6930159b16d519fd0a35719f57c17a0678ff97cfac4d2a90297398ce73fab78908d788afc83577bdb567ac86fd356af0d066316de6eb5407e574d2379797554d32a37783e0f2142ae25ef0a2bbeeb9808c99a659c5d9949ad4d6e7b9318687cd90d7312d688f7e512db95876b88cbf9a2ca33577e3c953a84b448ce22c206d74d5793515af2fea59eec5aba4ee8dc67ba12bff2f53bb8296a2e5c93e9d5589425d5572a93e080dc215a263c365c810a61dc7cc6f5fe792f7a8400142cf1daa282eff3a49e1188a05fd52373f71b4f45157facbce342f7232c9b7f645851f745e1b6ec13f6a4891a6a7e0a26c93c41a3f02c71f7c0b2f79925a29d76285db7024159d954b30324385d2d06140491c5e6d25c1449916f5ebe79f75039cb27f01d55613cc48604cb7cf47440e73d3bf8451414003676b8c3aa96f6e4e2e62a0c405acb9a74cced523aec17c4c90d8324e0f06719a9f83d15c305b6cb690564472f994605cd2b48637af7a8937365921f13a01ca161ef3f4cc3714c3ac51753c9b45717bdea902ac5b9f3ff2a66ca0f31723effea6bcb41cdc8c31177f35d1862dc6d3a7811344e8cc9abad21b5349b122eab9c21cf5f93ec13cf580b2adb90832ce91769ccabe95aad48f416e3b2194567aae7e8c9cb9fc91edfe8e87db266548cdf5cdcf5fc3ce985619dde624d539a59fdb708032d88aa559b6ea68aae278bfc6df575039285aa38469a22fea3371ff9ce110e2aab4f93fb173c48a9e895cfe1ebe9c527726f92af9b2e4c228b4068434c54a7bab46f2760e365686c09c6de73dd135ff9568f16ee40763d8d1d9324b6c4bf2bade277499a5d4363afc489cf0b73f2c1cb164adce6675dcfc0e61c05aebf92c20091fdf2661230357ab3100ab0a019a69de546bb2819eb15aa986d03d7babb2d9c59466a43104022a4e04064049c7678297aed847cedb31ba3b248b16aa5079f146fce983a161a29b4ce9c17ec3c1eaef8585779feee65df77b2a68926f71d6fe7094023de6290c239a6b8f192be3e3842bcca45680b3aa337668fce0f9e9f4fd230b56553b3be31c737a5e7c02f54e19ce4ae64cbafc2abdce63032edd8e9bb6a010cb525bd46ae4eef7edaa2e8c2b5ac3b34f0f2d13ab03fc437dbe46098a5a86a6a93be4a1b93a47482864afa39689e5f3e8a92deee8b31a84a69cf9f4f0a20ab4d283c90ddec66ead59665109d14dfb007afa6c764586741896fa167883c523a750856ddb7979be8d73a5a10fb5649055d7ae6da531873b5ab561fc4a14f1c56a9f1511efdcefbd4a5ae5da2552ffa89ab81575bd40930280520556cb61f716690b18a32b91d2108f9774bb0abd4ca5dd3498fe3aa8e8e47eeafb708dd809d38a51aea4b292af7ca7c5be13db508ff12cffa17de8cf78c49d72a2f92a9a904848992097a822e004fc96b3b4917b18421bd7f1101d573666249d4935c51244130d1c13423bbec866c6a5d1c0541b667535cb9fe19d42a606834e58489d18b814c0553d0dbbab862a619c4bb413d8ea2e553f0f45c287de0f80edc8301033c96260993250085783a593446d6c414529da656856ed7b3dc8f9e09ce64771ec7bf2e4302c6e3100d40fc106a5b8a2db0afc2cd24a48429da22db501b87afb8b60bb82dbd5d4b43bf2139931e3432249aa5ac6d9731c85c8aec8ff95c721dce021271d345de9bbf84ceb9f71094472d8135bb437618e7027a033d0da837dd73ab66c84f395bc01824419f519e50d0ae7b65e4f3cd33d660d4c364ce53169c6b5161467d120a570131d7cdaddcc7a50ad324f1090680bc9625e04901331042e92b2052b9f7962c2a8a42027a3510b20b497c98a9d0b09903329f2df69055397429bfa8773a1b8fdb0ed0185ac7a4c3c214484b916d5e0a7ef11ef27428635a910fbe584ba7a3b28ef0b486e0ce0bd7e3a020458bd543e8ab625e6b8b211fc0807e54a95c7b43b58602cb0d79acb7272dcb03f41f36d301934fd278d8f5cbf430d51a19558b6ebf18ce4ea5619b16c01856154942bf9c4bd774676ca362be833d4546f3d5a9270fb4c374c2255f6c1031adb21921790d43f326c5582998781c8480bcaac49a53d07e9d62db7867b83234bcb0c3423614aed98cd9edf67163f120cbd10fd645ec31a45ca968122bf66bcc66db0cc7d46edf613159dced02487dc57c3ab4a2933839d9b72dd9c14ce4bb16b389f39b49da40bab8d130b2323ded32a98222b2941bdac4fafd1c88d8ce0b41743c8ea28e19a8866857a8438a594d6cc699d2de9be8e1387f41e75daf727a0c15307cd75da97926f453fd5a732b5cfc24d0f207c0f9fed432cfc8"}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000180)=""/17) getdents(r4, &(0x7f0000001200)=""/178, 0xb2) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000100)={@private0, r5}, 0x14) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000001c0)={'veth1\x00'}) sendto(r0, &(0x7f0000000080)="2e1c7ff430619b628c6089fcb8d0b8900e475c387f11c46b7ef761df1d0f080556cdc1dfef3d47579f071847164aa76c134ac37ae664acbdbf0cbf95387b85aa75987b1f7ed2839bdfdbd5212e86b2c72f8fba1c7c", 0x55, 0x24000004, &(0x7f0000000100)=@can={0x1d, r5}, 0x80) r6 = getpgrp(0x0) waitid(0x2, r6, 0x0, 0x8, 0x0) r7 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$setsig(0x4203, r7, 0x183, &(0x7f0000000000)={0x3f, 0xffffffff, 0x10000}) 19:23:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400df, 0x0) 19:23:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x7, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:23:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0xedc0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:23:36 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = clone3(&(0x7f00000001c0)={0x40000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x6}, &(0x7f00000000c0)=""/124, 0x7c, &(0x7f0000000140)=""/39, &(0x7f0000000180)=[r0, r0, r0, 0xffffffffffffffff, r0, 0xffffffffffffffff], 0x6}, 0x58) getpgrp(r1) 19:23:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:23:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x80000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1129.136986] FAULT_INJECTION: forcing a failure. [ 1129.136986] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.139953] CPU: 1 PID: 6894 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1129.141520] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1129.143429] Call Trace: [ 1129.144038] dump_stack+0x107/0x167 [ 1129.144873] should_fail.cold+0x5/0xa [ 1129.145746] ? create_object.isra.0+0x3a/0xa20 [ 1129.146794] should_failslab+0x5/0x20 [ 1129.147655] kmem_cache_alloc+0x5b/0x360 [ 1129.148584] create_object.isra.0+0x3a/0xa20 [ 1129.149578] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1129.150753] __kmalloc+0x16e/0x3f0 [ 1129.151574] ext4_find_extent+0xa3d/0xd30 [ 1129.152538] ext4_ext_map_blocks+0x1c8/0x5b90 [ 1129.153566] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1129.154760] ? perf_trace_lock+0xac/0x490 [ 1129.155715] ? ext4_ext_release+0x10/0x10 [ 1129.156663] ? lock_release+0x6b0/0x6b0 [ 1129.157572] ? perf_trace_ext4_es_lookup_extent_exit+0x459/0x700 [ 1129.158945] ? ext4_es_lookup_extent+0x48d/0xbe0 [ 1129.160025] ? down_read+0x10f/0x430 [ 1129.160859] ? down_write_killable+0x180/0x180 [ 1129.161878] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1129.162976] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 1129.164030] ext4_map_blocks+0x9cc/0x1970 [ 1129.164973] ? ext4_issue_zeroout+0x1c0/0x1c0 19:23:36 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x2, 0x0) [ 1129.165980] ? __brelse+0x84/0xa0 [ 1129.166848] ? __ext4_new_inode+0x148/0x5400 [ 1129.167849] ext4_append+0x1b8/0x4e0 [ 1129.168687] ? ext4_move_extents+0x3270/0x3270 [ 1129.169711] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1129.170822] ext4_init_new_dir+0x25e/0x4d0 [ 1129.171770] ? ext4_init_dot_dotdot+0x610/0x610 [ 1129.172825] ext4_mkdir+0x3c1/0xb10 [ 1129.173641] ? ext4_rmdir+0xf70/0xf70 [ 1129.174515] vfs_mkdir+0x41f/0x660 [ 1129.175329] do_mkdirat+0x145/0x2a0 [ 1129.176148] ? user_path_create+0xf0/0xf0 [ 1129.177077] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1129.178246] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1129.179419] do_syscall_64+0x33/0x40 [ 1129.180250] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1129.181387] RIP: 0033:0x7f59f7910c27 [ 1129.182215] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1129.186305] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1129.188002] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 1129.189583] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1129.191177] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 1129.192764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1129.194347] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 1129.210259] 9pnet: Insufficient options for proto=fd [ 1129.214916] SELinux: duplicate or incompatible mount options [ 1129.219550] 9pnet: Insufficient options for proto=fd 19:23:36 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 16) 19:23:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400e0, 0x0) 19:23:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x8, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:23:36 executing program 3: r0 = getpgrp(0x0) ioctl$FIGETBSZ(0xffffffffffffffff, 0x2, &(0x7f0000000000)) waitid(0x2, r0, 0x0, 0x8, 0x0) [ 1129.299993] FAULT_INJECTION: forcing a failure. [ 1129.299993] name failslab, interval 1, probability 0, space 0, times 0 [ 1129.302238] CPU: 0 PID: 6916 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1129.303575] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1129.305180] Call Trace: [ 1129.305690] dump_stack+0x107/0x167 [ 1129.306411] should_fail.cold+0x5/0xa [ 1129.307150] ? create_object.isra.0+0x3a/0xa20 [ 1129.308048] should_failslab+0x5/0x20 [ 1129.308759] kmem_cache_alloc+0x5b/0x360 [ 1129.309547] ? sidtab_sid2str_get+0x65/0x670 [ 1129.310379] create_object.isra.0+0x3a/0xa20 [ 1129.311244] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1129.312202] __kmalloc_track_caller+0x177/0x3c0 [ 1129.313082] ? sidtab_sid2str_get+0x17e/0x670 [ 1129.313948] kmemdup+0x23/0x50 [ 1129.314580] sidtab_sid2str_get+0x17e/0x670 [ 1129.315401] sidtab_entry_to_string+0x33/0x110 [ 1129.316274] security_sid_to_context_core+0x33d/0x570 [ 1129.317260] selinux_inode_init_security+0x4a6/0x690 [ 1129.318225] ? selinux_dentry_init_security+0x280/0x280 [ 1129.319239] ? get_cached_acl_rcu+0x110/0x110 [ 1129.320098] ? find_held_lock+0x2c/0x110 [ 1129.320877] security_inode_init_security+0x151/0x360 [ 1129.321846] ? ext4_init_acl+0x310/0x310 [ 1129.322632] ? inode_free_by_rcu+0x20/0x20 [ 1129.323470] ? chksum_update+0x4c/0xb0 [ 1129.324197] __ext4_new_inode+0x383f/0x5400 [ 1129.325019] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1129.325935] ? dquot_initialize_needed+0x290/0x290 [ 1129.326844] ? selinux_determine_inode_label+0x1ab/0x340 [ 1129.327846] ext4_mkdir+0x32c/0xb10 [ 1129.328522] ? ext4_rmdir+0xf70/0xf70 [ 1129.329234] vfs_mkdir+0x41f/0x660 [ 1129.329924] do_mkdirat+0x145/0x2a0 [ 1129.330666] ? user_path_create+0xf0/0xf0 [ 1129.331474] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1129.332490] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1129.333471] do_syscall_64+0x33/0x40 [ 1129.334178] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1129.335156] RIP: 0033:0x7f59f7910c27 [ 1129.335852] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1129.339319] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1129.340756] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 1129.342100] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1129.343458] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 1129.344789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1129.346115] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 1129.459141] SELinux: duplicate or incompatible mount options [ 1143.721631] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1152.920265] FAULT_INJECTION: forcing a failure. 19:24:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x9, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:24:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400e1, 0x0) 19:24:00 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) waitid(0x1, r1, 0x0, 0x1000000, 0x0) waitid(0x1, r0, &(0x7f0000000080), 0x40000000, 0x0) 19:24:00 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 17) 19:24:00 executing program 3: r0 = syz_open_dev$mouse(&(0x7f00000002c0), 0x3ff, 0x10400) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000300)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) r1 = getpgrp(0x0) waitid(0x2, r1, 0x0, 0x8, 0x0) r2 = getpgrp(0x0) syz_mount_image$nfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x9, 0x2, &(0x7f0000000580)=[{&(0x7f00000003c0)="e00a56efd3047f2657771e8ac587880e1d33be9280d1e6cb2010e311ecb5f537fd43908e3dbaa85436932f759599e11865e7e83183e4ba2b30986ccc9374b9366012dc22fb8d6c66310dd17258fcbda5e285de8c64131d5c316d6d6c5443144db962b8296c247f9e655dfa90f0e6224939a9fae1aa1cf2576c8e6c836fbb873053e63fce9eb35a3a68211b61d2b928ffa59e822fbab3710e399f01d5177750e2e2b15bb2854b6447307bff8a560b18066edad8", 0xb3, 0x7}, {&(0x7f0000000480)="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", 0xff, 0x20}], 0x80000, &(0x7f00000005c0)={[{'/dev/input/mouse#\x00'}, {'/dev/input/mouse#\x00'}, {'/dev/input/mouse#\x00'}, {'$$@)\xa2\''}, {'/dev/input/mouse#\x00'}, {}, {'/})|,'}, {}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x38, 0x31, 0x39, 0x0, 0x36, 0x5c, 0x63], 0x2d, [0x33, 0xfd0d924d9d58e6f3, 0x34, 0x33], 0x2d, [0x62, 0x35, 0x61, 0x65], 0x2d, [0x35, 0x65, 0x0, 0x36], 0x2d, [0x61, 0x66, 0x61, 0x35, 0x37, 0x66, 0x39, 0x31]}}}, {@obj_role={'obj_role', 0x3d, '/dev/input/mouse#\x00'}}]}) pidfd_open(r2, 0x0) tkill(r2, 0x2b) clone3(&(0x7f0000000240)={0x10000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x3e}, &(0x7f00000000c0)=""/88, 0x58, &(0x7f0000000140)=""/161, &(0x7f0000000200)=[r2, r2], 0x2}, 0x58) 19:24:00 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xa000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:24:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x1000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1152.920265] name failslab, interval 1, probability 0, space 0, times 0 [ 1152.925128] CPU: 0 PID: 6935 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1152.926737] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1152.928540] Call Trace: [ 1152.929121] dump_stack+0x107/0x167 19:24:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20100000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1152.929919] should_fail.cold+0x5/0xa [ 1152.930788] ? create_object.isra.0+0x3a/0xa20 [ 1152.931790] should_failslab+0x5/0x20 [ 1152.932619] kmem_cache_alloc+0x5b/0x360 [ 1152.933502] ? __es_remove_extent+0x70f/0x15d0 [ 1152.934498] create_object.isra.0+0x3a/0xa20 [ 1152.935458] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1152.936560] kmem_cache_alloc+0x159/0x360 [ 1152.937468] __es_insert_extent+0x3a9/0x12f0 [ 1152.938419] ? do_raw_write_lock+0x11a/0x280 [ 1152.939394] ? do_raw_read_unlock+0x70/0x70 [ 1152.940326] ? __lockdep_reset_lock+0x180/0x180 [ 1152.941344] ext4_es_insert_extent+0x2dc/0xbb0 [ 1152.942342] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 1152.943281] ? lock_downgrade+0x6d0/0x6d0 [ 1152.944185] ? __ext4_handle_dirty_super+0x100/0x100 [ 1152.945278] ? __es_find_extent_range+0x197/0x4b0 [ 1152.946316] ? __ext4_handle_dirty_super+0x100/0x100 [ 1152.947420] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1152.948459] ext4_ext_map_blocks+0x194a/0x5b90 [ 1152.949454] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1152.950586] ? perf_trace_lock+0xac/0x490 [ 1152.951495] ? ext4_ext_release+0x10/0x10 [ 1152.952395] ? lock_release+0x6b0/0x6b0 [ 1152.953254] ? perf_trace_ext4_es_lookup_extent_exit+0x459/0x700 [ 1152.954553] ? ext4_es_lookup_extent+0x48d/0xbe0 [ 1152.955601] ? down_read+0x10f/0x430 [ 1152.956399] ? down_write_killable+0x180/0x180 [ 1152.957371] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1152.958400] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 1152.959415] ext4_map_blocks+0x9cc/0x1970 [ 1152.960318] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1152.961282] ? __brelse+0x84/0xa0 [ 1152.962031] ? __ext4_new_inode+0x148/0x5400 [ 1152.963007] ext4_append+0x1b8/0x4e0 [ 1152.963805] ? ext4_move_extents+0x3270/0x3270 [ 1152.964778] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1152.965816] ext4_init_new_dir+0x25e/0x4d0 [ 1152.966716] ? ext4_init_dot_dotdot+0x610/0x610 [ 1152.967724] ext4_mkdir+0x3c1/0xb10 [ 1152.968510] ? ext4_rmdir+0xf70/0xf70 [ 1152.969339] vfs_mkdir+0x41f/0x660 [ 1152.970110] do_mkdirat+0x145/0x2a0 [ 1152.970896] ? user_path_create+0xf0/0xf0 [ 1152.971786] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1152.972897] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1152.973997] do_syscall_64+0x33/0x40 [ 1152.974791] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1152.975890] RIP: 0033:0x7f59f7910c27 [ 1152.976683] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1152.980559] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1152.982156] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 1152.983657] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1152.985158] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 1152.986658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1152.988170] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 1153.032890] 9pnet: Insufficient options for proto=fd 19:24:00 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x900, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:24:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x2000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1153.070505] 9pnet: Insufficient options for proto=fd 19:24:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400e2, 0x0) 19:24:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x7000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1153.165621] SELinux: duplicate or incompatible mount options 19:24:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xa, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:24:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x8cffffff, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:24:00 executing program 5: r0 = getpgrp(0x0) waitid(0x7, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) r4 = fork() ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000007c0)=ANY=[@ANYBLOB='g\x00'/11, @ANYRES32=r3, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) recvmsg$unix(r5, &(0x7f0000000700)={&(0x7f0000000240)=@abs, 0x6e, &(0x7f0000000800)=[{&(0x7f00000002c0)=""/60, 0x3c}, {&(0x7f0000000300)=""/183, 0xb7}, {&(0x7f00000003c0)=""/212, 0xd4}, {&(0x7f00000004c0)=""/55, 0x37}, {&(0x7f0000000500)=""/16, 0x10}, {&(0x7f0000000540)=""/45, 0x2d}], 0x6, &(0x7f0000000600)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xe8}, 0x22) clone3(&(0x7f0000000740)={0x220800, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x2a}, &(0x7f00000000c0)=""/123, 0x7b, &(0x7f0000000140)=""/157, &(0x7f0000000200)=[r0, r1, r2, r0, r4, r0, r0, r0], 0x8, {r6}}, 0x58) 19:24:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x8000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:24:00 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 18) 19:24:00 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_flowlabel\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xfff, 0x6800) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e23, 0x101, @ipv4={'\x00', '\xff\xff', @remote}, 0x800}, 0x1c) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000002ec0), 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_flowlabel\x00') r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_flowlabel\x00') ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000100)={0x43fb, 0x417, 0x2, 0x0, 0x0, [{{r4}, 0x9}, {{}, 0xfff}]}) sendmsg$inet6(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r0}}, './file0\x00'}) r6 = getpgrp(0x0) pidfd_open(r6, 0x0) ioctl$sock_SIOCSPGRP(r5, 0x8902, &(0x7f0000000200)=r6) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x88, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, @perf_config_ext={0x0, 0x401}, 0x0, 0xfff, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce}, 0x0, 0x4, 0xffffffffffffffff, 0x0) recvfrom$inet6(r1, &(0x7f0000002f00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) 19:24:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400e3, 0x0) 19:24:00 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x70, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000300), 0x2}, 0x0, 0x0, 0x0, 0x0, 0x8, 0x3, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffd) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffc, r1, 0x0) r3 = add_key$keyring(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff8) r4 = getpgrp(0x0) waitid(0x2, r4, 0x0, 0x8, 0x0) keyctl$KEYCTL_MOVE(0x1e, r3, r2, r1, 0x1) r5 = getpgrp(0x0) r6 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "6ae3a2279441c8bccb61a522f5e4e661ce0cb09305967cbd5b3e03bcee0579af6f2b79a27a599a8947acb47fc038d0c2a8bf68feedeeb2fcfcb3f785bb85aec9"}, 0x78bd, 0xfffffffffffffffd) stat(&(0x7f0000000380)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) keyctl$chown(0x4, r6, r7, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x3}, 0x0, 0x0, r6) pidfd_open(r5, 0x0) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x7, 0xfd, 0x64, 0x0, 0x0, 0x4, 0x80000, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x8, 0x80000000}, 0x1004, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x2}, r5, 0x1, r0, 0x8) r8 = getpgrp(0x0) r9 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000280), 0x6404c0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r9, @ANYBLOB="000000000000008d2400000000000000"]) pidfd_open(r8, 0x0) tgkill(r4, r8, 0x31) 19:24:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xb, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) [ 1153.331121] FAULT_INJECTION: forcing a failure. [ 1153.331121] name failslab, interval 1, probability 0, space 0, times 0 [ 1153.333705] CPU: 1 PID: 6992 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1153.335110] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1153.336807] Call Trace: [ 1153.337355] dump_stack+0x107/0x167 [ 1153.338109] should_fail.cold+0x5/0xa [ 1153.338921] ? ext4_find_extent+0xa3d/0xd30 [ 1153.339813] should_failslab+0x5/0x20 [ 1153.340591] __kmalloc+0x72/0x3f0 [ 1153.341306] ? lock_chain_count+0x20/0x20 [ 1153.342159] ext4_find_extent+0xa3d/0xd30 [ 1153.343083] ext4_ext_map_blocks+0x1c8/0x5b90 [ 1153.344131] ? mark_held_locks+0x9e/0xe0 [ 1153.345074] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1153.346293] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1153.347502] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1153.348548] ? trace_hardirqs_on+0x5b/0x180 [ 1153.349540] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1153.350588] ? finish_task_switch+0x126/0x5d0 [ 1153.351541] ? ext4_ext_release+0x10/0x10 [ 1153.352424] ? ext4_map_blocks+0x5e0/0x1970 [ 1153.353341] ? lock_release+0x6b0/0x6b0 [ 1153.354160] ? io_schedule_timeout+0x140/0x140 [ 1153.355141] ? perf_trace_ext4_es_lookup_extent_enter+0x450/0x450 [ 1153.356422] ? down_write+0xe0/0x160 [ 1153.357204] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1153.358227] ? perf_trace_ext4_es_lookup_extent_exit+0x459/0x700 [ 1153.359513] ext4_map_blocks+0x652/0x1970 [ 1153.360452] ? _down_write_nest_lock+0x160/0x160 [ 1153.361531] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1153.362555] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1153.363659] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 1153.364744] ext4_getblk+0x144/0x680 [ 1153.365599] ? ext4_iomap_overwrite_begin+0xa0/0xa0 [ 1153.366733] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1153.367761] ? __brelse+0x84/0xa0 [ 1153.368478] ? __ext4_new_inode+0x148/0x5400 [ 1153.369388] ext4_bread+0x29/0x1f0 [ 1153.370127] ext4_append+0x228/0x4e0 [ 1153.370922] ? ext4_move_extents+0x3270/0x3270 [ 1153.371864] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1153.372866] ext4_init_new_dir+0x25e/0x4d0 [ 1153.373735] ? ext4_init_dot_dotdot+0x610/0x610 [ 1153.374704] ext4_mkdir+0x3c1/0xb10 [ 1153.375467] ? ext4_rmdir+0xf70/0xf70 [ 1153.376268] vfs_mkdir+0x41f/0x660 [ 1153.377010] do_mkdirat+0x145/0x2a0 [ 1153.377762] ? user_path_create+0xf0/0xf0 [ 1153.378617] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1153.379714] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1153.380773] do_syscall_64+0x33/0x40 [ 1153.381541] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1153.382564] RIP: 0033:0x7f59f7910c27 [ 1153.383349] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1153.387110] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1153.388673] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 1153.390136] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1153.391603] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 1153.393049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1153.394504] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:24:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x9000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:24:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x300, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:24:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400e4, 0x0) 19:24:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xc0ed0000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:24:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x500, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:24:01 executing program 3: r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x0, 0x0) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x34, 0x0, 0x10, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x7fff}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x48010}, 0x4000000) r1 = getpgrp(0x0) waitid(0x0, r1, 0x0, 0x80000000, 0x0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) waitid(0x1, r3, &(0x7f0000000080), 0x1, &(0x7f0000000100)) ptrace$setsig(0x4203, r3, 0x5, &(0x7f00000001c0)={0x31, 0x4428, 0x20}) pidfd_open(r1, 0x0) ptrace$setsig(0x4203, r2, 0x0, &(0x7f0000000000)={0x41, 0x10001, 0x3ffc0}) 19:24:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xd5060000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:24:01 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 19) [ 1153.552211] FAULT_INJECTION: forcing a failure. [ 1153.552211] name failslab, interval 1, probability 0, space 0, times 0 [ 1153.554834] CPU: 1 PID: 7032 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1153.556277] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1153.558001] Call Trace: [ 1153.558563] dump_stack+0x107/0x167 [ 1153.559340] should_fail.cold+0x5/0xa [ 1153.560137] ? create_object.isra.0+0x3a/0xa20 [ 1153.561093] should_failslab+0x5/0x20 [ 1153.561890] kmem_cache_alloc+0x5b/0x360 [ 1153.562775] create_object.isra.0+0x3a/0xa20 [ 1153.563708] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1153.564768] __kmalloc+0x16e/0x3f0 [ 1153.565506] ext4_find_extent+0xa3d/0xd30 [ 1153.566388] ext4_ext_map_blocks+0x1c8/0x5b90 [ 1153.567334] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1153.568420] ? perf_trace_lock+0xac/0x490 [ 1153.569286] ? __lockdep_reset_lock+0x180/0x180 [ 1153.570248] ? ext4_ext_release+0x10/0x10 [ 1153.571116] ? ext4_map_blocks+0x5e0/0x1970 [ 1153.572013] ? lock_release+0x6b0/0x6b0 [ 1153.572838] ? perf_trace_ext4_es_lookup_extent_exit+0x459/0x700 [ 1153.574094] ? ext4_es_lookup_extent+0x48d/0xbe0 [ 1153.575087] ? perf_trace_ext4_es_lookup_extent_enter+0x450/0x450 [ 1153.576373] ? down_write+0xe0/0x160 [ 1153.577145] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1153.578179] ? perf_trace_ext4_es_lookup_extent_exit+0x459/0x700 [ 1153.579502] ext4_map_blocks+0x652/0x1970 [ 1153.580465] ? _down_write_nest_lock+0x160/0x160 [ 1153.581552] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1153.582580] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1153.583691] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 1153.584782] ext4_getblk+0x144/0x680 [ 1153.585641] ? ext4_iomap_overwrite_begin+0xa0/0xa0 [ 1153.586779] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1153.587830] ? __brelse+0x84/0xa0 [ 1153.588581] ? __ext4_new_inode+0x148/0x5400 [ 1153.589526] ext4_bread+0x29/0x1f0 [ 1153.590258] ext4_append+0x228/0x4e0 [ 1153.591053] ? ext4_move_extents+0x3270/0x3270 [ 1153.591979] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1153.592991] ext4_init_new_dir+0x25e/0x4d0 [ 1153.593851] ? ext4_init_dot_dotdot+0x610/0x610 [ 1153.594858] ext4_mkdir+0x3c1/0xb10 [ 1153.595602] ? ext4_rmdir+0xf70/0xf70 [ 1153.596413] vfs_mkdir+0x41f/0x660 [ 1153.597140] do_mkdirat+0x145/0x2a0 [ 1153.597916] ? user_path_create+0xf0/0xf0 [ 1153.598771] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1153.599858] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1153.600924] do_syscall_64+0x33/0x40 [ 1153.601688] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1153.602735] RIP: 0033:0x7f59f7910c27 [ 1153.603507] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1153.607279] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1153.608839] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 1153.610298] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1153.611763] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 1153.613220] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1153.614677] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 1153.672633] SELinux: duplicate or incompatible mount options [ 1166.753274] kmemleak: 44 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:24:22 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) clone3(&(0x7f0000000200)={0x40000100, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x25}, &(0x7f00000000c0)=""/145, 0x91, &(0x7f0000000180)=""/12, &(0x7f00000001c0)=[r0], 0x1}, 0x58) 19:24:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0xa000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:24:22 executing program 7: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000080)=0x90, 0x4) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_flowlabel\x00') pread64(r2, &(0x7f0000001100)=""/4095, 0xfff, 0x6800) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x4e23, 0x101, @ipv4={'\x00', '\xff\xff', @remote}, 0x800}, 0x1c) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000002ec0), 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_flowlabel\x00') r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net/ip6_flowlabel\x00') ioctl$FIDEDUPERANGE(r3, 0xc0189436, &(0x7f0000000100)={0x43fb, 0x417, 0x2, 0x0, 0x0, [{{r4}, 0x9}, {{}, 0xfff}]}) sendmsg$inet6(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="cf", 0xfffffdef}], 0x1}, 0x10044001) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {r0}}, './file0\x00'}) r6 = getpgrp(0x0) pidfd_open(r6, 0x0) ioctl$sock_SIOCSPGRP(r5, 0x8902, &(0x7f0000000200)=r6) perf_event_open(&(0x7f0000001d80)={0x4, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x9, 0x88, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, @perf_config_ext={0x0, 0x401}, 0x0, 0xfff, 0x0, 0x0, 0x401, 0x0, 0x0, 0x0, 0x0, 0x0, 0xce}, 0x0, 0x4, 0xffffffffffffffff, 0x0) recvfrom$inet6(r1, &(0x7f0000002f00)=""/4096, 0x1000, 0xcd08, 0x0, 0x0) 19:24:22 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 20) 19:24:22 executing program 3: getpgrp(0x0) r0 = getpgrp(0x0) r1 = accept(0xffffffffffffffff, &(0x7f0000000000)=@xdp, &(0x7f0000000080)=0x80) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r1, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x3}) pidfd_open(r0, 0x0) r2 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x1000000, 0x20010, 0xffffffffffffffff, 0x10000000) r3 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r3, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r3, 0x330b) syz_io_uring_submit(0x0, r2, &(0x7f0000000100)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd=r3, 0x0, 0x0, 0x0, {0x90c2}}, 0x7fffffff) waitid(0x1, r0, 0x0, 0x8, 0x0) 19:24:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x600, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:24:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xf6ffffff, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:24:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400e5, 0x0) [ 1174.459475] FAULT_INJECTION: forcing a failure. 19:24:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xffffe000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1174.459475] name failslab, interval 1, probability 0, space 0, times 0 [ 1174.462296] CPU: 0 PID: 7056 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1174.463729] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1174.465428] Call Trace: [ 1174.465980] dump_stack+0x107/0x167 [ 1174.466740] should_fail.cold+0x5/0xa [ 1174.467545] ? ext4_mb_new_blocks+0x64d/0x4890 [ 1174.468489] should_failslab+0x5/0x20 [ 1174.469275] kmem_cache_alloc+0x5b/0x360 [ 1174.470124] ext4_mb_new_blocks+0x64d/0x4890 [ 1174.471062] ? kasan_unpoison_shadow+0x33/0x50 [ 1174.472021] ? ext4_cache_extents+0x68/0x2d0 [ 1174.472922] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1174.473967] ? ext4_discard_preallocations+0xe10/0xe10 [ 1174.475051] ? ext4_ext_search_right+0x2e3/0xbd0 [ 1174.476035] ? ext4_inode_to_goal_block+0x320/0x430 [ 1174.477078] ext4_ext_map_blocks+0x1ec4/0x5b90 [ 1174.478038] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1174.479126] ? perf_trace_lock+0xac/0x490 [ 1174.479992] ? __lockdep_reset_lock+0x180/0x180 [ 1174.480954] ? ext4_ext_release+0x10/0x10 [ 1174.481810] ? ext4_map_blocks+0x5e0/0x1970 [ 1174.482699] ? lock_release+0x6b0/0x6b0 [ 1174.483530] ? perf_trace_ext4_es_lookup_extent_exit+0x459/0x700 [ 1174.484777] ? ext4_es_lookup_extent+0x48d/0xbe0 [ 1174.485774] ? perf_trace_ext4_es_lookup_extent_enter+0x450/0x450 [ 1174.487072] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1174.488140] ? perf_trace_ext4_es_lookup_extent_exit+0x459/0x700 [ 1174.489399] ext4_map_blocks+0x652/0x1970 [ 1174.490260] ? _down_write_nest_lock+0x160/0x160 [ 1174.491244] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1174.492167] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1174.493168] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 1174.494149] ext4_getblk+0x144/0x680 [ 1174.494920] ? ext4_iomap_overwrite_begin+0xa0/0xa0 [ 1174.495950] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1174.496887] ? __brelse+0x84/0xa0 [ 1174.497618] ? __ext4_new_inode+0x148/0x5400 [ 1174.498542] ext4_bread+0x29/0x1f0 [ 1174.499299] ext4_append+0x228/0x4e0 [ 1174.500090] ? ext4_move_extents+0x3270/0x3270 [ 1174.501041] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1174.502062] ext4_init_new_dir+0x25e/0x4d0 [ 1174.502941] ? ext4_init_dot_dotdot+0x610/0x610 [ 1174.503934] ext4_mkdir+0x3c1/0xb10 [ 1174.504700] ? ext4_rmdir+0xf70/0xf70 [ 1174.505523] vfs_mkdir+0x41f/0x660 [ 1174.506269] do_mkdirat+0x145/0x2a0 [ 1174.507047] ? user_path_create+0xf0/0xf0 [ 1174.507920] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1174.509019] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1174.510092] do_syscall_64+0x33/0x40 [ 1174.510872] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1174.511943] RIP: 0033:0x7f59f7910c27 [ 1174.512733] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1174.516589] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1174.518201] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 1174.519711] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1174.521209] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 1174.522712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1174.524221] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:24:22 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x2, 0x0) [ 1174.638804] audit: type=1400 audit(1667676262.234:12): avc: denied { checkpoint_restore } for pid=7066 comm="syz-executor.5" capability=40 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [ 1188.880567] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:24:44 executing program 7: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) io_setup(0x5, &(0x7f0000000080)=0x0) io_submit(r2, 0x1, &(0x7f00000008c0)=[&(0x7f0000000200)={0x0, 0x0, 0x5, 0x7, 0x0, 0xffffffffffffffff, &(0x7f0000000140)="ee", 0xd, 0x40}]) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1000028, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYRESHEX=0x0, @ANYBLOB="2c76657273696f6e3d3970323030302e4c2c6163636573733d757365722c00f219ff4012c0163805a1cf0dfce3901e1f3f6174c1989e64cccefb3b37b6f57c1fd54ddd5f42fb9b6d9e49e07bcf4b96e98f0528ab01f64046cf0e1a16b7b5314b1da43c2842a0c0f514366f9b8c49dcec0ba5a7a8b836b11067bf5d6ea29787cdfd1bb02ea9f776b7"]) sendmsg$inet(r1, &(0x7f0000000bc0)={&(0x7f0000000040)={0x2, 0x4e24, @loopback}, 0x10, 0x0, 0x0, &(0x7f00000005c0)=[@ip_tos_u8={{0x11}}], 0x18}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000000, 0x40010, r1, 0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x0) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(0xffffffffffffffff, 0x4018f50b, &(0x7f0000000000)={0x0, 0x40, 0x10000}) bind(r1, &(0x7f0000000380)=@vsock={0x28, 0x0, 0x2710}, 0x80) 19:24:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0xb000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:24:44 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 21) 19:24:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400e6, 0x0) 19:24:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x700, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:24:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xffffff8c, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:24:44 executing program 5: getpgrp(0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) waitid(0x1, r0, 0x0, 0x40000000, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000080)={'\x00', 0x9, 0x1f, 0xfffffff9, 0xf932, 0x6}) 19:24:44 executing program 3: r0 = getpgrp(0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r1, 0x330b) fcntl$getown(r1, 0x9) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2, 0x8, 0x2, 0x3, 0xc32, r0}) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:24:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xfffffff6, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1196.929554] FAULT_INJECTION: forcing a failure. [ 1196.929554] name failslab, interval 1, probability 0, space 0, times 0 [ 1196.932206] CPU: 1 PID: 7112 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1196.933674] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1196.935453] Call Trace: [ 1196.936021] dump_stack+0x107/0x167 [ 1196.936794] should_fail.cold+0x5/0xa [ 1196.937598] ? create_object.isra.0+0x3a/0xa20 [ 1196.938561] should_failslab+0x5/0x20 [ 1196.939362] kmem_cache_alloc+0x5b/0x360 [ 1196.940242] create_object.isra.0+0x3a/0xa20 [ 1196.941173] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1196.942254] kmem_cache_alloc+0x159/0x360 [ 1196.943154] ext4_mb_new_blocks+0x64d/0x4890 [ 1196.944122] ? kasan_unpoison_shadow+0x33/0x50 [ 1196.945087] ? ext4_cache_extents+0x68/0x2d0 [ 1196.946024] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1196.947119] ? ext4_discard_preallocations+0xe10/0xe10 [ 1196.948261] ? ext4_ext_search_right+0x2e3/0xbd0 [ 1196.949266] ? ext4_inode_to_goal_block+0x320/0x430 [ 1196.950327] ext4_ext_map_blocks+0x1ec4/0x5b90 [ 1196.951309] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1196.952435] ? perf_trace_lock+0xac/0x490 [ 1196.953326] ? __lockdep_reset_lock+0x180/0x180 [ 1196.954321] ? ext4_ext_release+0x10/0x10 [ 1196.955212] ? ext4_map_blocks+0x5e0/0x1970 [ 1196.956153] ? lock_release+0x6b0/0x6b0 [ 1196.957007] ? perf_trace_ext4_es_lookup_extent_exit+0x459/0x700 [ 1196.958314] ? ext4_es_lookup_extent+0x48d/0xbe0 [ 1196.959336] ? perf_trace_ext4_es_lookup_extent_enter+0x450/0x450 [ 1196.960686] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1196.961761] ? perf_trace_ext4_es_lookup_extent_exit+0x459/0x700 [ 1196.963063] ext4_map_blocks+0x652/0x1970 [ 1196.963969] ? _down_write_nest_lock+0x160/0x160 [ 1196.964984] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1196.965943] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1196.966969] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 1196.967983] ext4_getblk+0x144/0x680 [ 1196.968781] ? ext4_iomap_overwrite_begin+0xa0/0xa0 [ 1196.969832] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1196.970790] ? __brelse+0x84/0xa0 [ 1196.971544] ? __ext4_new_inode+0x148/0x5400 [ 1196.972492] ext4_bread+0x29/0x1f0 [ 1196.973258] ext4_append+0x228/0x4e0 [ 1196.974057] ? ext4_move_extents+0x3270/0x3270 [ 1196.975034] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1196.976104] ext4_init_new_dir+0x25e/0x4d0 [ 1196.977011] ? ext4_init_dot_dotdot+0x610/0x610 [ 1196.978018] ext4_mkdir+0x3c1/0xb10 [ 1196.978808] ? ext4_rmdir+0xf70/0xf70 [ 1196.979646] vfs_mkdir+0x41f/0x660 [ 1196.980422] do_mkdirat+0x145/0x2a0 [ 1196.981195] ? user_path_create+0xf0/0xf0 [ 1196.982074] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1196.983175] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1196.984290] do_syscall_64+0x33/0x40 [ 1196.985075] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1196.986150] RIP: 0033:0x7f59f7910c27 [ 1196.986939] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1196.990848] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1196.992474] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 1196.993993] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1196.995531] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 1196.997042] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1196.998555] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 1197.010002] SELinux: duplicate or incompatible mount options [ 1211.363257] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:25:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xedc000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:25:07 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)=ANY=[@ANYBLOB="010000fb000018b6ff7f000011f1d3839a8eb904dcafba92377040fe8de138d2a6cb100cedf605285291", @ANYRES32=r0, @ANYBLOB]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000)=0x81a, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmmsg$inet(r1, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32=r3], 0x38}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000200)=[{{&(0x7f0000000080)=@un=@abs, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)=""/104, 0x68}], 0x1}, 0x8001}], 0x1, 0x20, &(0x7f0000000240)={0x0, 0x3938700}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r4, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="1400000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32], 0x38}}], 0x1, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x4) 19:25:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400e7, 0x0) 19:25:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x10000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:25:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x8ef, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:25:07 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 22) 19:25:07 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='blkio.bfq.io_queued_recursive\x00', 0x0, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x40482, 0x0) fcntl$lock(r1, 0x5, &(0x7f0000000040)={0x0, 0x0, 0x1, 0x7fff, r0}) 19:25:07 executing program 3: r0 = getpgrp(0x0) pidfd_open(r0, 0x0) prctl$PR_SCHED_CORE(0x3e, 0x40000002000005, r0, 0x7, 0x0) r1 = getpgrp(0x0) setpgid(r1, r0) waitid(0x2, r1, 0x0, 0x8, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$BTRFS_IOC_DEFRAG(r2, 0x50009402, 0x0) [ 1220.245610] FAULT_INJECTION: forcing a failure. [ 1220.245610] name failslab, interval 1, probability 0, space 0, times 0 [ 1220.248368] CPU: 0 PID: 7143 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1220.249948] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1220.251910] Call Trace: [ 1220.252673] dump_stack+0x107/0x167 [ 1220.253714] should_fail.cold+0x5/0xa [ 1220.254805] ? ext4_mb_new_blocks+0x2138/0x4890 [ 1220.256145] should_failslab+0x5/0x20 [ 1220.257153] kmem_cache_alloc+0x5b/0x360 [ 1220.258105] ext4_mb_new_blocks+0x2138/0x4890 [ 1220.259161] ? kasan_unpoison_shadow+0x33/0x50 [ 1220.260214] ? ext4_cache_extents+0x68/0x2d0 [ 1220.261215] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1220.262385] ? ext4_discard_preallocations+0xe10/0xe10 [ 1220.263588] ? ext4_ext_search_right+0x2e3/0xbd0 [ 1220.264694] ? ext4_inode_to_goal_block+0x320/0x430 [ 1220.265835] ext4_ext_map_blocks+0x1ec4/0x5b90 [ 1220.266903] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1220.268121] ? perf_trace_lock+0xac/0x490 [ 1220.269070] ? __lockdep_reset_lock+0x180/0x180 [ 1220.270123] ? ext4_ext_release+0x10/0x10 [ 1220.271076] ? ext4_map_blocks+0x5e0/0x1970 [ 1220.272083] ? lock_release+0x6b0/0x6b0 [ 1220.273005] ? perf_trace_ext4_es_lookup_extent_exit+0x459/0x700 [ 1220.274379] ? ext4_es_lookup_extent+0x48d/0xbe0 [ 1220.275482] ? perf_trace_ext4_es_lookup_extent_enter+0x450/0x450 [ 1220.276909] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1220.278045] ? perf_trace_ext4_es_lookup_extent_exit+0x459/0x700 [ 1220.279432] ext4_map_blocks+0x652/0x1970 [ 1220.280395] ? _down_write_nest_lock+0x160/0x160 [ 1220.281500] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1220.282554] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1220.283645] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 1220.284748] ext4_getblk+0x144/0x680 [ 1220.285600] ? ext4_iomap_overwrite_begin+0xa0/0xa0 [ 1220.286722] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1220.287747] ? __brelse+0x84/0xa0 [ 1220.288549] ? __ext4_new_inode+0x148/0x5400 [ 1220.289556] ext4_bread+0x29/0x1f0 [ 1220.290357] ext4_append+0x228/0x4e0 [ 1220.291215] ? ext4_move_extents+0x3270/0x3270 [ 1220.292274] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1220.293389] ext4_init_new_dir+0x25e/0x4d0 [ 1220.294357] ? ext4_init_dot_dotdot+0x610/0x610 [ 1220.295422] ext4_mkdir+0x3c1/0xb10 [ 1220.296275] ? ext4_rmdir+0xf70/0xf70 [ 1220.297172] vfs_mkdir+0x41f/0x660 [ 1220.297992] do_mkdirat+0x145/0x2a0 [ 1220.298828] ? user_path_create+0xf0/0xf0 [ 1220.299802] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1220.300994] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1220.302165] do_syscall_64+0x33/0x40 [ 1220.303015] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1220.304190] RIP: 0033:0x7f59f7910c27 [ 1220.305071] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1220.309236] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1220.311015] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 1220.312673] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1220.314335] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 1220.316014] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1220.317692] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:25:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x8000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:25:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x900, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:25:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x20000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:25:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400e8, 0x0) 19:25:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xa00, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:25:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x20100000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:25:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xe0ffff00000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:25:08 executing program 5: r0 = getpgrp(0x0) pidfd_open(r0, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:25:08 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 23) [ 1220.563327] FAULT_INJECTION: forcing a failure. [ 1220.563327] name failslab, interval 1, probability 0, space 0, times 0 [ 1220.565865] CPU: 1 PID: 7195 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1220.567304] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1220.569103] Call Trace: [ 1220.569660] dump_stack+0x107/0x167 [ 1220.570436] should_fail.cold+0x5/0xa [ 1220.571230] ? create_object.isra.0+0x3a/0xa20 [ 1220.572188] should_failslab+0x5/0x20 [ 1220.572983] kmem_cache_alloc+0x5b/0x360 [ 1220.573826] create_object.isra.0+0x3a/0xa20 [ 1220.574730] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1220.575791] kmem_cache_alloc+0x159/0x360 [ 1220.576653] ext4_mb_new_blocks+0x2138/0x4890 [ 1220.577602] ? kasan_unpoison_shadow+0x33/0x50 [ 1220.578542] ? ext4_cache_extents+0x68/0x2d0 [ 1220.579448] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1220.580519] ? ext4_discard_preallocations+0xe10/0xe10 [ 1220.581622] ? ext4_ext_search_right+0x2e3/0xbd0 [ 1220.582594] ? ext4_inode_to_goal_block+0x320/0x430 [ 1220.583674] ext4_ext_map_blocks+0x1ec4/0x5b90 [ 1220.584679] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1220.585808] ? perf_trace_lock+0xac/0x490 [ 1220.586713] ? __lockdep_reset_lock+0x180/0x180 [ 1220.587728] ? ext4_ext_release+0x10/0x10 [ 1220.588614] ? ext4_map_blocks+0x5e0/0x1970 [ 1220.589552] ? lock_release+0x6b0/0x6b0 [ 1220.590374] ? perf_trace_ext4_es_lookup_extent_exit+0x459/0x700 [ 1220.591623] ? ext4_es_lookup_extent+0x48d/0xbe0 [ 1220.592582] ? perf_trace_ext4_es_lookup_extent_enter+0x450/0x450 [ 1220.593828] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1220.594839] ? perf_trace_ext4_es_lookup_extent_exit+0x459/0x700 [ 1220.596065] ext4_map_blocks+0x652/0x1970 [ 1220.596913] ? _down_write_nest_lock+0x160/0x160 [ 1220.597845] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1220.598755] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1220.599719] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 1220.600663] ext4_getblk+0x144/0x680 [ 1220.601400] ? ext4_iomap_overwrite_begin+0xa0/0xa0 [ 1220.602379] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1220.603263] ? __brelse+0x84/0xa0 [ 1220.603966] ? __ext4_new_inode+0x148/0x5400 [ 1220.604842] ext4_bread+0x29/0x1f0 [ 1220.605570] ext4_append+0x228/0x4e0 [ 1220.606318] ? ext4_move_extents+0x3270/0x3270 [ 1220.607221] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1220.608229] ext4_init_new_dir+0x25e/0x4d0 [ 1220.609079] ? ext4_init_dot_dotdot+0x610/0x610 [ 1220.610034] ext4_mkdir+0x3c1/0xb10 [ 1220.610766] ? ext4_rmdir+0xf70/0xf70 [ 1220.611555] vfs_mkdir+0x41f/0x660 [ 1220.612282] do_mkdirat+0x145/0x2a0 [ 1220.613004] ? user_path_create+0xf0/0xf0 [ 1220.613849] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1220.614889] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1220.615948] do_syscall_64+0x33/0x40 [ 1220.616691] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1220.617737] RIP: 0033:0x7f59f7910c27 [ 1220.618473] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1220.622211] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1220.623754] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 1220.625195] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1220.626632] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 1220.628084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1220.629524] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 1220.664892] SELinux: duplicate or incompatible mount options [ 1234.377500] kmemleak: 38 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:25:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x100000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:25:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 24) 19:25:31 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)=ANY=[@ANYBLOB="010000fb000018b6ff7f000011f1d3839a8eb904dcafba92377040fe8de138d2a6cb100cedf605285291", @ANYRES32=r0, @ANYBLOB]) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x41, &(0x7f0000000000)=0x81a, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) sendmmsg$inet(r1, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32=r3], 0x38}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000200)=[{{&(0x7f0000000080)=@un=@abs, 0x80, &(0x7f0000000100)=[{&(0x7f0000000180)=""/104, 0x68}], 0x1}, 0x8001}], 0x1, 0x20, &(0x7f0000000240)={0x0, 0x3938700}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r4, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="1400000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32], 0x38}}], 0x1, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x4) 19:25:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400e9, 0x0) 19:25:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x8cffffff, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:25:31 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x2, 0x5, 0x1, 0x0, 0x0, 0x5, 0x18510, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xb8a4, 0x0, @perf_config_ext={0xc5, 0x6}, 0x202, 0x7, 0x2, 0x6, 0x2, 0x91db, 0x3, 0x0, 0x1f, 0x0, 0x7f}, r0, 0xe, 0xffffffffffffffff, 0xa) waitid(0x2, r0, 0x0, 0x8, 0x0) fcntl$getown(0xffffffffffffffff, 0x9) r1 = accept(0xffffffffffffffff, &(0x7f0000000780)=@xdp, &(0x7f0000000800)=0x80) preadv(r1, &(0x7f00000008c0)=[{&(0x7f0000000840)=""/35, 0x23}, {&(0x7f0000000880)=""/7, 0x7}], 0x2, 0x2, 0x668000) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x8, 0x3) 19:25:31 executing program 3: ioctl$FAT_IOCTL_SET_ATTRIBUTES(0xffffffffffffffff, 0x40047211, &(0x7f0000000000)=0x13) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000001c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xf5c}}, './file0\x00'}) [ 1244.217449] FAULT_INJECTION: forcing a failure. [ 1244.217449] name failslab, interval 1, probability 0, space 0, times 0 [ 1244.220261] CPU: 0 PID: 7216 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1244.221726] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1244.223488] Call Trace: [ 1244.224075] dump_stack+0x107/0x167 [ 1244.224867] should_fail.cold+0x5/0xa [ 1244.225695] ? __es_insert_extent+0x3a9/0x12f0 [ 1244.226681] should_failslab+0x5/0x20 [ 1244.227507] kmem_cache_alloc+0x5b/0x360 [ 1244.228417] __es_insert_extent+0x3a9/0x12f0 [ 1244.229408] ext4_es_insert_extent+0x2dc/0xbb0 [ 1244.230431] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 1244.231382] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1244.232467] ? perf_trace_ext4_es_lookup_extent_exit+0x459/0x700 [ 1244.233776] ext4_map_blocks+0x8e1/0x1970 [ 1244.234673] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1244.235627] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1244.236660] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 1244.237686] ext4_getblk+0x144/0x680 [ 1244.238484] ? ext4_iomap_overwrite_begin+0xa0/0xa0 [ 1244.239546] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1244.240520] ? __brelse+0x84/0xa0 [ 1244.241268] ? __ext4_new_inode+0x148/0x5400 [ 1244.242209] ext4_bread+0x29/0x1f0 [ 1244.242977] ext4_append+0x228/0x4e0 [ 1244.243779] ? ext4_move_extents+0x3270/0x3270 [ 1244.244775] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1244.245818] ext4_init_new_dir+0x25e/0x4d0 [ 1244.246719] ? ext4_init_dot_dotdot+0x610/0x610 [ 1244.247729] ext4_mkdir+0x3c1/0xb10 [ 1244.248535] ? ext4_rmdir+0xf70/0xf70 [ 1244.249379] vfs_mkdir+0x41f/0x660 [ 1244.250147] do_mkdirat+0x145/0x2a0 [ 1244.250933] ? user_path_create+0xf0/0xf0 [ 1244.251820] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1244.252946] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1244.254049] do_syscall_64+0x33/0x40 [ 1244.254843] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1244.256142] RIP: 0033:0x7f59f7910c27 [ 1244.256940] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1244.261491] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1244.263109] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 1244.264636] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1244.266135] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 1244.267639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1244.269155] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 sendmmsg$inet6(r0, &(0x7f0000003000)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000200)="8e609e829bcf4082532e465f8381a2dc23fba4dea551018c0e4b6c17f90d937189cf2d771a69cd34ec258b956702290bdfd0e2db91c3c96e08b59b987daad293383f891ad49b45dd4a62aeb6cd607d346c501937425b305c0e23474f6c892532e0b5d8037e56dd072b4fc17731204a334441a4d1d222aa1b0299a6406078c302d4571c757c4e14fbc3e736e42a0af67132a85637334a5648f65965b2399df47da5e2e8b92ff537d249a1494244895568b08a02b0ce671dcc23f37bafedf3744652903a", 0xc3}, {&(0x7f0000000300)="bc99ad8fdaa4f6f5e016237416c879759c578b3b13b4f427b223715d9c2a3f19475e1e7fd1aa785cf381a7121970", 0x2e}, {&(0x7f0000000340)="43c6b285487e6a39b071d43ae8152b5a93", 0x11}], 0x3, &(0x7f00000003c0)=[@dstopts={{0x58, 0x29, 0x37, {0x2b, 0x7, '\x00', [@jumbo={0xc2, 0x4, 0x3f}, @calipso={0x7, 0x30, {0x2, 0xa, 0x5, 0x7, [0x20, 0x1000, 0x4, 0x5, 0x9]}}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x9}}], 0x70}}, {{0x0, 0x0, &(0x7f0000000840)=[{&(0x7f0000000440)="5d8865bd64c4016d57518b9e46fbea85166f85aaf268b777576cd3d7722922c130176fecaf1d010fae2e425b954937fa90c7e5d564111dbd09510c5322eca460399f6b6a09225c13eb92", 0x4a}, {&(0x7f00000004c0)="ba5eee8da52c23145b01bdff6b70f8b6ac575221a0e03ccebdd8363d4a37ddab5565bc1e8f439b55be7b2c5875a7912acd52cfb5236956c13a2cd328678ee372e1f377b61b6480a535b618d2931364962cbaa894cabd1e160141afac1827ef03c6987045eef116c1058533792b315e635ad14f9cd85dba53e77f8df847c3f365c72d663d1e24e471a8f199625222c11464f921e769381245249887b8bc654bd44ed19abc5cde0683a867507b6abaac0944910d2591a6a811689d5f92079361186f4b255ffa4bf31d02469c3c98d3decc8c5a6e06b94ca8", 0xd7}, {&(0x7f00000005c0)="5dc959f8e122de401ccec388f9bcdc951b797c622e8020df9ffcb9d2c5a547ecaf81d2c01408be85220a0c33a3a9933c31ae306fcb1c86712b4e0ad999732e93441830c87f1bfd", 0x47}, {&(0x7f0000000640)="47d2c0f2a7c0568d1b51622c6ccc96dc69c287dcf9904d4f0390aa2bd00db34779253eaeddb0a8223d6251caa9c51e81ad8d9728fc6ce96229db09bdfbdef44589486301ffbb70a5e4eb71914d09dcf99a56a1a0c4b5539a97f85551de0abf42111eaf4b8e5d19bcb4e070833f6c245c1d34475888716b0efeaaadfd2819ed48998daa70e24fd7a0001b83cba5f94af7b0dd86199d1927f08cad805f8e8c10775f41177c4c51b38bec9bf7931853b9e1e22ba06cc93e0312b334bdeb2b6e4779593b33a9c22ea1279b5099b4e8f73922cb2f731f11e822bda520053e", 0xdc}, {&(0x7f0000000740)="074cbb7db6131e8305a473b7f1d308e2aa6fc99867ab00948339ceb5c6070b879bd4b5cc012aa6eab1eb073aa83ebe2cdb4b3381def3b66e84cf76e6ac64675d5ec23e2799fab69a9f5c56b396d0314752b3e32f610bf19b3aa2f63a0b289753c3add0a1f22ab96c55d32192b6154d009425c61620d936f8bbdcc196c6f609286c3d36ab601cf10ec842292222a4adc0e2ab68e0ea776186804a98535177b7223fc19eda7c0fa044fe216240dab7d0aeb806b8a4abb191fbf0c8f01f4a63163e38e8c69f8b9ed0935321ea11db30dd29e8d51a95fffcda49fa4ee000bec17f91", 0xe0}], 0x5, &(0x7f00000008c0)=[@flowinfo={{0x14, 0x29, 0xb, 0x4}}, @rthdrdstopts={{0x50, 0x29, 0x37, {0x2f, 0x6, '\x00', [@calipso={0x7, 0x30, {0x0, 0xa, 0x81, 0xff80, [0xb7, 0x96, 0x20, 0x2, 0x3]}}]}}}, @hopopts={{0x130, 0x29, 0x36, {0xb8, 0x22, '\x00', [@pad1, @padn={0x1, 0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x81, 0xeb, "e7fef7068c0363163187e46e86a9386d5f715e711bf23b5386568dc29e3ca0cba96e13c07c54e65d9c4644d0856fd19c1e533d90b2d9294767e6b8bde02fc3140c3fee03938de5912fc413a5f069401158ed54f32f57f53a08ea16be9a1f83c3e39b63fc179538cfcc58c7d6e9f9036dda2a203cb8ab15370069b9a3662236dfdb3a816c54400fd98f8a666441f16b2a4b763cf0e6f01f3b078565235d1596fedbbe63402ae5dcaf0b4c1f25bac9719effe272703ad396ef3e5bdc62a719ebe77910b2c9e0d07a657487eb5035ae52f03af9b0b8d5e0ef53b3c5711a3707fe9c259099a57af5da4b0797cf"}, @generic={0x1, 0x13, "04c6b068ef6b7c1b261e91eaaf0b9443811211"}, @ra={0x5, 0x2, 0x7}]}}}, @rthdrdstopts={{0x20, 0x29, 0x37, {0x16, 0x0, '\x00', [@pad1, @enc_lim={0x4, 0x1, 0x1}]}}}, @rthdr_2292={{0x68, 0x29, 0x39, {0x2b, 0xa, 0x1, 0x3, 0x0, [@private2={0xfc, 0x2, '\x00', 0x1}, @loopback, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @dev={0xfe, 0x80, '\x00', 0x43}, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}]}}}], 0x220}}, {{&(0x7f0000000b00)={0xa, 0x4e24, 0x1, @loopback, 0xb37}, 0x1c, &(0x7f0000001b40)=[{&(0x7f0000000b40)="1da78c946a58e5a06e4bf28f564fd68e6ce03589b9403bfd178a93da5fdd13a1720178757cad4d0f3bea82554fbaad536e99e19da6d2cba3e76fdc84e396e1962f10daf74d259d4de5c92ec5fec8920140bc2a41e88c9ca8e3078ef4a20ab3d7985b15e01f09632b14128920c80174db4cd4e196ffc9c46d48c56df481024c7d264f5b240bcddf12a4e02e137a078e65a935ea140619a0d7fd73686878483cf2b82a0795c6ba7d2ad2f3eb63ab23452836360dd8c9ddb8a4a095916a3d9449e36c3d9e2be3da920e03ba6d81005f16f235a15690de45d8386fcb91f6e6b4c989cd72e5d5dccf18bb6a4739bba53b9c9182fa7855ce071c2fb3c5e4b794f8680ec67d9f1760ca31ffabfbea5f4f020495cdde24e07bc8f42ce43ed06161f26d29cbfd930eb300a722b5d56bc39d73ea528f7694055b0ddc1122e0dbec9661129ba861c83893e0dbb6baa50afc08a7797df92b2770301cf2f515bcb328c86ca3bd217c75d556208d0662866db02b82e6ee5904af56f0f898ed9278537b8bf34ceb173cbbd2b63ad149d26b22828b7fde0ae0677a4000bad92b31c99bf884190771d71a70bdaaf658fcb4601b815360c14ca5820bd70f2b2e041523299ab59b5e3ed9ef0ceec81c907d15bbcd9968dabada7c12b794052ee12adeb3941fdcf0c02af7fc51be7f4ac2f45f8d5c7ba6f2480c0adf84095235eeef206b8ecf887b478acee3cfe4607edacb6dab53ee6771d97f70f8f89db30be650bee4be1c1f2a9c63cae7aa28d136db5d7453b541811e96c625464c72c3297b91e76149ba7830fedd3fe1e185f103dd336f303c66f633c81e1fcc863fe33cfe1302dc5540572f61972485c091c815bd6140074c09779ffa109e57062e16921da490f561cc8d3e2458efd27a2c033d07d4d715cea3353946ba84f9d962a482deb9b9aff006196d160d1bbb5ec8669e08bff5608e99c0171a482e015b5949469e3b034254be8b07385aa7ba622ae0735742179f43f29b2a76aa13ba860bb88c8ad94383af4e9bb557e129d737c361e440860a0dc70e276b566960e11058d82022bf67c7f6d5c4e2e4013711754ac3d060c1e30ccf39f3cda37ec0dcbc98c218237b61fe159082b05445bd0e23db77461ae90a2b66be7c351cd2042077896da96e4a2805499bf64ba764390b1c2842dbe5e6d9201ceff515c280d7b737b08c0e3391f953e8d05f5f418f9cbee3e609143baa0eec3ba5425bc42e7548663b59bd42a19f1168adfbe4c9c60d3265ba2fbeb4d379fbb8fe407791b3cf84d8d63ae04e2ab4b302640448d4ee1c4d316d438038985fc3acf9ad92ea1039422b8ee558931d7ba888570664d53cc4a3d7b279d64d00c271f2804071f5915f571152227960e9bb6a1acee5e8168ee6ce8d3c4689d55d4466063bce79c03848a418377d3b10724fa5054b272fdc2d83d09fba4e311cd72082494935862e898342e98576f2d476e40ca685d5510c7d6dccca84b5529639362e987e6b3d8bd15874a328095971f89d9e4b42af3c6013cf56dff7d32f9dcdd88581ef8d3f58b244be156f5e31cb055268efa56a3d9f9164a79c972e67daa03c4c42504238deb187945c97f2f064fa8ecc085acfdfbf8e1620703871351ab6f45553eacb92abef0d59a529e3ab4f9b34c3b6302f3e55d095b009c9da1713be5bf119f897cd67f3bba28c15a941933a75b40403280e2a0e96f9d3f4a4a2b9d424c7b200f700747494cad2ed44967bdef6233e80be64cae564d983158f2a4d38ff890e50082ca39a87c03032be24438e0d356c1fa9e587dbf4a76c7fd685fa05d2de3fc66342770a2fde29e801ec6c20197441d4516de0d644e66dc9f8cd35ec1528ff42af4cfb1f38f3d882103f2bd9bce67d3334c31eb4a98f38050c49df7b0564ad72ae05a6c0f5dfaeb817f6ef0595ce5b45d272408fc4b909d93fbff2af1121a2e3720ebb5f6d20405eaf52e23b9f52ddc401977d9bc0ab70d4de0cd96f25f58b8590ecb2c4af8ea9dee1e08043bc3ef0493673f6e5fb2981e704c89128bb51b3ac46f2bf2d88cc6096d70da80c1244c27857d95c04b29f899629e5eca226b059475fed3da057fd342db2e74359e68d75ade4c0c781a6f98402acf86af5d9ae227ff8501899693cb0bdf5de5502eb01ee1299dc1abfe8b92d74b2f7bda252b92f1ab193f6c01d203551d869a276ae5b35452a397f3bae0690a3bf4eed2e920cf4814647ff3f2e5638904358b7f15630f7e42ac5dbe2eec5301e0ce69c703fc2214cadf4fb6659c2c7b5401cbc2f210bb0d4a18b332991949afce934cd0f88de1890cb00fcc4d2ae3e7fcc1435d7bbb7a677347f8c292c38a5f5b1468c186a37d148018c68d61063d3792e4f04760e70383bc1f1ff811a8f857d0e7fad58c93e2e7e888e253aa31098e018d0cee490abf61de9e58323d424648ffeb2ade559549404b0368ae4990f377b868edf7a6f2f0b29271e7c54c0c835a663cd9d38af3978404090afd4da4b2268aefc949eb990df51be4d20ad4a73068ad5099db1f304fa85e000d0d66275ced7b54632325656bd5829dca28cbaf114daf3923ec73d605b2c469ead130581f4d53a3b2ce352d08cb3e6112c6419b16bc8bb9090b67a6581ff10ce6062a21ef7ef434f75a9a6ace1ca3235cff00dc6419d3b3b228e0d60d1131718956208bb7d9ce95554e784c9b36afeacd740aa4077374d01004bffbbfa56c4309ec41c05bab635dd1f48fee76b050b1f4112654869e0c30dcb0adabbe3e64068b1f561c9479d74fd844327248300f0c91eeaf4adead89f0b7fdf05338e692ca545f044148214e2e0ed4c383619969c2ed24b8f09e3168760fd0570fab59c15d9e22ce36aa71786e3105a76a083aeb43676aafe5c322731402450ef6c3c25437d7aa97aab0ade977d15aff5b67d525e3d048375eb0bf8bda2e858e3b09e1c45667cf98aef1fc6c137ec2455b30e40ed0d1f530d8a83a1cea430069274508403feab96a1c96f60a710937bb768771adc2b8d481cd092a9e600f2c763d6c6935e28f5ec1043171907deb1d1ea43a6fb4c96544469995e3dead784e7f3794bfab1feec0596e3d0bb8f04f3567cf69f241c9f138c894c23c79cd24e5f0b203419f907869ad42cfea9fd803dec158a90847174914289fbc631d1410d0c2140b54f01ec8df198322db6ecd5e23b97acaac3e8b9ce7128e90a335a6ef95783097e1a220504e3af628311668cd60b75a835768d155bfcbb69e8b596343cd998a41e0b3dda711abb963c4bf8ff24b5fce68a260ac7a14fcdde3a089045636f048abb2e88e9219d92ac6692869c1c5788efdac53ac1bb3cc2c09582935f6f9b5ecef34ed19ce2f99f30f2329d6242ea9771c60ed224acf509a754446944c28780b2ee581aac02f0bdeba748ef1833481e202eef6f00b5afde241e0bab45a6ef314570ed9afaaa5ac55e6f987817bad7b77f2c310bdd6205b702ac8c4c20bb6dbcfdf6b0f37c02b5ab813b6717117cf40bedeb664ec8f7936116c939e51f0e4a4de79ea79d07d69afe0697af87262891d6d5aab3fcd82d383110697ab8ec20e2f691036ef4867dea76e39f3f117ab7f73fef0e8a3a63176a2c1843471f3197b1c6588e76de3e0abcc503065cb31b7764fe1ca50fd45bc465c7a56fdc5677de2ae88b4fb7cc4fb7e56350f21ce97e919ba51d20575c5b34b0a676c3eef284a28c523d8bef9f1ced9ea769d71c66a4bae53be17da7854747e055d2572372c2b33256d4970a8b4ccd26a01386ecc27ff4b83dfe044d951f2f77dbc9e365ead87117f9bc3c7356ecfa409efdebdf42976afca240865dfbb94db7e449ff3d3da91e4d4c08043030b67304cf2662539ddf9c73d63417d2dc80c51e853e2a226809d9dfcad281498f43b508d7782fd01796f1f98df4e2eb3ef14c40345c4382860b0d1c0a21cf5bb2e8dec41b02cbf97fab439cd996b61f0e071307379aab3c115fdac21874080892c0feec962ac240c75c1ead3c56dd00ea708193b88b34d79dc02899a5b36ca6fc624c5d98f45b5bb139b376d7934e37709ac1e0cf6d844c8ae2d515a52438435c613ee4132a87297ac98f173587b41804fa18a8078f1e6d50a37e528a59edba81f7610277921d50229677af19e0faa2d12c9b9b05db1c163225eef843f82c8d37b6bcc224425b6a01072ffa06d38276341129bc0034807f3fb132c9ca958f57faddb3ede7d67b9ca08093b6be1216d655dcac7dab246acc975f661d25c58c317ede71820a2d871a3b9b52f700f9c1f14a45f3942cf584db16bd85223ffee27ce5e84c129ea4f5bc9a41e3c59b3752da3915ee95c7c78e171a3a18ff99cf47a99b10bdbf887301c24d8d54e5b003da56d18a545f026064a760d5a76c94dafe7b08c10b7f9a503bbbfdc652fe6e4f67687f2a9a7e6d026e1347d11ba907da0243beed8538c36ead95c741da1505b4af72a774cb6bfc5671a75a117a5670c4fe93570fb6deac0eebd288c8087c6f2f69c215465c29a8e66e74c701c0603a6897c7f28912ffebf7f70594c4c19416645088e86b676338e7304eeea394813891c2219222b0d025d750e724f9976daa473d149e41bd09bf3ffaed5e53b3ea8a561da12323034d9032102c4c8c17a41b29122151ae564c4ced9272f2adb24bb43c6c17dd4485929118d5c77381b92763c55bdd3633a0305c9de13265b98e2fcda0688391ac19bdbb2a1a2cf7b6adef33b0a1242a602f43fdb29669cc266d1fb7314d6a9a87922bd832317c3d51cf356077c63c6d540140dcded3c2c70ae25d1f3eab1a515eeeb58039fbeebe8a6ef440bef9104bd2f5bcd26faabff4a104f2890dbc4233a5616295bf97380379bfb7ad4ec4e804d8a36f6ae0e58993b061ad30dbd6652462a3f41d034120ad7b7797f489a00861b469e16d6f4482e76ad966b94ea7adea274f7b8ec010ab177dbbca09ecaac71babcbb75f4445a08ba24c21c79802bf0b0044349bdd8f1c84d603cccb85f8eecebfbe0828ac4943513b845a9d47b649d80d707a8fa758947a22a7b91f36b3a128060085c712971478a54a84bdf21c56bae9208807d83a82b2f96f4d42e377bd5f3d29c5e226f6b28b5dd4d2b4bfe21f029be3397084cdd1051e1e6d18792297af8e1bbf215c0d473ac3740e3342f4ab25b9669fe4d19a6d03aacf7e957219e42f3ff4b67d0f511528d78a08c38768952008917d30d432f84c4887b4f664638ecc870563c2fa67f70eabe55392abc9cda910583ebfa69ce350e5afd0fc9844568fbee011f68c1789f2c9247e72f6cd5ef6e6ec2d501a040cc4c17fde1a68c04e22b6924cd2ff676bbd92d42c8e078001d7d28a77c64b17ce68931fbb51305a18056829ec1b0a51571d45373d34624ceb78e1bea90020b1dd0713cf9bbfedd09fb54071a962bff646380ea3df4be25745c3d9d6265c17f9bc0e1013f5ccfa07bb9878f3e0c701c599d565e4f9a35f859be0638bbaf7f352423ea301effcc7e133ce59e82f2703f7bf7eb86ad2aa8490ffdc3420add7f62380c8f4ead7d38f202adec5e9c23dc603002692da9d1ffdf5aa9049fdb0e0973b48ccd6c7bdb965ac92f64f4b8e30c63efe1eba673fe643cefe155eb3dd95f376a448dde046ca58e83621aa50341c926863ee3242ce0ea8b295b57e74604bf27ad51360be653d6b071830eba3bf9cfad9f8adc8b408ecd7aaf4f48318280b69376be47c49817b53f084da7a42f558abd4aa7eca40509628967f7aa95c46f05c2affd395dc2bc7d46bad9fe1c22b", 0x1000}], 0x1}}, {{&(0x7f0000001b80)={0xa, 0x40, 0x80000000, @private2, 0xe94}, 0x1c, &(0x7f0000002240)=[{&(0x7f0000001bc0)="13bbdcad8fbd571e4a6fd831af7f9c4e535a9f6bb3674036a47dc3fe9e37b310ba413fd377d77f9871e1267189085d25b906dcb9e7bf6f0b9c261378a7caf0e5db14ff4df19a7848b6fa96e01c8096bb55e8ba0fdfd6d64ac7a6a1a87b7d9c85ae2ed989bb13fd98441d3c287fb808db7e8c301ed43aa33bb167bdeb1389be030df0884a3505b6006c0ebeb1d741278ce1d4a934f1709d08a3ad9e6982eda5002820c268d494cef22641347daa6c5065777cf9e6db2272614616", 0xba}, {&(0x7f0000001c80)="2c45209a9432b9019bf48f248f2e9a3de8da7f263e5abb53d307e51cc8f8144e22943361948b0f12461d51675ac7bf93f1aab5bd7158518effd0de289f992167b54df681467c065781826f21187e16840ce8e6bf7be5c9c8990faf3c8fa6166612cb88c63519486cd3191e3db74d5ebd8c0752c6fbb3e83637cdc6d0808506bd6c60a3e992dc0316ffb92b19ad3a0844a2d1ac7d5307df15f360111e1cde8f847c05319cb8737407d22919896aa890a5435fd053071709b0bf0bbd17fc870ed2044908b7b2acddf6ca5e2403a55294bfa2a9e9e2d3da4a88fb09b7", 0xdb}, {&(0x7f0000001d80)="5bd0d536d21d2bd1591489abe6d579745b22e79938f6786b50999ad3cd11e1a87463ee3b4e7ad62fd67cce9917aa23f6109a34157c4245e567d59403587d57d1fca9e59a7034a4b2bb06454eddf97d865d51ba2aac644c374bac0d2016ff300ed0ac6b9c9ea94089805df8373cc2a4e91a9cbaa5d1d0fc88715e02562ceeeb59cfadada2676069d82cba25c40e82d16cd2dd3a7d7927a8f74561b276b2671d31d6482428c218cbb8b351a9a3db8bc55932d3b216d3947823126eb8b73e8a74df1696135ce4675a01979d6d11aa80f74d8d0e20ca598c3b2427dc4708cd974d6847c758541a1192db8f", 0xe9}, {&(0x7f0000001e80)="7c9f3d6e11172f2a020e946c949d65d6fb4b161df95eb08784fde221cbe50144c0b1bddf05db67918cbbd73ab02febd4728c7622f0d9be6c4867d0012764963217ea4e09282c6cc9b9daabf4041120094a7f670f0a9959", 0x57}, {&(0x7f0000001f00)="ca8f1a6c8c9570663b08a93ed1717c44ddd9a42ba44ef18b97e6084af7bb52cc26b50cdf7a00465734adb93dfcd0131aa22764a3d05a7d538c74c547e1db3f6603b58a0c53917abb1c8696b7872cc9a5bb242bffc20be1d77ae5baf5716ede0db3b80a8b7f04de0d2fddc5c7", 0x6c}, {&(0x7f0000001f80)="33711d46b32287cb7b24e6c0e720a99719107f7a94f128d857098a64227efa1c604d24ca31ac1c4e3a270db49fdaa9918ea58491fbf5664585e4ac26d3cfab1a16c57a12c7aef628fd24442b7d77d21395eb9783935691efa8861f629b305c05d805c136be451262dc8f4d6381e1992d442f4c418258055ddd3406c733388ebf507ed9b1e76f534914715ddb2c7575816c8788eacf6f450defd1fbcfad42421bf6461518167643bc6f4f96d97f74a48fa81637ee2ed78a236a00f309f0e42fb2ca38774ea6b2471127ffa811a7784a4ae94a79a4333ce804a14a9c0ffa5c5d1d844b6a8a1f", 0xe5}, {&(0x7f0000002080)="d28d19307c52f8616d58762b714da0", 0xf}, {&(0x7f00000020c0)="d837751f1ed32b45ff6417ab95030e1cff893064918226bdf17b3fea5f4a70643f837b8df27a94a281dd7dea1d16c4b0d83711c5e55a853879deeff5bb9f20a6faebef1c53d13a86eae64372a7ce63b6bbf44afb92c3e6ce79ccbb6a8982", 0x5e}, {&(0x7f0000002140)}, {&(0x7f0000002180)="4b678bb8fe063b4a951c64889cb576f714c45fd99c5fa3d0f093592a1c5b844c3b2569695628898a269caa467cce208753a0522b0ebae13eecf2878283740a56788416d91b2650a56a90240dcb5a7f35c73ffd1712fa195a37f47a4f55724010005f66e2c666da024916998cf0ccc75c2c9682cc5fdbe5d9ca31603028d57e713224f6de4f8ac53d87686bb1543568327fcae7", 0x93}], 0xa, &(0x7f0000002300)=[@pktinfo={{0x24, 0x29, 0x32, {@mcast2}}}, @hopopts={{0x70, 0x29, 0x36, {0x2f, 0xa, '\x00', [@calipso={0x7, 0x18, {0x2, 0x4, 0xfc, 0x53f, [0x6, 0x7fffffff]}}, @enc_lim={0x4, 0x1, 0x4}, @jumbo={0xc2, 0x4, 0x9d7}, @hao={0xc9, 0x10, @private2}, @ra={0x5, 0x2, 0x5}, @calipso={0x7, 0x10, {0x2, 0x2, 0x89, 0x0, [0x80]}}, @enc_lim={0x4, 0x1, 0x2}, @ra={0x5, 0x2, 0x7}]}}}], 0x98}}, {{&(0x7f00000023c0)={0xa, 0x4e24, 0x9, @empty, 0x2}, 0x1c, &(0x7f0000002940)=[{&(0x7f0000002400)="26efecbf337013741184a4cd0bc01e2aba67debb352dddc9cbedfa521df0cfab81566c4f9ecba26966cd3ed568d867e917ccae01ecdd6a0d6fae5cae7de29513174370678adc3aa045be4ed1402bbc1383c7b2d753d93d458eb32449bfdf5f274b9f542405561c7c155c7d464b3823dea3bd0c544af3f39eab7fc81efa0a4a773a67800278aa4d7510fc2d7c4e5a71f062e1b4b6cca57d775276362b795ae2a92c904e57075ee23d23702ff891262919ece0cc7db6d04b61f79ef355d1359e09fc73f424e2c27451a4e8d44b9fdd1e37664d7bc2e3b89ffce38cd6d5c6410035f1f23dd60f7b3026a68456a8", 0xec}, {&(0x7f0000002500)="5ed1fccaace779a60883268054164e8da669e65893cc2a01c007f9e8b17d157ae89cff27fd8419cb99ad8a6293c3c7603fd1b553cdd889fe1750b5d43ec4c5be32623c4bb64b308f8837df", 0x4b}, {&(0x7f0000002580)="f25a55406ee48c953744f5c66db498f912fefa9bb3f8e65e9fa09a7ae21df1a130bf163e9f2336238effa7afe5dcadd4e67b0a6dc76e74ac58f76ea824165f85", 0x40}, {&(0x7f00000025c0)="60273217abc2780978c7a518c3659b6f8406c1003740ea4a8c23f746d6854eeb40b853f4c6cd05e45919dd102dc3707b351c5d15b433f56509824c14d15b588a4a14b54befe8f5413f4629b892589e09ba51a95d57618c5c660abfeb0020ef69129da57db0b2f4de44e02ea695056d9d7a58156c0681662a07f86234c014e78319a63a50ac5f25cc56a5bbccee7e01638c946cbdea99837f0a34881ac0e2eeae33e390e73b13a4e1441103", 0xab}, {&(0x7f0000002680)="5a7a4532a4b12bd3ea8409e12c3986147abb73dec032da2cf6c48d4c0c893c76f7012957ae1c13c09cbc00f900acfc1dff25e988722c577214b11e1eaf29b2c05b7a7e1c5b59640158ca95a937fa9ea491fd61d9170d404ec15d3be6f97f38ec2043770e281ff415d0e7b7d57622fb5978b2b2f56d4cdd72e02f09daf437729399d1b2f28fa7ce041393977e629def8deabc1b8940626cd0af0b", 0x9a}, {&(0x7f0000002740)="974df539fc485669003fe387a0c0076424c3ddcfd8703b532107a4d79d5993860d457111524ac65371222e2947557a0ba70077ae992ec8b01ccae9be899b36f0f45bea2ed464e624f020f7c01d6b4afa8d028c88fdd781b84f7f5feb2767df8027f7df1a54fbafa6739fdb0f886e1ae7c9458fcf4b6d8208b42d5bf99008608a4e34d1724bb83e8aa7ab813579ea0da122d8c91d61e881eb7a471581a3b6e9ab7dc176059c251186f745220bc13c81b273f113ff2c2fd2ea33e26319a98069e8fcbf5cd7f439ac9062", 0xc9}, {&(0x7f0000002840)="f83dd5df3a72924261b25b9bbd56380b96556c6d7035f9531466abdbcbeb7d0c5a1227cc966831aad771d629b335cdabc279732b37836a9857848afeecbb633e572fd8e64ecf78a09a237b6d14c3b7ecff68662028895f4c54de323c8a62f2ef63c050d95d93945d510a9dbb1a3f27128361328a396b71f3e4b68bde6450bf4fc70ce74ac24fb37579e8193114d81539006394028ce5a096424e80de10b00cbb523127ca8047e7482cf1a02c572594b953689dc07cceb22d4aa483ef0f35948501886b954b631c548cf2f28e3707d14d8c1ea6d98fa1d9", 0xd7}], 0x7, &(0x7f00000029c0)=[@hopopts_2292={{0xa0, 0x29, 0x36, {0x21, 0x10, '\x00', [@generic={0x80, 0x80, "b5f8c10aea0450d23f85410d4b8d455ed4831506cce7238aaca36e103a174ad3fade6b8f34936445495e1cb069946cb86078ae7ef2f50c8f56186a8d351f3c9cd9d8333eff2f2b78c1517f56c3ab28f3cc2f8db58e98416cb16ec9db1567f9319b973e3b7dc1793e29581e3bf0bc18a94c9a6229939ea4d5de881b810112ff49"}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x4}}, @dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x2b, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0x3f}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x1}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x1}}], 0x120}}, {{&(0x7f0000002b00)={0xa, 0x4e22, 0x80, @mcast2, 0xff}, 0x1c, &(0x7f0000002f40)=[{&(0x7f0000002b40)="7ea1a2e5b487aa", 0x7}, {&(0x7f0000002b80)="3410f2593a92f345124e854fdc0ece7445c1f47d4c5b1354a0b9f9f41d2137795ff03691f0b87217e2af2ec8eeb8d61933dc1c29d6042baea3be3400f1fc6a5866fc4b7a0420e82628989c1a72726ab909cbd1dc97fbc76788b071005def8315fbd83f8385d0895da28aecc5ae7e71e66c37e5ceca7ceea4dabfc40096abf53bd3dae093d1444d22d01d554ac16cac2a34429256f0dbfbdd0012f0ce3718aa54ad2d26b209a1a5c1fed50d1275fe4f1d63cab17d516e7344", 0xb8}, {&(0x7f0000002c40)="3429f410434ebe15d41678ab25176a97099c34200b4af07d9b03d7e66c4d7a57ca15351d2dfb53e45fadb29a6ce4a9ae7257faea34244f105724d4383d66dd28e45f1e5f29f04226b60a5839ba2c04d8a4eb6b66bf16c7a44faa452fae5f517698d23d4158aeb032e86102e7f1b8f07948bb2a08813bafa4ab0bd9d2a42bbbc568c8524dd9a5187cb26c258409be54cbf052232335d9aee393a7f5", 0x9b}, {&(0x7f0000002d00)="4e2c566eda0f2b36d87efe273b7eb676bd44f601e65a18615ef4940f78c21795a95b3a51cc244b760d101278c0d12d79ef89588b6eeafaa6348a05cd52f946e4db075a9a93ac326c428d209b4faf7ef307ded8f1c2c44dc3be683dfcdd9c832c8e09a176bb47ae39143446e90aceebf389e39040b94a29addcf43511b251", 0x7e}, {&(0x7f0000002d80)="69c63415f5728aa1b429c4f7a416fa0208ef0b81e78bf7d6684c58de4d31ab1f266fec95234253603fcc6fcd20d2a08f70c78835fde845724438b653a4b8d32946fa9d2920ee0b07f40a60eedf74387ea43241d40111", 0x56}, {&(0x7f0000002e00)="60f8cff9d5", 0x5}, {&(0x7f0000002e40)="44590a008819f2385469db2bec15221b7b62d01a069f0fcef5baeac726ef73dc760538db5846cb071e259b3bd263039d08653c4f55ec2a55ca5a3a8f1e706fb16218395fba0897f0e44d828fa5c7c3714af327e657279237e716a36e74ecaef07a55f5c750f6f2af8e25b57822de81f57acc044db5fd3d1e241b63b6372f64083cc775d7c0250241ee0e863a3e0e1953b71fe8a1b3e51fe2ffc3d7aea9abb7897a3c36f41e048e70c6795fd522a1aea02a32e1402ab41cf8a505bfd5a428ebd13f07b5d694b91d8872eefe9f4c07b9319c6e3bb3860d04de903be3122bc33bc499bb99784ca75a475ab06178bc226a32", 0xf0}], 0x7, &(0x7f0000002fc0)}}], 0x6, 0x800) r1 = getpgrp(0x0) waitid(0x2, r1, 0x0, 0x8, 0x0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x3, 0x9, 0x5, 0x0, 0x0, 0x0, 0x110, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x27a, 0x2, @perf_bp={&(0x7f0000000100), 0x1}, 0x4008, 0x8, 0x3, 0x0, 0x8, 0x5, 0x8, 0x0, 0x0, 0x0, 0x5c12}, r2, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x9, 0x8, 0xfd, 0x1, 0x0, 0x8001, 0x200, 0xd, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000000040), 0x4}, 0x100, 0x5, 0x401, 0x5, 0x6, 0x5, 0xdc6c, 0x0, 0x6, 0x0, 0x1}, r1, 0x4, 0xffffffffffffffff, 0x0) 19:25:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xb00, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:25:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0xc0ed0000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:25:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x1020, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:25:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400ea, 0x0) 19:25:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:25:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x200000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:25:31 executing program 5: r0 = getpgrp(0x0) syz_open_procfs(r0, &(0x7f0000000000)='io\x00') waitid(0x2, r0, 0x0, 0x8, 0x0) 19:25:32 executing program 3: r0 = getpgrp(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) r2 = syz_open_procfs(r1, &(0x7f0000000100)='net/rt6_stats\x00') waitid(0x2, r0, 0x0, 0x8, 0x0) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) r4 = getpgrp(0x0) recvmmsg$unix(r2, &(0x7f0000000bc0)=[{{&(0x7f00000001c0), 0x6e, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/154, 0x9a}, {&(0x7f0000000300)=""/134, 0x86}], 0x2, &(0x7f0000000400)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x98}}, {{&(0x7f00000004c0)=@abs, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000540)=""/142, 0x8e}, {&(0x7f0000000600)=""/8, 0x8}], 0x2, &(0x7f0000000680)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}}, {{0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f00000006c0)=""/246, 0xf6}, {&(0x7f00000007c0)=""/246, 0xf6}, {&(0x7f00000008c0)=""/106, 0x6a}, {&(0x7f0000000940)=""/120, 0x78}], 0x4, &(0x7f0000000a00)=[@cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xa0}}, {{&(0x7f0000000ac0), 0x6e, &(0x7f0000000b40), 0x0, &(0x7f0000000b80)}}], 0x4, 0x2, &(0x7f0000000cc0)={0x77359400}) prctl$PR_SCHED_CORE(0x3e, 0x1, r6, 0x3, &(0x7f0000000d00)) pidfd_open(r4, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) r7 = gettid() ioctl$sock_SIOCGPGRP(r5, 0x8904, &(0x7f0000000b80)=0x0) r9 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r9, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r9, 0x330b) perf_event_open(&(0x7f0000000d40)={0x0, 0x80, 0x40, 0x74, 0x5, 0x8, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x4, @perf_bp={&(0x7f0000000b40), 0x8}, 0x10, 0x20, 0x4, 0x0, 0x80, 0x0, 0xfff, 0x0, 0x10000, 0x0, 0x800}, r8, 0xffffffffffffffff, r9, 0x8) rt_tgsigqueueinfo(r3, r7, 0x31, &(0x7f0000000000)={0x3, 0x6}) [ 1244.423285] SELinux: duplicate or incompatible mount options 19:25:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0xf6ffffff, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:25:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400eb, 0x0) [ 1258.892562] kmemleak: 31 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:25:56 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0xc0ed0000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:25:56 executing program 5: setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:25:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400ec, 0x0) 19:25:56 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 25) 19:25:56 executing program 3: getpgrp(0x0) r0 = getpgrp(0x0) pidfd_open(r0, 0x0) waitid(0x2, r0, 0x0, 0x1, 0x0) 19:25:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0xffff0000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:25:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x300000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:25:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2010, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) [ 1268.776036] FAULT_INJECTION: forcing a failure. [ 1268.776036] name failslab, interval 1, probability 0, space 0, times 0 [ 1268.778446] CPU: 1 PID: 7295 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1268.779853] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1268.781566] Call Trace: [ 1268.782125] dump_stack+0x107/0x167 [ 1268.782863] should_fail.cold+0x5/0xa [ 1268.783659] ? create_object.isra.0+0x3a/0xa20 [ 1268.784612] should_failslab+0x5/0x20 [ 1268.785407] kmem_cache_alloc+0x5b/0x360 [ 1268.786239] ? __es_remove_extent+0x70f/0x15d0 [ 1268.787190] create_object.isra.0+0x3a/0xa20 [ 1268.788090] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1268.789149] kmem_cache_alloc+0x159/0x360 [ 1268.790010] __es_insert_extent+0x3a9/0x12f0 [ 1268.790940] ext4_es_insert_extent+0x2dc/0xbb0 [ 1268.791886] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 1268.792810] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1268.793835] ? perf_trace_ext4_es_lookup_extent_exit+0x459/0x700 [ 1268.795086] ext4_map_blocks+0x8e1/0x1970 [ 1268.795945] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1268.796867] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1268.797849] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 1268.798818] ext4_getblk+0x144/0x680 [ 1268.799580] ? ext4_iomap_overwrite_begin+0xa0/0xa0 [ 1268.800602] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1268.801524] ? __brelse+0x84/0xa0 [ 1268.802235] ? __ext4_new_inode+0x148/0x5400 [ 1268.803139] ext4_bread+0x29/0x1f0 [ 1268.803868] ext4_append+0x228/0x4e0 [ 1268.804651] ? ext4_move_extents+0x3270/0x3270 [ 1268.805586] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1268.806582] ext4_init_new_dir+0x25e/0x4d0 [ 1268.807446] ? ext4_init_dot_dotdot+0x610/0x610 [ 1268.808415] ext4_mkdir+0x3c1/0xb10 [ 1268.809165] ? ext4_rmdir+0xf70/0xf70 [ 1268.809963] vfs_mkdir+0x41f/0x660 [ 1268.810698] do_mkdirat+0x145/0x2a0 [ 1268.811445] ? user_path_create+0xf0/0xf0 [ 1268.812307] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1268.813378] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1268.814452] do_syscall_64+0x33/0x40 [ 1268.815211] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1268.816258] RIP: 0033:0x7f59f7910c27 [ 1268.817039] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1268.820782] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1268.822331] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 1268.823784] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1268.825238] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 1268.826684] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1268.828132] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:25:56 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x20100000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:25:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xedc0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:25:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0xffffff8c, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:25:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x400000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:25:56 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) clock_gettime(0x0, &(0x7f0000001e80)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001d80)=[{{&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000100)=[{&(0x7f0000000080)=""/82, 0x52}], 0x1, &(0x7f0000000140)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000000180)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000200)=""/211, 0xd3}, {&(0x7f0000000300)=""/14, 0xe}, {&(0x7f0000000340)=""/197, 0xc5}, {&(0x7f0000000440)=""/206, 0xce}, {&(0x7f0000000540)=""/184, 0xb8}, {&(0x7f0000000600)=""/68, 0x44}, {&(0x7f0000000680)=""/251, 0xfb}, {&(0x7f0000000780)=""/53, 0x35}], 0x8, &(0x7f0000000840)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x118}}, {{&(0x7f0000000980)=@abs, 0x6e, &(0x7f0000000a40)=[{&(0x7f0000000a00)=""/31, 0x1f}], 0x1}}, {{&(0x7f0000000a80)=@abs, 0x6e, &(0x7f0000001d00)=[{&(0x7f0000000b00)=""/119, 0x77}, {&(0x7f0000000b80)=""/114, 0x72}, {&(0x7f0000000c00)=""/7, 0x7}, {&(0x7f0000000c40)=""/153, 0x99}, {&(0x7f0000000d00)=""/4096, 0x1000}], 0x5}}], 0x4, 0x2080, &(0x7f0000001ec0)={r1, r2+10000000}) waitid(0x2, r3, &(0x7f0000001f00), 0x2, &(0x7f0000001f80)) 19:25:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400ed, 0x0) 19:25:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0xfffffff6, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:25:56 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x20100000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:25:56 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xef08, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) [ 1269.043267] SELinux: duplicate or incompatible mount options [ 1282.851794] kmemleak: 18 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:26:19 executing program 3: getpgrp(0x0) r0 = getpgrp(0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) pidfd_open(r1, 0x0) pidfd_open(r0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r3, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r3, 0x330b) r4 = fork() ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8, 0x800, 0x225, 0x2, 0x2, r4}) waitid(0x0, r0, 0x0, 0x20000000, 0x0) r5 = fcntl$getown(r2, 0x9) waitid(0x2, r5, &(0x7f0000000080), 0x1, &(0x7f0000000200)) 19:26:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0xedc000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:26:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x80000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:26:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x500000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:26:19 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) pwrite64(r2, &(0x7f00000000c0)="a3", 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r3, 0x0) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_generic(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r5, r4) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x3, 0x7f, 0x6, 0x8}) creat(&(0x7f00000000c0)='./file0\x00', 0x0) open_by_handle_at(0xffffffffffffffff, &(0x7f0000000280)=ANY=[@ANYBLOB="08000000020000000200000000800000340e0227ea2b8f99ff6420b31956dd49a8af3d58aaf25452f31bfb91e8404f4ea8db434cca7c6de20863592c5b41735ff65370bb81f5df27f5977fc22676dcb7197bab6a30e19a2445af876667a2a333127973a135407cbafe12e8248a7f5bdef2ab851e74cd889fce3c401986c541c7baa985ee0e9847688a70c29e96"], 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0, 0x4022812, r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r2, r1) 19:26:19 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 26) 19:26:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400ee, 0x0) 19:26:19 executing program 5: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@local, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@initdev}}, &(0x7f00000002c0)=0xe8) ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, &(0x7f0000000380)={'syztnl0\x00', &(0x7f0000000300)={'ip6_vti0\x00', 0x0, 0x2f, 0x5, 0x7f, 0x1cb17f8, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @private1={0xfc, 0x1, '\x00', 0x1}, 0x7, 0x7, 0x1, 0x7}}) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)={0x0, @local, @initdev}, &(0x7f0000000400)=0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv_slave_1\x00', 0x0}) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000640)={&(0x7f0000000480)={0x1a8, 0x0, 0x200, 0x70bd27, 0x25dfdbfd, {}, [@HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'sit0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x38, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_bond\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}]}, @HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x1a8}, 0x1, 0x0, 0x0, 0x4001}, 0x40010) r4 = getpgrp(0x0) pidfd_open(r4, 0x0) r5 = getpgrp(r4) waitid(0x2, r5, 0x0, 0x8, 0x0) [ 1291.726031] FAULT_INJECTION: forcing a failure. [ 1291.726031] name failslab, interval 1, probability 0, space 0, times 0 [ 1291.728571] CPU: 0 PID: 7374 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1291.730013] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1291.731754] Call Trace: [ 1291.732312] dump_stack+0x107/0x167 [ 1291.733108] should_fail.cold+0x5/0xa [ 1291.733917] ? __es_insert_extent+0x3a9/0x12f0 [ 1291.734882] should_failslab+0x5/0x20 [ 1291.735685] kmem_cache_alloc+0x5b/0x360 [ 1291.736552] __es_insert_extent+0x3a9/0x12f0 [ 1291.737549] ext4_es_insert_extent+0x2dc/0xbb0 [ 1291.738518] ? ext4_es_scan_clu+0x2e0/0x2e0 [ 1291.739447] ? rwsem_down_read_slowpath+0xba0/0xba0 [ 1291.740494] ? perf_trace_ext4_es_lookup_extent_exit+0x459/0x700 [ 1291.741775] ext4_map_blocks+0x8e1/0x1970 [ 1291.742654] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1291.743591] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1291.744645] ? ext4_es_lookup_extent+0xc4/0xbe0 [ 1291.745676] ext4_getblk+0x144/0x680 [ 1291.746469] ? ext4_iomap_overwrite_begin+0xa0/0xa0 [ 1291.747548] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1291.748503] ? __brelse+0x84/0xa0 [ 1291.749283] ? __ext4_new_inode+0x148/0x5400 [ 1291.750229] ext4_bread+0x29/0x1f0 [ 1291.751000] ext4_append+0x228/0x4e0 [ 1291.751798] ? ext4_move_extents+0x3270/0x3270 [ 1291.752799] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1291.753833] ext4_init_new_dir+0x25e/0x4d0 [ 1291.754745] ? ext4_init_dot_dotdot+0x610/0x610 [ 1291.755749] ext4_mkdir+0x3c1/0xb10 [ 1291.756563] ? ext4_rmdir+0xf70/0xf70 [ 1291.757397] vfs_mkdir+0x41f/0x660 [ 1291.758177] do_mkdirat+0x145/0x2a0 [ 1291.758980] ? user_path_create+0xf0/0xf0 [ 1291.759887] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1291.761025] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1291.762128] do_syscall_64+0x33/0x40 [ 1291.762941] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1291.764023] RIP: 0033:0x7f59f7910c27 [ 1291.764861] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1291.768763] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1291.770379] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 1291.771889] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1291.773405] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 1291.774919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1291.776428] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:26:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x8000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:26:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xe0ffff, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:26:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x600000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1291.851475] SELinux: duplicate or incompatible mount options 19:26:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400ef, 0x0) 19:26:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x1000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:26:19 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) waitid(0x2, r1, &(0x7f0000000040), 0x4, &(0x7f00000000c0)) 19:26:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x100000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:26:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x700000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:26:19 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) ptrace$setopts(0x4200, r1, 0x3, 0x10) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:26:19 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 27) 19:26:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x200000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1292.110957] FAULT_INJECTION: forcing a failure. [ 1292.110957] name failslab, interval 1, probability 0, space 0, times 0 [ 1292.113694] CPU: 1 PID: 7424 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1292.115069] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1292.116755] Call Trace: [ 1292.117298] dump_stack+0x107/0x167 [ 1292.118043] should_fail.cold+0x5/0xa [ 1292.118817] ? create_object.isra.0+0x3a/0xa20 [ 1292.119748] should_failslab+0x5/0x20 [ 1292.120521] kmem_cache_alloc+0x5b/0x360 [ 1292.121367] ? _raw_spin_unlock_irq+0x1f/0x30 [ 1292.122280] create_object.isra.0+0x3a/0xa20 [ 1292.123174] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1292.124208] kmem_cache_alloc+0x159/0x360 [ 1292.125074] jbd2_journal_add_journal_head+0x1a3/0x540 [ 1292.126145] jbd2_journal_get_create_access+0x40/0x560 [ 1292.127222] __ext4_journal_get_create_access+0x43/0x90 [ 1292.128305] ext4_getblk+0x318/0x680 [ 1292.129072] ? ext4_iomap_overwrite_begin+0xa0/0xa0 [ 1292.130081] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1292.130996] ? __brelse+0x84/0xa0 [ 1292.131706] ? __ext4_new_inode+0x148/0x5400 [ 1292.132621] ext4_bread+0x29/0x1f0 [ 1292.133351] ext4_append+0x228/0x4e0 [ 1292.134115] ? ext4_move_extents+0x3270/0x3270 [ 1292.135047] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1292.136039] ext4_init_new_dir+0x25e/0x4d0 [ 1292.136916] ? ext4_init_dot_dotdot+0x610/0x610 [ 1292.137871] ext4_mkdir+0x3c1/0xb10 [ 1292.138618] ? ext4_rmdir+0xf70/0xf70 [ 1292.139411] vfs_mkdir+0x41f/0x660 [ 1292.140144] do_mkdirat+0x145/0x2a0 [ 1292.140911] ? user_path_create+0xf0/0xf0 [ 1292.141761] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1292.142826] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1292.143878] do_syscall_64+0x33/0x40 [ 1292.144644] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1292.145683] RIP: 0033:0x7f59f7910c27 [ 1292.146442] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1292.150173] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1292.151715] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 1292.153168] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1292.154612] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 1292.156055] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1292.157514] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 1292.204203] SELinux: duplicate or incompatible mount options [ 1303.337933] kmemleak: 22 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:26:38 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 28) 19:26:38 executing program 3: r0 = getpgrp(0x0) r1 = gettid() ptrace(0x4208, r1) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) r4 = getpgrp(0x0) pidfd_open(r4, 0x0) ptrace$pokeuser(0x6, r4, 0x100, 0x10001) r5 = getpgrp(0x0) pidfd_open(r5, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r6, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r6, 0x330b) pidfd_getfd(r6, r3, 0x0) rt_tgsigqueueinfo(r2, r5, 0x1f, &(0x7f0000000000)={0x1e, 0x1, 0x1}) r7 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r7, 0x8018456f, &(0x7f0000000180)=""/17) [ 1310.772011] FAULT_INJECTION: forcing a failure. [ 1310.772011] name failslab, interval 1, probability 0, space 0, times 0 [ 1310.773309] CPU: 0 PID: 7461 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1310.774074] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1310.774980] Call Trace: [ 1310.775275] dump_stack+0x107/0x167 [ 1310.775688] should_fail.cold+0x5/0xa [ 1310.776116] should_failslab+0x5/0x20 [ 1310.776545] __kmalloc_track_caller+0x79/0x3c0 [ 1310.777091] ? strndup_user+0x74/0xe0 [ 1310.777525] memdup_user+0x22/0xd0 [ 1310.777932] strndup_user+0x74/0xe0 [ 1310.778344] __x64_sys_mount+0x133/0x300 [ 1310.778789] ? path_mount+0x20b0/0x20b0 [ 1310.779247] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1310.779842] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1310.780414] do_syscall_64+0x33/0x40 [ 1310.780846] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1310.781451] RIP: 0033:0x7f59f791304a [ 1310.781874] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1310.784167] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1310.785036] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f791304a [ 1310.785875] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1310.786697] RBP: 00007f59f4e87040 R08: 00007f59f4e87040 R09: 0000000020000000 [ 1310.787518] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1310.788345] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 process_madvise(r7, &(0x7f0000002440)=[{&(0x7f0000000080)='\'', 0x1}, {&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="254ea5bbb0c5cb262c2055e3fb203b315c8b992bf9661d226a8c1ab93f8cc48ff6b853d3d836089247cd50004cbbd31259239dd526f1e46005f7af5447405077de89f4fad70eabe6ce47323f60e575df3dff8b59784d725f5d01c139faecb4b6ed0ae3942ec191041d7d9ef1506391ffd6d995966e7b3927b5820f", 0xc0}, {&(0x7f0000001180)="31c0e8717108dd40c4d7c125c92c133aaf02cf3db8a0e49ae05f7d000372dde27b8dc5399714b65da42b61ba0cf68a1b0de65a7f6371f88810aade679c9bb57c7943af5ec28b5968a55df9e847e910c96754dd8d68c9f76cb2bebb7cf72b1a981ac0789549334971ffeee9c15b0fda274d683a242126ed0cafb66955d2322d15d77254a622fb8b9fe9ab569c955d1e733d4e1d464b5844d7df7d54c6d6579c9d1b7958743e89a3991b5e597a0ed4829e0c222af6367b9a6e6c9f90a107a71f64b20340c62a77b82fea862af577d99133766cabfc8247726de02f5543b7639bca8ecef6", 0xe3}, {&(0x7f0000001280)="b7179f22937867dc1b8969fc319c32a5b9836ff1dc0b7c082c1f308a02010807a4722d93dba97b934cb8af03089b19cf5c57e23623ac9a159bec452be12fe8e2c4f9c22cae0560024ead7e078528adf12bbb444ad04a6677aad39390c2907b33315f15769790c69ecb67e16aa92c88dbbad6f7a78b30e17806dd191d173cb1b489539a9debceef3b99df5bb8465d17ea5f1eb3c4436d7d2e4fed753e1a5180659b0d0ae1f76a94137f3c8955bcfecb9c68fd124ef4cceaba0f427f736d6beb5b0959ce5a2c63eb0a7e917020d8d4ee83c62042341f16b2fa48437fa939b1346e44098f8d6bc0c7344192362622725658fd1bb75d96f15cdb3229eebc1e8d1ad53611e173757ecb164c7eef440a269a021cdf758eda1f16dc73273a8acdd018e3c1b52e53f370cda01a657dffa114a715c9b235d434c5141dafff7b7ddc35a074c894db0bbad0e310273521d28333c56d9cbfb738fe1fdf4e74d9c10a1bec6f998f2ae180ac0f59feba6fa771879b6a5d30742abe262a592581fd27cadc1b34661b7fadb9cc545cf5b2b6e0e95bcfdd954f69b2189dee40cc1d146c20f2de71ce470449147f4f6407495dd4cfbd7dc278eeacb7e9489306498ff88039b47f8a25040e5b0b373bb6fb8377975d00d534e2c8bc178ad6238f05a29952e8b5220737f5c50f2bf67b268d2296abb9ce5bd7227bf4bff8e23df2f54918058acc456ee2f7e7c70df92b4e7b4f70780b036ae55fad168f353a4cd668b468f747b948b03e9c383ece09e8f4997a80496581044cb2522d54bef5fa18ec04cc68bec5cb8b6044b43960c9ac9fa650266c27795f7d13e1a9c4304f71337fdab504185d06c77c853be14bb065fcfad7ddd5f3a74d91281dfe1cbd8c2818851deafaa97290a30fd05e080567a2bda5dd30003065f5ea90bdfeb6d066676af7e1f7e2c11843b2a18f1296611dfdf08e799b1cf1489fcf9d8a8b4e195ee5c60edbdded966038b1f4d804224e790f32d1b1716329653c5a44fbfcb5e73b18b3bcd89d94ae9ab18abd3663590259c65e28e4fd529945cd0c6755a88a529974a9767a97d4c60a4fc0732f85d6b76376507231d36ec28997e1d7e00935bbdae4e55ebecfe3e577eec5efb87c70bb99255654fa2588d01ca7cb765fde6c5de5bbe33ddcfa2a8217b67291bbe1bbbf7ebc2e597f3af28b301c24897bfc12d0522688d1d03fe28ab49335b424c31c3aaf1a8880fdc9f90e3ef809e45cfacabc6bc74170221268a3c4bf3153dd4c52102e59c932ea9bea9bbe1aa56cc206323cca7cbf6da559aedd66066ab225990a70a14a77922d03ca65f5ddb14e60464a9481fd4c65673ba537deb8395fc86b0cfb29b8e4817e824f7532ca96e16803c24979d335b3ced93b3f449aa376c3a9b6823c980e6572b886f07e7747d927e97bf7f199927c3d511d4477b79b546c9ebd09a2fd7cf3d44f679144cdc8af20e76e1f4b69c0e06bb20c224113bde6e53c156df690df68d5552de4bbabd18dabcf0647de282bf9ee4c0d3ef324dfc13c6e0a63d80b4806d388b4f9deefd8ed857bda9efd71b2787284c5bfd09fff1c70420a0bfba1a1d742494be6f499f3e2cab3f8578685833de8f511b256ef37a51c9ac8d3a55f60bcf06b78e9a710718480320a470b4646cdfe5359b066497aea21fc67fce96a2310931181273ce3194c5beaca59e2d4c95247321b276cbd5936894292fbfa7df824423d2f4c8570e1575de5289823413e016c782bc205d5d9673f71082aeb367912e4ce09a1352f2b6174797a1ce9a790f05d547a9e333019d6ebbd4a99f5e1280c17594366e4475525dfbbb81cef690c57d1c1e6c7caf5c2a1b34235e82e7d3a7251cedb725f9c58b8e29b235086aa4db8056a04c796456807f104d2600d3d500ff640e6530b008c346ac6c0a3d78181c39da84ebe489f6208735b323d144ee3e44ce0464f57b276e026a6fee4f0e1ff5fa7252fc2d4b989ab5e3b6f927dddda7d6270c52e5a2265968489f8ae8e899c3db61bee90a01aa12d653bf1890439a0c508f1de8acd8bd3f6e633ccb922713bf350769c35bb71973e0f782479736b54c71c41405a2075a1b63054fefdc23bed1a37abe1f30cb7c3bfa3aff556f1ec73289c5614e9ddab429c6d72aed3a6aba31f6c92ac70a7a0e151fa7eea1b676139bef327ba707ce47f791d3652cb9741479048bd91211f1da61e90ecb6e1d4d3ea8bd92037189260d72aa4768caebc6331094b8d0e200d02121c61981d60e99410bf708c5a823fdd1f90f06cfcc3faa0b98e6114855d0aa654f8d327cf63a1537555120439938c104e82efe27b7ea6d52e4f965803886314985c1c3b14f475cf49d5b5d40aea6ea647347b65824ebaa8d6c8ca70aeb85239e3a2048fecd0b9d78f70c56a14cd7f790827a940d9eefbb6b2124aceb0af29cca74439f03fc75ac3487e3c9b5c90cfae5362f108d0abfff7a83dbc2ef49649571bbe50f927a35c22f8de86af9489047d3b43f1aef7009d37ba727cf6067b3358956398d56e973dc9bb3731edbae853c0ec3d3bc5d7ccef31b481f00e4f262dd61a09bcaf314c498f6589ce780a179100740303b984d92312d4570405e33ced6cc7179baca078e5367615d7552e444f38648795dbb507087a846d14eb2a8eb358b40b4e3a06f1a522acd1e7a47b69a460cc34b38c43beccaeaa4617f9cc04894eb101c525cba9fbe148801d72cb6324bbcc7bf7408c9a9fc2874f40ba9ba030d6ad39394dc58f8b0bb8cd09b0c3bab9de6e4d68c532c3523b9b2c1814295c6ce1817c83dc7eee3cdf9bfef3911d0761a0accdeb37d52fa85a23efa36b5e314a585ab19e609a4d88d9740bad815c4fb8afeea04748a7b62cf95faff9753f35a3a6aba17fe338fb3a3dfdc3635a80d306074e7c97648e900879bd0cadcd23765aebfffcb6603e4b3744f8d0c23068709ccf8c4b5dbaacf38836aa9c34af6c16ce54bf18b3f91076c6963b71ad18efc0e82f08358a4a8046238955e3a784c6d5e4318a5e0680f61d6841387894ce5ba77333d2d141a0069d32ecb3f58e79c69a864a7e5d20696d1891b73983674e115e656079557852d4870d2cea940d2c93d96536d72e1415a1752faf82f8dc9b3cda7d4f679ea63510bf2f45991ae28e0dce610dd642753829d416c790ae3152a7b66dba64715efe5a25c46b2e3257f719801bfafcc908ff2c4afef22fd9c3ae56ccd7928dd51720ae55f65ea23f7b5c3aae889c51f22f3419618dbc6925190d42beaeaccd54e258d233b2ed504791140aaaa0ad4c876dd72ce95451f7faa8095ef325ad4ef005870b3e43e081b4feb7c7b2c8b78ddd45845e08168014304cc93870940a98b1c6aafaadae8009b767b49322187d93a00af8e1bd10dfc087d0626c1996d16fc624de4ce64e1cc22986e4f5887d8e3c8e8173ed4f2c9876816e9890589bfb4d8216a443902b660f3e894a8bffca2d78150218cab9bd8441c2e93b70e312c9be6d09ca1ca9f0b41c96e30629f032315bb5d9ac26b6e2dc1681be5df7b12e2d418aceb9f7f682c10ea8a7fd5630041fbc299629a755060ceb4ca4235a3d3ce876f30a949acb0d86426f935f4e86a385cbc623dcb03a60af2cabef3f17f48df7eab9b862f76b9c28e88239436aaea02f28503060470f134deb44d8af1b6c4a4d7b37be4206d44378409b66063ba84c7f5fec51a0d59417b8ec2f365a068061b657d525ec3a8b02762f0da58cfedc1640ac1794ffa535ebab446d12e8889a2a66fa2b059989e937cdeb6d55f4d9c60595ce2626622a842b47ed855aef54915709d99a492d667586d735ab31daaf5fad5a14017c261b092767d8bc57780a732fd362025f825fee421367e946af1155159c28c4ed00e785ea292cb1653fad9d2305039d55df4a59a296d2a5fb84f87efcad8a62f33cd189adbc4575f7b95cbb917d74347c6bb1b582f1a0f87837fcc07413168a09ab0aca7a8f7e1e0bd039ccd60a2371fb349cdf80fac90e3afd0d780163395ff2e1360e332dd61ad4e1f9d76805a1874e8a850c7a417f433bf130376647168437eb8d05c772510449bcd3123bd955760d00f5cbf2baf7688c71098f1cb2a987093f4dc8476b9b491be84bac88e4948e70663258223bf2d5811c93284776ee67023182de3a2ec79377b3e7fe745386d3ae32a16d65acfbeb3c21a11c49e5e61e1ea7367df59b0782746a4b446a450bdaab76d4c98a311f4071ea9a22f1c3736dfb40406fce029b384cb3c9a72685624ca23ae636a1ad52b2955ac82b2b60938410422f76f21818403d8bdd937a4a2fa10736cdfdefbdfbcebf82b827e80a92774c46246f3ac3b48a33e91b0e8a328020552554fa7e9626622534c06cfe31bffc1e21ea7fbc967c886b32af3ca643ed0818e9d7b9cf41d57e182b12fef6252f38b0f6e08c18658d2466952f6c1fdd3b2118d2b69b8b09e2e4639743779806a07853bd3b567b1f66e6a7a3659686066c62e900aaeaf130edd58d8596ecdcb134c5eeb87545a50e80cb859d88de76c3adadaa0806c5577bca2d9ab25c337ed340d87383c6b92551dc324643a202d2a0ba0c0b593338f325a9ad0e73466184165da0da51abbf74ce9e3129fa84c589ebee78078529773dba70f02c2579cf3df4ab89afccbf127d8f32ada2eaeb1f3404fadcb276b8b64e28c4491bedeb8aee8e4babc72240f564c8795246caf6e8fa4b0df2faac356783a1adfa3a453e30aab2f76e203caa3f24aa488ca1d3d1e47101ce15dc687b8d158e3b770d64b1abe930a5e144ea72857614b6cd3774e7a47c6b59aba362ab627db95e065c6255a37f366744cc239c302a0a28edb59d631981bb779bacef9dbb50442da0e3b41b67fac0655e43200fdd17c84ac2b7865dfff17e38825074c4f0872551bbbcb5d5ef258d47e598380ecd38a87f13ea6ec5970dd34a4dd9684eb9731cb968a450d2beb57c28c34b59227aa48f6ec4955a20cf4618a4ce060daacefb67a4204ebc22cc3b7853f1a9896464a6054ee7a41323ee23c3c85abc503a24bf787b6fce430635051a231984e9f4ad5155aa38b3663155cffa69f7229beccb268408eb3de1ece7ab6eb908323b1b036a1ed9faad04ec65b50dff99a907724cec765ddee66afefd440586de580cdf6da62dcf7903eaf82cf518d1ad1811e7624272e2764ff09bd0ae0fe3a6f1c8d1e526314492ef7771dfd60056bc69201e1bc7516d4d22750a614a41b895bd976f5952cdcc99d392f0c1aae8c87e471bdade1fed4663edc985542420b6e9793000dd561549b850ec22f4cc60ae60b74ed39ad71b8de3ab2de55d9ead4c9e0a14bfcad8d903600b09e758c521de11c4f64314ab9164fb4a2c46fd817ade93877c524fdc7b322abed69a9990e925fdfaaf4fbbdf7033e89a0147a2c2639c3bdd82095f759babc1b37146d9d5bf262f73b722e7d3fa03b9acfac8b56c2d9a4349ce5b6099c5b531e5c2a676d29ae6c08e5cb358bdda0f061f27d329596196af666819efdb1f23ffc8d28a32023fe2395510c22d956a77ea66ee74e6ba41c499cf58064c2abcc4294045d8961bbb01dd52272f5587d42c7fd72da71c92cd6f76f9146042c50fdd0f21f45a7c63195694fd382485e88d44d9fd843edaf250ca0c68baa151f3d6ba7ed7d46d01bf7dcc594b24937e97b41ba51ba690a22a34a47a83547ffea4ff0842810e4767181548f98da7cf0f0e067ae7152770e2192b7f2231d3d45bdcf6541c82a72b377bb9fd2f084b6dda752e37efdf93c6bf26d7cebe", 0x1000}, {&(0x7f0000002280)="88645f841d575f9855760cb175a42c3c7d7c2e034f12852ffb56fd8372889532c67641be9913cdca0ece10fba150f39c57c83ee604ed088fe1ee268b904af2c1595d0bc2b41a4316f7ed22bb5200a08cd868568ff243cf078f4d2558662249be13823fa32b50984443e12438e635bb232cd033a8020a2d2d8404d5c434", 0x7d}, {&(0x7f0000002300)="9a7461ceda83c3925d299267187e6c614cb923eec4791ff19e80eaf8aec3f5b033f30000000000000000", 0x2a}, {&(0x7f00000024c0)="1e4f1ce4c3d54c0a6e73a41c10a223be221d0abab0db460a1d8c8666a281f10e9ba26f464f124d2bb88c7092a8d0ab0691fd0122dcdb9f4e7a06e91bcbe1a9c73d0cb2f349235941e507fb505831a2765f0928c3efbfe788dc0288931fd437860c09a255a3f1432f4b3cbc3602c2aabb8963f615577f8f0f59fadef51c340f4868cca9de58db3d09c65aca4b88ada4831ea34379d2fb68a4db88a11fcb1324854099ada0ca90f45cb562e5d85b895d98d50aff0174141842638aa9dd4f7455cb1e4431910e86f94f26194db0717c6881b4901cbdf286648dc4b0a3001eeb955290cc", 0xe2}], 0x8, 0xb, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:26:38 executing program 7: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wlan0\x00'}) sendmsg$NL80211_CMD_TESTMODE(0xffffffffffffffff, 0x0, 0x24000840) perf_event_open(&(0x7f0000001d80)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x2, 0x0, 0xa418b6d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:26:38 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x1, 0x0) 19:26:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x800000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:26:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:26:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x700000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:26:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x900000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:26:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x3000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:26:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400f0, 0x0) 19:26:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xa00000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:26:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x800000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:26:38 executing program 5: r0 = getpgrp(0x0) pidfd_open(r0, 0x0) gettid() r1 = getpid() r2 = getpgrp(r1) waitid(0x2, r2, 0x0, 0x8, 0x0) 19:26:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400f1, 0x0) [ 1326.008225] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:27:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400f2, 0x0) 19:27:02 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x4000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:27:02 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) clone3(&(0x7f0000001200)={0x220800400, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x3e}, &(0x7f00000000c0)=""/4096, 0x1000, &(0x7f00000010c0)=""/254, &(0x7f00000011c0)=[r0, r0, r1, r2], 0x4}, 0x58) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:27:03 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0/file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xbfc}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)={[{}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@dioread_lock}, {@commit={'commit', 0x3d, 0x1ff}}, {@nolazytime}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}, {@norecovery}, {@noquota}, {@dioread_nolock}, {@data_err_ignore}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, ':@x!-%'}}, {@fsmagic={'fsmagic', 0x3d, 0x2893}}]}) chdir(&(0x7f0000000040)='./file0\x00') syz_io_uring_setup(0x203, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x62223096f2d32f14, 0x0, r2, 0x0, 0x0}, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r4, r3) syz_io_uring_submit(r0, 0x0, &(0x7f00000007c0)=@IORING_OP_RECVMSG={0xa, 0x3, 0x0, r4, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000700)=[{&(0x7f0000000480)=""/247, 0xf7}, {&(0x7f0000000580)=""/243, 0xf3}, {&(0x7f0000000680)=""/83, 0x53}], 0x3, &(0x7f0000000740)=""/24, 0x18}, 0x0, 0x2020, 0x1, {0x2}}, 0x9) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r7, &(0x7f0000000240)="01", 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000140)=ANY=[], 0x10) sendfile(r5, r6, 0x0, 0x20d315) openat2$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0)={0xa0040, 0xb1, 0x8}, 0x18) ioctl$EXT4_IOC_GROUP_EXTEND(r5, 0x40086607, &(0x7f00000001c0)=0x1) mount$bind(&(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000180), 0x40, 0x0) 19:27:03 executing program 3: r0 = getpgrp(0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000001240)={0x0}, &(0x7f0000001280)=0xc) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = getpgrp(0x0) pidfd_open(r5, 0x0) waitid$P_PIDFD(0x3, r4, &(0x7f0000001380), 0x20000000, &(0x7f0000001400)) r6 = gettid() clone3(&(0x7f0000001300)={0x0, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x2c}, &(0x7f0000000140)=""/4096, 0x1000, &(0x7f0000001140)=""/245, &(0x7f00000012c0)=[r2, r3, r0, r0, 0x0, r5, r0, 0xffffffffffffffff, r0, r6], 0xa, {r1}}, 0x58) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x240d01, 0x0) write$bt_hci(r1, &(0x7f00000014c0)=ANY=[@ANYRES16, @ANYRESOCT=0x0, @ANYRES32], 0x5) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:27:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xb00000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:27:03 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 29) 19:27:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x900000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:27:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x1000000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1335.477239] FAULT_INJECTION: forcing a failure. [ 1335.477239] name failslab, interval 1, probability 0, space 0, times 0 [ 1335.479767] CPU: 0 PID: 7527 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1335.481193] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1335.482910] Call Trace: [ 1335.483465] dump_stack+0x107/0x167 [ 1335.484226] should_fail.cold+0x5/0xa [ 1335.485019] ? create_object.isra.0+0x3a/0xa20 [ 1335.485991] should_failslab+0x5/0x20 [ 1335.486784] kmem_cache_alloc+0x5b/0x360 [ 1335.487632] create_object.isra.0+0x3a/0xa20 [ 1335.488542] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1335.489631] __kmalloc_track_caller+0x177/0x3c0 [ 1335.490598] ? strndup_user+0x74/0xe0 [ 1335.491398] memdup_user+0x22/0xd0 [ 1335.492144] strndup_user+0x74/0xe0 [ 1335.492913] __x64_sys_mount+0x133/0x300 [ 1335.493779] ? path_mount+0x20b0/0x20b0 [ 1335.494612] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1335.495711] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1335.496792] do_syscall_64+0x33/0x40 [ 1335.497575] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1335.498641] RIP: 0033:0x7f59f791304a [ 1335.499423] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1335.503219] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1335.504789] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f791304a [ 1335.506260] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1335.507727] RBP: 00007f59f4e87040 R08: 00007f59f4e87040 R09: 0000000020000000 [ 1335.509197] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1335.510666] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:27:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400f3, 0x0) 19:27:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0xa00000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:27:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x5000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:27:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2000000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1335.615633] SELinux: duplicate or incompatible mount options 19:27:03 executing program 5: getpgrp(0x0) getpgrp(0x0) r0 = pidfd_open(0x0, 0x0) r1 = fcntl$getown(r0, 0x9) waitid(0x0, r1, 0x0, 0x4, 0x0) 19:27:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x6000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) [ 1335.699600] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed 19:27:03 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 30) 19:27:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400f4, 0x0) [ 1335.799707] FAULT_INJECTION: forcing a failure. [ 1335.799707] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1335.802178] CPU: 0 PID: 7569 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1335.803591] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1335.805326] Call Trace: [ 1335.805882] dump_stack+0x107/0x167 [ 1335.806641] should_fail.cold+0x5/0xa [ 1335.807437] _copy_from_user+0x2e/0x1b0 [ 1335.808272] memdup_user+0x65/0xd0 [ 1335.809025] strndup_user+0x74/0xe0 [ 1335.809792] __x64_sys_mount+0x133/0x300 [ 1335.810643] ? path_mount+0x20b0/0x20b0 [ 1335.811475] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1335.812573] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1335.813665] do_syscall_64+0x33/0x40 [ 1335.814438] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1335.815503] RIP: 0033:0x7f59f791304a [ 1335.816272] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1335.820080] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1335.821671] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f791304a [ 1335.823152] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1335.824635] RBP: 00007f59f4e87040 R08: 00007f59f4e87040 R09: 0000000020000000 [ 1335.826130] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1335.827613] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 1336.010355] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1349.932244] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:27:31 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) pidfd_open(r2, 0x0) getpriority(0x2, r1) 19:27:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0xb00000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:27:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2010000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:27:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400f5, 0x0) 19:27:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x7000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:27:31 executing program 3: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r1, r0) ioctl$BTRFS_IOC_SET_FEATURES(r1, 0x40309439, &(0x7f0000000440)={0x2, 0x1, 0x10}) r2 = fcntl$getown(0xffffffffffffffff, 0x9) r3 = getpgrp(r2) recvmsg$unix(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000), 0x6e, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/53, 0x35}, {&(0x7f00000000c0)=""/227, 0xe3}, {&(0x7f00000001c0)=""/93, 0x5d}, {&(0x7f0000000240)=""/98, 0x62}], 0x4, &(0x7f0000000300)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}], 0x90}, 0x40010002) syz_open_procfs$namespace(r4, &(0x7f0000000400)='ns/pid\x00') waitid(0x2, r3, 0x0, 0x8, 0x0) 19:27:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 31) 19:27:31 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0/file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xbfc}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)={[{}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@dioread_lock}, {@commit={'commit', 0x3d, 0x1ff}}, {@nolazytime}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}, {@norecovery}, {@noquota}, {@dioread_nolock}, {@data_err_ignore}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, ':@x!-%'}}, {@fsmagic={'fsmagic', 0x3d, 0x2893}}]}) chdir(&(0x7f0000000040)='./file0\x00') syz_io_uring_setup(0x203, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x62223096f2d32f14, 0x0, r2, 0x0, 0x0}, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r4, r3) syz_io_uring_submit(r0, 0x0, &(0x7f00000007c0)=@IORING_OP_RECVMSG={0xa, 0x3, 0x0, r4, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000700)=[{&(0x7f0000000480)=""/247, 0xf7}, {&(0x7f0000000580)=""/243, 0xf3}, {&(0x7f0000000680)=""/83, 0x53}], 0x3, &(0x7f0000000740)=""/24, 0x18}, 0x0, 0x2020, 0x1, {0x2}}, 0x9) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r7, &(0x7f0000000240)="01", 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000140)=ANY=[], 0x10) sendfile(r5, r6, 0x0, 0x20d315) openat2$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0)={0xa0040, 0xb1, 0x8}, 0x18) ioctl$EXT4_IOC_GROUP_EXTEND(r5, 0x40086607, &(0x7f00000001c0)=0x1) mount$bind(&(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000180), 0x40, 0x0) 19:27:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x8cffffff00000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1363.666694] FAULT_INJECTION: forcing a failure. [ 1363.666694] name failslab, interval 1, probability 0, space 0, times 0 [ 1363.669061] CPU: 1 PID: 7599 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1363.670490] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1363.672204] Call Trace: [ 1363.672742] dump_stack+0x107/0x167 [ 1363.673493] should_fail.cold+0x5/0xa [ 1363.674262] ? create_object.isra.0+0x3a/0xa20 [ 1363.675185] should_failslab+0x5/0x20 [ 1363.675955] kmem_cache_alloc+0x5b/0x360 [ 1363.676780] create_object.isra.0+0x3a/0xa20 [ 1363.677691] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1363.678706] kmem_cache_alloc+0x159/0x360 [ 1363.679567] jbd2_journal_add_journal_head+0x1a3/0x540 [ 1363.679712] jbd2_journal_get_create_access+0x40/0x560 [ 1363.679744] __ext4_journal_get_create_access+0x43/0x90 [ 1363.682100] ext4_getblk+0x318/0x680 [ 1363.682125] ? ext4_iomap_overwrite_begin+0xa0/0xa0 [ 1363.684924] ? ext4_issue_zeroout+0x1c0/0x1c0 [ 1363.685860] ? __brelse+0x84/0xa0 [ 1363.686559] ? __ext4_new_inode+0x148/0x5400 [ 1363.687443] ext4_bread+0x29/0x1f0 [ 1363.688156] ext4_append+0x228/0x4e0 [ 1363.688910] ? ext4_move_extents+0x3270/0x3270 [ 1363.689839] ? ext4_mark_inode_used+0x14a0/0x14a0 [ 1363.690816] ext4_init_new_dir+0x25e/0x4d0 [ 1363.691672] ? ext4_init_dot_dotdot+0x610/0x610 [ 1363.692619] ext4_mkdir+0x3c1/0xb10 [ 1363.693359] ? ext4_rmdir+0xf70/0xf70 [ 1363.694152] vfs_mkdir+0x41f/0x660 [ 1363.694877] do_mkdirat+0x145/0x2a0 [ 1363.695617] ? user_path_create+0xf0/0xf0 [ 1363.696471] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1363.697548] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1363.698590] do_syscall_64+0x33/0x40 [ 1363.699340] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1363.700362] RIP: 0033:0x7f59f7910c27 [ 1363.701106] Code: 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1363.701117] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 1363.701150] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f7910c27 [ 1363.707874] RDX: 0000000000000000 RSI: 00000000000001ff RDI: 0000000020000080 [ 1363.709275] RBP: 00007f59f4e87040 R08: 0000000000000000 R09: 0000000000000000 [ 1363.710694] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000020000000 [ 1363.712104] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:27:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x1000000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:27:31 executing program 5: r0 = getpgrp(0x0) pidfd_open(r0, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:27:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400f6, 0x0) 19:27:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x8000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:27:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x9000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) [ 1363.873198] SELinux: duplicate or incompatible mount options 19:27:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xd506000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:27:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400f7, 0x0) 19:27:31 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(r0) r2 = gettid() ptrace(0x4208, r2) pidfd_open(r1, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) process_vm_writev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)=""/30, 0x1e}, {&(0x7f0000000040)=""/99, 0x63}, {&(0x7f00000000c0)=""/3, 0x3}], 0x3, &(0x7f0000000440)=[{&(0x7f0000000140)=""/211, 0xd3}, {&(0x7f0000000240)=""/201, 0xc9}, {&(0x7f0000000340)=""/106, 0x6a}, {&(0x7f00000003c0)=""/117, 0x75}], 0x4, 0x0) [ 1363.922441] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1378.368974] kmemleak: 26 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:27:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x2000000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:27:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xf6ffffff00000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:27:54 executing program 7: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='./file0/file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xbfc}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000000280)={[{}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@dioread_lock}, {@commit={'commit', 0x3d, 0x1ff}}, {@nolazytime}, {@usrjquota_path={'usrjquota', 0x3d, './file1'}}, {@norecovery}, {@noquota}, {@dioread_nolock}, {@data_err_ignore}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@measure}, {@smackfsfloor={'smackfsfloor', 0x3d, ':@x!-%'}}, {@fsmagic={'fsmagic', 0x3d, 0x2893}}]}) chdir(&(0x7f0000000040)='./file0\x00') syz_io_uring_setup(0x203, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) syz_io_uring_submit(r0, r1, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x62223096f2d32f14, 0x0, r2, 0x0, 0x0}, 0x0) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r4, r3) syz_io_uring_submit(r0, 0x0, &(0x7f00000007c0)=@IORING_OP_RECVMSG={0xa, 0x3, 0x0, r4, 0x0, &(0x7f0000000780)={&(0x7f0000000400)=@qipcrtr, 0x80, &(0x7f0000000700)=[{&(0x7f0000000480)=""/247, 0xf7}, {&(0x7f0000000580)=""/243, 0xf3}, {&(0x7f0000000680)=""/83, 0x53}], 0x3, &(0x7f0000000740)=""/24, 0x18}, 0x0, 0x2020, 0x1, {0x2}}, 0x9) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc142, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r7, &(0x7f0000000240)="01", 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r5, &(0x7f0000000140)=ANY=[], 0x10) sendfile(r5, r6, 0x0, 0x20d315) openat2$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0)={0xa0040, 0xb1, 0x8}, 0x18) ioctl$EXT4_IOC_GROUP_EXTEND(r5, 0x40086607, &(0x7f00000001c0)=0x1) mount$bind(&(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000180), 0x40, 0x0) 19:27:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400f8, 0x0) [ 1387.272342] FAULT_INJECTION: forcing a failure. [ 1387.272342] name failslab, interval 1, probability 0, space 0, times 0 [ 1387.274778] CPU: 1 PID: 7679 Comm: syz-executor.6 Not tainted 5.10.153 #1 19:27:54 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 32) 19:27:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xa000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:27:54 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) r4 = getpgrp(0x0) pidfd_open(r4, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000200)=0x0) r6 = getpgrp(0x0) pidfd_open(r6, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r7, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r7, 0x330b) clone3(&(0x7f0000000280)={0x40800, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x24}, &(0x7f0000000140)=""/66, 0x42, &(0x7f00000001c0), &(0x7f0000000240)=[r2, r1, r1, r3, r4, r5, r6], 0x7, {r7}}, 0x58) pidfd_open(r1, 0x0) ptrace$setsig(0x4203, r1, 0x0, &(0x7f0000000000)={0x30, 0x7, 0x9}) 19:27:54 executing program 5: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendmsg$inet6(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0xa, 0x4e24, 0x8, @remote, 0xfffffffd}, 0x1c, &(0x7f0000000240)=[{&(0x7f0000000040)="6821016593b03a8a82b9d5554c5042b191a635ab7525e890edf94c443b5b4440a0ecb8806320a425e05ee4a82c934698f458b7764ce789e5c2fafd5aef8d5c6edf6889279b8b1ea0548351b291254c63fcf1bb6dcf494031df5fa3d9153bd2effe87f76f54eb42eff718f73ca094352bcf878bedc368dabb6bdf7191ede862b2ee67c705d87352bf6a4af90fecfc39cb1d3df5b2512c2d1e22be96f44c7c95f1f0f2313dfa0bc880144bc3192335e54ac42a024dcd51eecab45553ca3274fc063e5bb214", 0xc4}, {&(0x7f0000000140)="291002cd0ec09edab7c92c3bb4dad2d224ffdcecfe09667b170a83e97b5192bc81334b0eee8a82176f81b9f2ae545221a63fff54d59efeed5df72f7ea16948f61c64b09bdbd7fc9fce41f61f0af2749aa2d7955aff8732d0411d1cae44ef701509a45380c63bf67b3e4d372da6fcc66fe8b6bb1369659b7e41b3e731540fa8", 0x7f}, {&(0x7f00000001c0)="d4d9bd19414c4bbfbce24f26dd7e7341633f5259699027d235938343deab142164f2fb9bf9f251892f3b8ea61afdc2c871147e430f5cd60b26cf51defad6d5437a574106da4cf4766ffa763d3e0cfc851075db74538210759ad15d1b9d7f99fa7c167e676271a5bbdd91a0b9297648", 0x6f}], 0x3, &(0x7f0000000280)=[@rthdr_2292={{0x18, 0x29, 0x39, {0x3c, 0x0, 0x1, 0x74}}}], 0x18}, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000180)=""/17) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r1, 0xc018937d, &(0x7f0000000380)={{0x1, 0x1, 0x18, r0, {0x7fff}}, './file0\x00'}) openat$cgroup_freezer_state(r2, &(0x7f0000000340), 0x2, 0x0) r3 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f0000000180)=""/17) r4 = getpgrp(0x0) pidfd_open(r4, 0x0) waitid(0x2, r4, 0x0, 0x8, 0x0) [ 1387.276167] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1387.278101] Call Trace: [ 1387.278648] dump_stack+0x107/0x167 [ 1387.279411] should_fail.cold+0x5/0xa [ 1387.280188] ? copy_mount_options+0x55/0x180 [ 1387.281091] should_failslab+0x5/0x20 [ 1387.281889] kmem_cache_alloc_trace+0x55/0x360 19:27:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x2010000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1387.282836] ? _copy_from_user+0xfb/0x1b0 [ 1387.282862] copy_mount_options+0x55/0x180 [ 1387.282886] __x64_sys_mount+0x1a8/0x300 [ 1387.282906] ? path_mount+0x20b0/0x20b0 [ 1387.282931] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1387.282951] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1387.282974] do_syscall_64+0x33/0x40 [ 1387.282994] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1387.283006] RIP: 0033:0x7f59f791304a [ 1387.283025] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 19:27:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xb000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:27:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x2, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1387.283035] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1387.283055] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f791304a 19:27:54 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 33) 19:27:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:27:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000000)) r1 = getpgrp(0x0) waitid(0x2, r1, 0x0, 0x8, 0x0) fallocate(r0, 0x40, 0x2, 0x9) [ 1387.283065] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1387.283076] RBP: 00007f59f4e87040 R08: 00007f59f4e87040 R09: 0000000020000000 19:27:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400f9, 0x0) [ 1387.283087] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1387.283097] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 1387.466037] 9pnet: Insufficient options for proto=fd [ 1387.479404] FAULT_INJECTION: forcing a failure. [ 1387.479404] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1387.481912] CPU: 1 PID: 7717 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1387.483305] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1387.484990] Call Trace: [ 1387.485534] dump_stack+0x107/0x167 [ 1387.486289] should_fail.cold+0x5/0xa [ 1387.487074] _copy_from_user+0x2e/0x1b0 [ 1387.487891] copy_mount_options+0x76/0x180 [ 1387.488760] __x64_sys_mount+0x1a8/0x300 [ 1387.489588] ? path_mount+0x20b0/0x20b0 [ 1387.490433] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1387.491505] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1387.492568] do_syscall_64+0x33/0x40 [ 1387.493335] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1387.494388] RIP: 0033:0x7f59f791304a [ 1387.495149] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1387.498913] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1387.500468] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f791304a [ 1387.501940] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1387.503395] RBP: 00007f59f4e87040 R08: 00007f59f4e87040 R09: 0000000020000000 [ 1387.504859] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1387.506320] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 1387.514306] EXT4-fs warning (device sda): ext4_resize_begin:82: There are errors in the filesystem, so online resizing is not allowed [ 1387.533958] 9pnet: Insufficient options for proto=fd [ 1387.558054] SELinux: duplicate or incompatible mount options [ 1387.563689] 9pnet: Insufficient options for proto=fd [ 1402.606296] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:28:17 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x40000000, 0x0) waitid(0x2, r0, &(0x7f0000000140), 0x20000000, &(0x7f0000000080)) 19:28:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x8cffffff00000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:28:17 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/consoles\x00', 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x107100, 0x1a1) read(r0, &(0x7f0000000000), 0x1b4000) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000180)=""/17) r2 = socket$nl_route(0x10, 0x3, 0x0) poll(&(0x7f00000000c0)=[{r1, 0xcd3e57444baadb41}, {r2, 0x20}, {0xffffffffffffffff, 0x8400}], 0x3, 0x67) sendmmsg$inet(r0, &(0x7f0000000600)=[{{&(0x7f0000000100)={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000380)="7c07c285a22008cacf74be3e1662787860ac6289ec298ca43ef926ad00a2f42e55bbc6104c7d45d7064bb0caeb9aa0abf18e5dbba9f3ac", 0x37}, {&(0x7f00000004c0)}, {&(0x7f0000000400)="7f819db6d1fb37b8c1c6f16a7fabb2d1fe47bc65f73b5555df8be7e254fe17c784a91166d04e78f574a00d62cc5291b575432079e1b5583b567ecb8d9984fac1a42fa31d2c0bea74bc1d9e69ffd832fa68d1282269f66b26f7fecc8cf9e08c", 0x5f}], 0x3}}], 0x1, 0x4010) r3 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r3, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r3, 0x330b) getsockopt$IP_SET_OP_GET_BYINDEX(r2, 0x1, 0x53, &(0x7f0000000140)={0x7, 0x7, 0x2}, &(0x7f0000000200)=0x28) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'gretap0\x00'}) 19:28:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x20100000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:28:17 executing program 3: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = getpgrp(r0) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) pidfd_send_signal(r1, 0x10, &(0x7f0000000040)={0x3f, 0x80000001, 0xfffff001}, 0x0) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x9dc8}) r4 = getpgrp(0x0) r5 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r5, 0x8018456f, &(0x7f0000000180)=""/17) pidfd_getfd(0xffffffffffffffff, r5, 0x0) pidfd_open(r4, 0x0) waitid(0x2, r4, 0x0, 0x8, 0x0) 19:28:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400fa, 0x0) 19:28:17 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 34) 19:28:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x3, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1410.059472] 9pnet: Insufficient options for proto=fd [ 1410.063076] FAULT_INJECTION: forcing a failure. [ 1410.063076] name failslab, interval 1, probability 0, space 0, times 0 [ 1410.063510] 9pnet: Insufficient options for proto=fd [ 1410.065417] CPU: 1 PID: 7749 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1410.067879] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1410.069569] Call Trace: [ 1410.070126] dump_stack+0x107/0x167 [ 1410.070881] should_fail.cold+0x5/0xa [ 1410.071668] ? getname_flags.part.0+0x50/0x4f0 [ 1410.072600] should_failslab+0x5/0x20 [ 1410.073367] kmem_cache_alloc+0x5b/0x360 [ 1410.074225] getname_flags.part.0+0x50/0x4f0 [ 1410.075103] user_path_at_empty+0xa1/0x100 [ 1410.075978] __x64_sys_mount+0x1e9/0x300 [ 1410.076787] ? path_mount+0x20b0/0x20b0 [ 1410.077614] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1410.078684] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1410.079752] do_syscall_64+0x33/0x40 [ 1410.080504] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1410.081561] RIP: 0033:0x7f59f791304a [ 1410.082327] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1410.086113] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1410.087684] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f791304a [ 1410.089147] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1410.090627] RBP: 00007f59f4e87040 R08: 00007f59f4e87040 R09: 0000000020000000 [ 1410.092095] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1410.093538] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:28:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x8cffffff, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:28:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x4, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:28:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400fb, 0x0) [ 1410.150099] 9pnet: Insufficient options for proto=fd 19:28:17 executing program 5: r0 = getpgrp(0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r1, 0x330b) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x1ff, 0x0, 0x6, 0x40000000000, 0x0, r2}) waitid(0x2, r0, 0x0, 0x8, 0x0) [ 1423.785251] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:28:38 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='cgroup\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000040)=""/210, 0xd2}], 0x1, 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(r0, 0x2282, &(0x7f0000000140)) 19:28:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x5, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1431.390801] 9pnet: Insufficient options for proto=fd [ 1431.406717] 9pnet: Insufficient options for proto=fd 19:28:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400fc, 0x0) 19:28:38 executing program 3: connect(0xffffffffffffffff, &(0x7f0000000000)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x80) r0 = getpgrp(0x0) r1 = socket$unix(0x1, 0x2, 0x0) fallocate(r1, 0x10, 0x8, 0xfffffffffffff001) bind(r1, &(0x7f0000000080)=@x25, 0x80) pidfd_open(r0, 0x0) r2 = fork() r3 = getpgrp(r2) waitid(0x2, r3, 0x0, 0x4, 0x0) recvmmsg$unix(r1, &(0x7f0000005f00)=[{{&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000200)=""/110, 0x6e}, {&(0x7f0000000280)=""/188, 0xbc}, {&(0x7f0000000340)=""/190, 0xbe}], 0x3, &(0x7f0000000440)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}}, {{&(0x7f0000000580), 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000600)=""/189, 0xbd}], 0x1, &(0x7f0000000700)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}}, {{&(0x7f0000000780), 0x6e, &(0x7f0000001980)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/220, 0xdc}, {&(0x7f0000001900)=""/126, 0x7e}], 0x3, &(0x7f00000019c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}}, {{&(0x7f0000001ac0)=@abs, 0x6e, &(0x7f0000001f00)=[{&(0x7f0000001b40)=""/64, 0x40}, {&(0x7f0000001b80)=""/138, 0x8a}, {&(0x7f0000001c40)=""/149, 0x95}, {&(0x7f0000001d00)=""/5, 0x5}, {&(0x7f0000001d40)=""/87, 0x57}, {&(0x7f0000001dc0)=""/118, 0x76}, {&(0x7f0000001e40)=""/38, 0x26}, {&(0x7f0000001e80)=""/20, 0x14}, {&(0x7f0000001ec0)=""/59, 0x3b}], 0x9, &(0x7f0000001fc0)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x128}}, {{&(0x7f0000002100)=@abs, 0x6e, &(0x7f0000002280)=[{&(0x7f0000002180)=""/17, 0x11}, {&(0x7f00000021c0)}, {&(0x7f0000002200)=""/122, 0x7a}], 0x3, &(0x7f00000022c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}}, {{&(0x7f0000002300), 0x6e, &(0x7f0000003540)=[{&(0x7f0000002380)=""/118, 0x76}, {&(0x7f0000002400)=""/61, 0x3d}, {&(0x7f0000002440)=""/33, 0x21}, {&(0x7f0000002480)=""/182, 0xb6}, {&(0x7f0000002540)=""/4096, 0x1000}], 0x5, &(0x7f00000035c0)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000003600)=@abs, 0x6e, &(0x7f0000003c80)=[{&(0x7f0000003680)=""/56, 0x38}, {&(0x7f00000036c0)=""/254, 0xfe}, {&(0x7f00000037c0)=""/147, 0x93}, {&(0x7f0000003880)=""/253, 0xfd}, {&(0x7f0000003980)=""/152, 0x98}, {&(0x7f0000003a40)=""/186, 0xba}, {&(0x7f0000003b00)=""/159, 0x9f}, {&(0x7f0000003bc0)=""/124, 0x7c}, {&(0x7f0000003c40)=""/30, 0x1e}], 0x9, &(0x7f0000003d40)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}}, {{&(0x7f0000003e00)=@abs, 0x6e, &(0x7f00000054c0)=[{&(0x7f0000003e80)=""/28, 0x1c}, {&(0x7f0000003ec0)=""/96, 0x60}, {&(0x7f0000003f40)=""/186, 0xba}, {&(0x7f0000004000)=""/197, 0xc5}, {&(0x7f0000004100)=""/172, 0xac}, {&(0x7f00000041c0)=""/166, 0xa6}, {&(0x7f0000004280)=""/254, 0xfe}, {&(0x7f0000004380)=""/112, 0x70}, {&(0x7f0000004400)=""/190, 0xbe}, {&(0x7f00000044c0)=""/4096, 0x1000}], 0xa}}, {{&(0x7f0000005580)=@abs, 0x6e, &(0x7f0000005b80)=[{&(0x7f0000005600)=""/113, 0x71}, {&(0x7f0000005680)=""/192, 0xc0}, {&(0x7f0000005740)=""/255, 0xff}, {&(0x7f0000005840)=""/16, 0x10}, {&(0x7f0000005880)=""/131, 0x83}, {&(0x7f0000005940)=""/254, 0xfe}, {&(0x7f0000005a40)=""/43, 0x2b}, {&(0x7f0000005a80)=""/164, 0xa4}, {&(0x7f0000005b40)=""/17, 0x11}], 0x9}}, {{&(0x7f0000005c40), 0x6e, &(0x7f0000005d80)=[{&(0x7f0000005cc0)=""/160, 0xa0}], 0x1, &(0x7f0000005dc0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x120}}], 0xa, 0x10000, &(0x7f0000006180)) r5 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r5, 0x8018456f, &(0x7f0000000180)=""/17) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x7f, 0x6, 0x7, 0x3, 0x0, 0x6, 0x40000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xffffffffffffffff}, 0x2, 0xc9df, 0x6, 0x0, 0x4ab1, 0xfffffffa, 0x7fff, 0x0, 0x8, 0x0, 0x6000000000000000}, r4, 0x10, r5, 0x1) getpgrp(r3) 19:28:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xc0ed0000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:28:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0xf6ffffff00000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:28:38 executing program 5: getsockopt$IP_VS_SO_GET_SERVICES(0xffffffffffffffff, 0x0, 0x482, &(0x7f0000000000)=""/73, &(0x7f0000000080)=0x49) r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:28:38 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 35) 19:28:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xef080000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) [ 1431.422525] FAULT_INJECTION: forcing a failure. [ 1431.422525] name failslab, interval 1, probability 0, space 0, times 0 [ 1431.425077] CPU: 0 PID: 7807 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1431.426514] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1431.428252] Call Trace: [ 1431.428807] dump_stack+0x107/0x167 [ 1431.429568] should_fail.cold+0x5/0xa [ 1431.430378] ? create_object.isra.0+0x3a/0xa20 [ 1431.431330] should_failslab+0x5/0x20 [ 1431.432128] kmem_cache_alloc+0x5b/0x360 [ 1431.432989] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1431.434087] create_object.isra.0+0x3a/0xa20 [ 1431.435027] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1431.436087] kmem_cache_alloc+0x159/0x360 [ 1431.436963] getname_flags.part.0+0x50/0x4f0 [ 1431.437887] user_path_at_empty+0xa1/0x100 [ 1431.438782] __x64_sys_mount+0x1e9/0x300 [ 1431.439636] ? path_mount+0x20b0/0x20b0 [ 1431.440474] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1431.441569] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1431.442665] do_syscall_64+0x33/0x40 [ 1431.443450] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1431.444521] RIP: 0033:0x7f59f791304a [ 1431.445300] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1431.449153] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1431.450754] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f791304a [ 1431.452267] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1431.453752] RBP: 00007f59f4e87040 R08: 00007f59f4e87040 R09: 0000000020000000 [ 1431.455258] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1431.456743] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:28:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0xffff000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:28:39 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002500)=[{0x0}], 0x0, &(0x7f0000002680)=ANY=[]) syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x7fff, 0x2, &(0x7f0000000140)=[{&(0x7f0000000080), 0x0, 0x800}, {&(0x7f0000000200)="ebdcf053f15ea66a2e7b2b9c94663310bc7eb2cd5fab3715d736b28a57257947b2c6c814ce79494aa1fae66cb3f4a87d0bf7f8608f00ea747345ee665f29b55a8034fec83b4c035cffe2db07bc480d78f9fe07017f22e2a57a1dbf144587c69af54aaaacc5b0323f9a148d52d46563a624a13a5131d67467cc4d2e7f3bddada2a804b168f4f6db0e8b7de682a752b01e923a9f5e213e1f14100b4679ae1f62eb689857ba9821d1b0889d0bb7b63382c44857f569c19fad013d2912ea25fbfc362f104ef796217a1084b7397701c7f91fef79b8ebb205d741883f3d", 0xdb, 0x9}], 0x1010000, &(0x7f0000000300)={[{'-%{,'}, {'['}, {'\'}+-*'}, {'^.['}], [{@measure}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 19:28:39 executing program 5: r0 = getpgrp(0x0) waitid(0x1, r0, 0x0, 0x40000000, 0x0) 19:28:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400fd, 0x0) 19:28:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xf6ffffff, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:28:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x2, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:28:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x6, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1431.658953] SELinux: duplicate or incompatible mount options [ 1431.670846] 9pnet: Insufficient options for proto=fd [ 1431.688786] 9pnet: Insufficient options for proto=fd 19:28:39 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 36) 19:28:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x400fe, 0x0) 19:28:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x7, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1431.771627] FAULT_INJECTION: forcing a failure. [ 1431.771627] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1431.774096] CPU: 1 PID: 7847 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1431.775516] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1431.777237] Call Trace: [ 1431.777797] dump_stack+0x107/0x167 [ 1431.778580] should_fail.cold+0x5/0xa [ 1431.779382] strncpy_from_user+0x34/0x470 [ 1431.780252] getname_flags.part.0+0x95/0x4f0 [ 1431.781176] user_path_at_empty+0xa1/0x100 [ 1431.782058] __x64_sys_mount+0x1e9/0x300 [ 1431.782906] ? path_mount+0x20b0/0x20b0 [ 1431.783734] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1431.784812] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1431.785880] do_syscall_64+0x33/0x40 [ 1431.786671] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1431.787722] RIP: 0033:0x7f59f791304a [ 1431.788489] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1431.792278] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1431.793844] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f791304a [ 1431.795317] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1431.796776] RBP: 00007f59f4e87040 R08: 00007f59f4e87040 R09: 0000000020000000 [ 1431.798224] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1431.799700] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 1431.840552] 9pnet: Insufficient options for proto=fd [ 1443.983875] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:28:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xffffe000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:28:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x7, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:28:59 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000180)=""/17) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000100)=0xc) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x2, 0x3, 0xa7d5, 0x10000000000bde1, 0x6, r3}) 19:28:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x403a8, 0x0) 19:28:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x8, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:28:59 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 37) 19:28:59 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002500)=[{0x0}], 0x0, &(0x7f0000002680)=ANY=[]) syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x7fff, 0x2, &(0x7f0000000140)=[{&(0x7f0000000080), 0x0, 0x800}, {&(0x7f0000000200)="ebdcf053f15ea66a2e7b2b9c94663310bc7eb2cd5fab3715d736b28a57257947b2c6c814ce79494aa1fae66cb3f4a87d0bf7f8608f00ea747345ee665f29b55a8034fec83b4c035cffe2db07bc480d78f9fe07017f22e2a57a1dbf144587c69af54aaaacc5b0323f9a148d52d46563a624a13a5131d67467cc4d2e7f3bddada2a804b168f4f6db0e8b7de682a752b01e923a9f5e213e1f14100b4679ae1f62eb689857ba9821d1b0889d0bb7b63382c44857f569c19fad013d2912ea25fbfc362f104ef796217a1084b7397701c7f91fef79b8ebb205d741883f3d", 0xdb, 0x9}], 0x1010000, &(0x7f0000000300)={[{'-%{,'}, {'['}, {'\'}+-*'}, {'^.['}], [{@measure}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 19:28:59 executing program 3: r0 = getpgrp(0x0) tgkill(r0, r0, 0x1c) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) waitid(0x1, r1, 0x0, 0x1, 0x0) [ 1452.423499] FAULT_INJECTION: forcing a failure. [ 1452.423499] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1452.425937] CPU: 1 PID: 7880 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1452.427350] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1452.429110] Call Trace: [ 1452.429668] dump_stack+0x107/0x167 [ 1452.430453] should_fail.cold+0x5/0xa [ 1452.431255] strncpy_from_user+0x34/0x470 [ 1452.432152] getname_flags.part.0+0x95/0x4f0 [ 1452.433065] user_path_at_empty+0xa1/0x100 [ 1452.433423] 9pnet: Insufficient options for proto=fd [ 1452.433984] __x64_sys_mount+0x1e9/0x300 [ 1452.434006] ? path_mount+0x20b0/0x20b0 [ 1452.434038] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1452.437814] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1452.438898] do_syscall_64+0x33/0x40 [ 1452.439670] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1452.440730] RIP: 0033:0x7f59f791304a [ 1452.441505] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1452.445322] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1452.446914] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f791304a [ 1452.448385] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 19:29:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xffffff8c, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) [ 1452.449851] RBP: 00007f59f4e87040 R08: 00007f59f4e87040 R09: 0000000020000000 [ 1452.451501] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1452.452959] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:29:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x9, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:29:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x8, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:29:00 executing program 5: ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(0xffffffffffffffff, 0xc0c89425, &(0x7f0000000000)={"e3e65be3b57d71074926bffe0895d173", 0x0, 0x0, {0x10000, 0x7fffffff}, {0x6, 0x3}, 0x4, [0xcc, 0x10001, 0x8001, 0x101, 0x6, 0x9, 0xfffffffffffff001, 0x7, 0x6, 0x3, 0x400, 0x2, 0x4, 0x8, 0x8, 0xc00000000000000]}) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000180)=""/17) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000140), 0x230403, 0x0) write$P9_RCREATE(r0, &(0x7f0000000100)={0x18, 0x73, 0x1, {{0x4, 0x0, 0x8}, 0x6ce}}, 0x18) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) r1 = getpgrp(0x0) waitid(0x2, r1, 0x0, 0x8, 0x0) [ 1452.630699] 9pnet: Insufficient options for proto=fd 19:29:00 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 38) [ 1452.636271] cgroup: fork rejected by pids controller in /syz4 [ 1452.639668] 9pnet: Insufficient options for proto=fd 19:29:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x49f00, 0x0) 19:29:00 executing program 3: getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) setresuid(0xffffffffffffffff, r0, 0x0) getpgrp(0x0) r1 = syz_open_dev$evdev(&(0x7f00000007c0), 0x0, 0x0) ioctl$EVIOCGABS2F(r1, 0x8018456f, 0x0) fork() r2 = getpgrp(0x0) pidfd_open(r2, 0x0) waitid(0x1, r2, 0x0, 0x2, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x2040, 0x0) r4 = eventfd2(0x0, 0x80000) dup2(r3, r4) [ 1452.695722] FAULT_INJECTION: forcing a failure. [ 1452.695722] name failslab, interval 1, probability 0, space 0, times 0 [ 1452.698126] CPU: 1 PID: 7926 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1452.699524] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1452.701227] Call Trace: [ 1452.701764] dump_stack+0x107/0x167 [ 1452.702520] should_fail.cold+0x5/0xa [ 1452.703319] ? alloc_fs_context+0x57/0x840 [ 1452.704193] should_failslab+0x5/0x20 [ 1452.704955] kmem_cache_alloc_trace+0x55/0x360 [ 1452.705903] alloc_fs_context+0x57/0x840 [ 1452.706751] path_mount+0xa72/0x20b0 [ 1452.707522] ? strncpy_from_user+0x9e/0x470 [ 1452.708411] ? finish_automount+0xa40/0xa40 [ 1452.709288] ? getname_flags.part.0+0x1dd/0x4f0 [ 1452.710254] __x64_sys_mount+0x282/0x300 [ 1452.711114] ? path_mount+0x20b0/0x20b0 [ 1452.711935] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1452.713009] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1452.714064] do_syscall_64+0x33/0x40 [ 1452.714865] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1452.715936] RIP: 0033:0x7f59f791304a [ 1452.716703] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1452.720512] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1452.722089] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f791304a [ 1452.723582] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1452.725065] RBP: 00007f59f4e87040 R08: 00007f59f4e87040 R09: 0000000020000000 [ 1452.726528] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1452.728002] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:29:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xa, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:29:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4a000, 0x0) 19:29:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xfffffff6, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) [ 1452.812522] 9pnet: Insufficient options for proto=fd [ 1452.829055] 9pnet: Insufficient options for proto=fd 19:29:00 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 39) 19:29:00 executing program 5: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)) r0 = getpgrp(0x0) pidfd_open(r0, 0x0) getpid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080), &(0x7f00000000c0)=0xc) r1 = getpgrp(r0) waitid(0x2, r1, 0x0, 0x8, 0x0) 19:29:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xedc000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:29:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4a100, 0x0) [ 1452.966704] FAULT_INJECTION: forcing a failure. [ 1452.966704] name failslab, interval 1, probability 0, space 0, times 0 [ 1452.969221] CPU: 0 PID: 7950 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1452.970662] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1452.972407] Call Trace: [ 1452.972959] dump_stack+0x107/0x167 [ 1452.973727] should_fail.cold+0x5/0xa [ 1452.974514] ? create_object.isra.0+0x3a/0xa20 [ 1452.975487] should_failslab+0x5/0x20 [ 1452.976294] kmem_cache_alloc+0x5b/0x360 [ 1452.977160] create_object.isra.0+0x3a/0xa20 [ 1452.978089] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1452.979166] kmem_cache_alloc_trace+0x151/0x360 [ 1452.980153] alloc_fs_context+0x57/0x840 [ 1452.980999] path_mount+0xa72/0x20b0 [ 1452.981785] ? strncpy_from_user+0x9e/0x470 [ 1452.982702] ? finish_automount+0xa40/0xa40 [ 1452.983612] ? getname_flags.part.0+0x1dd/0x4f0 [ 1452.984601] __x64_sys_mount+0x282/0x300 [ 1452.985449] ? path_mount+0x20b0/0x20b0 [ 1452.986280] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1452.987371] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1452.988444] do_syscall_64+0x33/0x40 [ 1452.989211] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1452.990267] RIP: 0033:0x7f59f791304a [ 1452.991043] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1452.994836] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1452.996400] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f791304a [ 1452.997870] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1452.999341] RBP: 00007f59f4e87040 R08: 00007f59f4e87040 R09: 0000000020000000 [ 1453.000816] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1453.002293] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:29:00 executing program 3: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000000)) r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:29:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xb, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:29:00 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = fork() getpgrp(r2) waitid(0x0, r1, &(0x7f0000000000), 0x20000000, &(0x7f0000000080)) 19:29:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x8000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) [ 1453.083214] 9pnet: Insufficient options for proto=fd [ 1453.085769] SELinux: duplicate or incompatible mount options [ 1453.092216] 9pnet: Insufficient options for proto=fd [ 1464.866930] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:29:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xe0ffff00000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:29:20 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002500)=[{0x0}], 0x0, &(0x7f0000002680)=ANY=[]) syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x7fff, 0x2, &(0x7f0000000140)=[{&(0x7f0000000080), 0x0, 0x800}, {&(0x7f0000000200)="ebdcf053f15ea66a2e7b2b9c94663310bc7eb2cd5fab3715d736b28a57257947b2c6c814ce79494aa1fae66cb3f4a87d0bf7f8608f00ea747345ee665f29b55a8034fec83b4c035cffe2db07bc480d78f9fe07017f22e2a57a1dbf144587c69af54aaaacc5b0323f9a148d52d46563a624a13a5131d67467cc4d2e7f3bddada2a804b168f4f6db0e8b7de682a752b01e923a9f5e213e1f14100b4679ae1f62eb689857ba9821d1b0889d0bb7b63382c44857f569c19fad013d2912ea25fbfc362f104ef796217a1084b7397701c7f91fef79b8ebb205d741883f3d", 0xdb, 0x9}], 0x1010000, &(0x7f0000000300)={[{'-%{,'}, {'['}, {'\'}+-*'}, {'^.['}], [{@measure}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 1472.941680] 9pnet: Insufficient options for proto=fd 19:29:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4a200, 0x0) 19:29:20 executing program 5: r0 = getpgrp(0x0) r1 = socket$inet(0x2, 0x6, 0x9) r2 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r2, 0x330b) fcntl$dupfd(r1, 0x406, r2) r3 = accept4$packet(0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=0x14, 0x800) ioctl$sock_FIOSETOWN(r3, 0x8901, &(0x7f0000000080)=r0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:29:20 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) ptrace$setsig(0x4203, r1, 0x1, &(0x7f0000000000)={0x24, 0x3f, 0x1}) 19:29:20 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 40) 19:29:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x10, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:29:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x9, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1472.965146] FAULT_INJECTION: forcing a failure. [ 1472.965146] name failslab, interval 1, probability 0, space 0, times 0 [ 1472.967612] CPU: 0 PID: 8092 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1472.969108] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1472.969928] audit: type=1400 audit(1667676560.564:13): avc: denied { create } for pid=8091 comm="syz-executor.5" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1 [ 1472.970924] Call Trace: [ 1472.970952] dump_stack+0x107/0x167 [ 1472.970978] should_fail.cold+0x5/0xa [ 1472.977445] ? create_object.isra.0+0x3a/0xa20 [ 1472.978426] should_failslab+0x5/0x20 [ 1472.979257] kmem_cache_alloc+0x5b/0x360 [ 1472.980134] create_object.isra.0+0x3a/0xa20 [ 1472.981053] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1472.982117] kmem_cache_alloc_trace+0x151/0x360 [ 1472.983097] ? lockdep_init_map_type+0x2c7/0x780 [ 1472.984094] legacy_init_fs_context+0x44/0xe0 [ 1472.985031] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1472.986071] alloc_fs_context+0x4f8/0x840 [ 1472.986971] path_mount+0xa72/0x20b0 [ 1472.987751] ? strncpy_from_user+0x9e/0x470 [ 1472.988666] ? finish_automount+0xa40/0xa40 [ 1472.989562] ? getname_flags.part.0+0x1dd/0x4f0 [ 1472.990564] __x64_sys_mount+0x282/0x300 [ 1472.991419] ? path_mount+0x20b0/0x20b0 [ 1472.992258] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1472.993348] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1472.994426] do_syscall_64+0x33/0x40 [ 1472.995227] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1472.996294] RIP: 0033:0x7f59f791304a [ 1472.997070] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1473.000922] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1473.002509] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f791304a [ 1473.004006] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1473.005496] RBP: 00007f59f4e87040 R08: 00007f59f4e87040 R09: 0000000020000000 [ 1473.006994] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1473.008481] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 1473.018428] 9pnet: Insufficient options for proto=fd [ 1473.044759] SELinux: duplicate or incompatible mount options [ 1486.116150] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:29:41 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 41) 19:29:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x100000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:29:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xa, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:29:41 executing program 5: r0 = getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000080), 0x88000, 0x0) syz_open_pts(r2, 0x4a2440) waitid(0x2, r0, 0x0, 0x20000000, 0x0) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) r5 = openat$cgroup_devices(0xffffffffffffffff, &(0x7f0000000040)='devices.allow\x00', 0x2, 0x0) kcmp(r3, r1, 0x0, r4, r5) 19:29:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4a300, 0x0) 19:29:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x300, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:29:41 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002500)=[{0x0}], 0x0, &(0x7f0000002680)=ANY=[]) syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x7fff, 0x2, &(0x7f0000000140)=[{&(0x7f0000000080), 0x0, 0x800}, {&(0x7f0000000200)="ebdcf053f15ea66a2e7b2b9c94663310bc7eb2cd5fab3715d736b28a57257947b2c6c814ce79494aa1fae66cb3f4a87d0bf7f8608f00ea747345ee665f29b55a8034fec83b4c035cffe2db07bc480d78f9fe07017f22e2a57a1dbf144587c69af54aaaacc5b0323f9a148d52d46563a624a13a5131d67467cc4d2e7f3bddada2a804b168f4f6db0e8b7de682a752b01e923a9f5e213e1f14100b4679ae1f62eb689857ba9821d1b0889d0bb7b63382c44857f569c19fad013d2912ea25fbfc362f104ef796217a1084b7397701c7f91fef79b8ebb205d741883f3d", 0xdb, 0x9}], 0x1010000, &(0x7f0000000300)={[{'-%{,'}, {'['}, {'\'}+-*'}, {'^.['}], [{@measure}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') 19:29:41 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = fork() ptrace$peeksig(0x4209, r1, &(0x7f0000000000)={0x7, 0x0, 0xa}, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}]) [ 1494.103080] 9pnet: Insufficient options for proto=fd [ 1494.108083] FAULT_INJECTION: forcing a failure. [ 1494.108083] name failslab, interval 1, probability 0, space 0, times 0 [ 1494.110533] CPU: 0 PID: 8228 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1494.111958] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1494.113687] Call Trace: [ 1494.114239] dump_stack+0x107/0x167 [ 1494.114997] should_fail.cold+0x5/0xa [ 1494.115798] ? create_object.isra.0+0x3a/0xa20 [ 1494.116749] should_failslab+0x5/0x20 [ 1494.117534] kmem_cache_alloc+0x5b/0x360 [ 1494.118378] create_object.isra.0+0x3a/0xa20 [ 1494.119309] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1494.120359] kmem_cache_alloc_trace+0x151/0x360 [ 1494.121324] ? lockdep_init_map_type+0x2c7/0x780 [ 1494.122317] legacy_init_fs_context+0x44/0xe0 [ 1494.123262] ? generic_parse_monolithic+0x1f0/0x1f0 [ 1494.124348] alloc_fs_context+0x4f8/0x840 [ 1494.125266] path_mount+0xa72/0x20b0 [ 1494.126045] ? strncpy_from_user+0x9e/0x470 [ 1494.126986] ? finish_automount+0xa40/0xa40 [ 1494.127963] ? getname_flags.part.0+0x1dd/0x4f0 [ 1494.128958] __x64_sys_mount+0x282/0x300 [ 1494.129812] ? path_mount+0x20b0/0x20b0 [ 1494.130640] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1494.131844] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1494.133078] do_syscall_64+0x33/0x40 [ 1494.133966] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1494.135236] RIP: 0033:0x7f59f791304a [ 1494.136128] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1494.140389] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1494.142256] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f791304a [ 1494.144005] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1494.145483] RBP: 00007f59f4e87040 R08: 00007f59f4e87040 R09: 0000000020000000 [ 1494.146950] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1494.148438] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:29:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4a400, 0x0) [ 1494.190588] 9pnet: Insufficient options for proto=fd [ 1494.203618] SELinux: duplicate or incompatible mount options 19:29:41 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 42) 19:29:41 executing program 5: clone3(&(0x7f0000000300)={0x12000000, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180)=0x0, {0x31}, &(0x7f00000001c0)=""/124, 0x7c, &(0x7f0000000240)=""/102, &(0x7f00000002c0)=[0x0], 0x1}, 0x58) r1 = getpgrp(r0) waitid(0x2, r1, 0x0, 0x8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) waitid(0x0, r2, &(0x7f0000000080), 0x4, 0x0) [ 1494.251493] FAULT_INJECTION: forcing a failure. [ 1494.251493] name failslab, interval 1, probability 0, space 0, times 0 [ 1494.254024] CPU: 1 PID: 8253 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1494.255470] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1494.257201] Call Trace: [ 1494.257750] dump_stack+0x107/0x167 [ 1494.258515] should_fail.cold+0x5/0xa [ 1494.259350] ? create_object.isra.0+0x3a/0xa20 [ 1494.260308] should_failslab+0x5/0x20 [ 1494.261088] kmem_cache_alloc+0x5b/0x360 [ 1494.261926] create_object.isra.0+0x3a/0xa20 [ 1494.262830] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1494.263879] __kmalloc_track_caller+0x177/0x3c0 [ 1494.264840] ? selinux_sb_eat_lsm_opts+0x34e/0x790 [ 1494.265838] ? memcg_slab_post_alloc_hook+0x183/0x3f0 [ 1494.266896] kmemdup_nul+0x2d/0xa0 [ 1494.267631] selinux_sb_eat_lsm_opts+0x34e/0x790 [ 1494.268611] security_sb_eat_lsm_opts+0x4e/0xb0 [ 1494.269565] legacy_parse_monolithic+0x132/0x180 [ 1494.270533] path_mount+0x1376/0x20b0 [ 1494.271335] ? strncpy_from_user+0x9e/0x470 [ 1494.272224] ? finish_automount+0xa40/0xa40 [ 1494.273115] ? getname_flags.part.0+0x1dd/0x4f0 [ 1494.274080] __x64_sys_mount+0x282/0x300 [ 1494.274910] ? path_mount+0x20b0/0x20b0 [ 1494.275756] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1494.276868] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1494.277926] do_syscall_64+0x33/0x40 [ 1494.278695] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1494.279815] RIP: 0033:0x7f59f791304a [ 1494.280635] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1494.284727] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1494.286396] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f791304a [ 1494.287935] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1494.289428] RBP: 00007f59f4e87040 R08: 00007f59f4e87040 R09: 0000000020000000 [ 1494.290914] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1494.292411] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:29:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x200000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:29:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x500, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1494.360194] 9pnet: Insufficient options for proto=fd [ 1494.372370] SELinux: duplicate or incompatible mount options [ 1510.133542] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:30:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xb, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:30:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4a500, 0x0) 19:30:05 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x300, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:30:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x600, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:30:05 executing program 3: perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x20, 0x5, 0x4, 0x20, 0x0, 0x81, 0x0, 0x15, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x10000, 0x2, @perf_bp={&(0x7f0000000000), 0xb}, 0x10, 0x6, 0x7, 0x3, 0x10001, 0x7, 0x7f, 0x0, 0xda, 0x0, 0x5}, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0x3) r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:30:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x300000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:30:05 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 43) 19:30:05 executing program 5: r0 = getpgrp(0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000180)=""/17) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) openat(r3, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0xdd, 0x10000, 0xff, 0x3, 0x7fff, r2}) waitid(0x2, r0, 0x0, 0x8, 0x0) [ 1517.723928] 9pnet: Insufficient options for proto=fd 19:30:05 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x8, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1517.743299] FAULT_INJECTION: forcing a failure. [ 1517.743299] name failslab, interval 1, probability 0, space 0, times 0 [ 1517.745667] CPU: 1 PID: 8394 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1517.747073] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1517.748781] Call Trace: [ 1517.749328] dump_stack+0x107/0x167 [ 1517.750084] should_fail.cold+0x5/0xa [ 1517.750875] should_failslab+0x5/0x20 [ 1517.751684] __kmalloc_track_caller+0x79/0x3c0 [ 1517.752620] ? selinux_sb_eat_lsm_opts+0x34e/0x790 [ 1517.753628] ? memcg_slab_post_alloc_hook+0x183/0x3f0 19:30:05 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4a600, 0x0) [ 1517.754692] kmemdup_nul+0x2d/0xa0 [ 1517.755535] selinux_sb_eat_lsm_opts+0x34e/0x790 [ 1517.756512] security_sb_eat_lsm_opts+0x4e/0xb0 [ 1517.757472] legacy_parse_monolithic+0x132/0x180 [ 1517.758441] path_mount+0x1376/0x20b0 [ 1517.759225] ? strncpy_from_user+0x9e/0x470 [ 1517.760125] ? finish_automount+0xa40/0xa40 [ 1517.761009] ? getname_flags.part.0+0x1dd/0x4f0 [ 1517.761970] __x64_sys_mount+0x282/0x300 [ 1517.762801] ? path_mount+0x20b0/0x20b0 [ 1517.763632] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1517.764711] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1517.765766] do_syscall_64+0x33/0x40 [ 1517.766530] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1517.767583] RIP: 0033:0x7f59f791304a [ 1517.768347] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1517.772120] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1517.773670] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f791304a [ 1517.775114] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1517.776573] RBP: 00007f59f4e87040 R08: 00007f59f4e87040 R09: 0000000020000000 [ 1517.778022] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1517.779499] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 1517.784881] 9pnet: Insufficient options for proto=fd [ 1517.790481] 9pnet: Insufficient options for proto=fd 19:30:05 executing program 3: getpgrp(0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:30:05 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = fork() getpgrp(r2) waitid(0x0, r1, &(0x7f0000000000), 0x20000000, &(0x7f0000000080)) 19:30:05 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x400000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:30:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x6d5, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:30:05 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) pidfd_getfd(r2, r2, 0x0) ptrace$setsig(0x4203, r1, 0x2, &(0x7f0000000000)={0x4, 0x8458, 0x8}) 19:30:05 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 44) [ 1517.983796] ====================================================== [ 1517.983796] WARNING: the mand mount option is being deprecated and [ 1517.983796] will be removed in v5.15! [ 1517.983796] ====================================================== [ 1518.001262] 9pnet: Insufficient options for proto=fd [ 1518.013213] FAULT_INJECTION: forcing a failure. [ 1518.013213] name failslab, interval 1, probability 0, space 0, times 0 [ 1518.015556] CPU: 1 PID: 8426 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1518.016950] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1518.018635] Call Trace: [ 1518.019182] dump_stack+0x107/0x167 [ 1518.019950] should_fail.cold+0x5/0xa [ 1518.020725] ? selinux_add_opt+0x256/0x360 [ 1518.021582] should_failslab+0x5/0x20 [ 1518.022358] kmem_cache_alloc_trace+0x55/0x360 [ 1518.023283] ? __kmalloc_track_caller+0x2d4/0x3c0 [ 1518.024265] ? selinux_sb_eat_lsm_opts+0x34e/0x790 [ 1518.025261] selinux_add_opt+0x256/0x360 [ 1518.026089] selinux_sb_eat_lsm_opts+0x374/0x790 [ 1518.027060] security_sb_eat_lsm_opts+0x4e/0xb0 [ 1518.028018] legacy_parse_monolithic+0x132/0x180 [ 1518.028981] path_mount+0x1376/0x20b0 [ 1518.029767] ? strncpy_from_user+0x9e/0x470 [ 1518.030647] ? finish_automount+0xa40/0xa40 [ 1518.031552] ? getname_flags.part.0+0x1dd/0x4f0 [ 1518.032508] __x64_sys_mount+0x282/0x300 [ 1518.033348] ? path_mount+0x20b0/0x20b0 [ 1518.034159] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1518.035227] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1518.036287] do_syscall_64+0x33/0x40 [ 1518.037043] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1518.038080] RIP: 0033:0x7f59f791304a [ 1518.038834] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1518.042557] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1518.044104] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f791304a [ 1518.045544] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1518.046985] RBP: 00007f59f4e87040 R08: 00007f59f4e87040 R09: 0000000020000000 [ 1518.048439] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1518.049884] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 1518.056030] 9pnet: Insufficient options for proto=fd [ 1532.655877] kmemleak: 23 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:30:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4a700, 0x0) 19:30:28 executing program 3: r0 = getpgrp(0x0) pidfd_open(r0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0}, &(0x7f0000000080)=0xc) getpgid(r0) r4 = getpgrp(0x0) pidfd_open(r4, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000000c0)=0x12) r5 = getpgrp(0x0) pidfd_open(r5, 0x0) r6 = getpgrp(r1) r7 = getpgrp(0x0) pidfd_open(r7, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r8, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r8, 0x330b) clone3(&(0x7f00000003c0)={0x109904680, &(0x7f0000000100), &(0x7f0000000140), &(0x7f0000000180), {0x7}, &(0x7f00000001c0)=""/170, 0xaa, &(0x7f0000000280)=""/106, &(0x7f0000000380)=[r3, 0x0, r7], 0x3, {r8}}, 0x58) waitid(0x2, r6, 0x0, 0x8, 0x0) 19:30:28 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 45) 19:30:28 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x500000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:30:28 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = fork() getpgrp(r2) waitid(0x0, r1, &(0x7f0000000000), 0x20000000, &(0x7f0000000080)) 19:30:28 executing program 5: getpgrp(0x0) r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4ad, 0xfffff801, 0x172, 0x4, 0x8000, 0xffffffffffffffff}) 19:30:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x10, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:30:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x700, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1541.116325] 9pnet: Insufficient options for proto=fd [ 1541.124413] 9pnet: Insufficient options for proto=fd 19:30:28 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x600000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:30:28 executing program 5: getpgrp(0x0) [ 1541.154265] FAULT_INJECTION: forcing a failure. [ 1541.154265] name failslab, interval 1, probability 0, space 0, times 0 [ 1541.157048] CPU: 0 PID: 8557 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1541.158619] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1541.160539] Call Trace: [ 1541.161155] dump_stack+0x107/0x167 [ 1541.161987] should_fail.cold+0x5/0xa [ 1541.162854] ? create_object.isra.0+0x3a/0xa20 [ 1541.163943] should_failslab+0x5/0x20 [ 1541.164795] kmem_cache_alloc+0x5b/0x360 [ 1541.165721] create_object.isra.0+0x3a/0xa20 19:30:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4a800, 0x0) [ 1541.166712] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1541.168017] kmem_cache_alloc_trace+0x151/0x360 [ 1541.169066] ? __kmalloc_track_caller+0x2d4/0x3c0 [ 1541.170163] selinux_add_opt+0x256/0x360 [ 1541.171087] selinux_sb_eat_lsm_opts+0x374/0x790 [ 1541.172197] security_sb_eat_lsm_opts+0x4e/0xb0 [ 1541.173286] legacy_parse_monolithic+0x132/0x180 [ 1541.174362] path_mount+0x1376/0x20b0 [ 1541.175227] ? strncpy_from_user+0x9e/0x470 [ 1541.176241] ? finish_automount+0xa40/0xa40 [ 1541.177222] ? getname_flags.part.0+0x1dd/0x4f0 [ 1541.178287] __x64_sys_mount+0x282/0x300 [ 1541.179202] ? path_mount+0x20b0/0x20b0 [ 1541.180126] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1541.181303] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1541.182467] do_syscall_64+0x33/0x40 [ 1541.183308] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1541.184486] RIP: 0033:0x7f59f791304a [ 1541.185331] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1541.189463] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1541.191175] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f791304a [ 1541.192791] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1541.194394] RBP: 00007f59f4e87040 R08: 00007f59f4e87040 R09: 0000000020000000 [ 1541.196032] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1541.197626] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 19:30:28 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x5, 0x0, 0xf74e, 0x2, 0x20000000, r1}) waitid(0x2, r0, 0x0, 0x8, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000440)) ptrace$peeksig(0x4209, 0x0, &(0x7f0000000000)={0x93a, 0x1}, &(0x7f0000000040)) r2 = getpgrp(r0) tkill(r2, 0x1b) 19:30:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x900, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:30:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4a900, 0x0) 19:30:28 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x700000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) [ 1541.309913] 9pnet: Insufficient options for proto=fd [ 1541.315007] 9pnet: Insufficient options for proto=fd [ 1541.346389] SELinux: duplicate or incompatible mount options [ 1554.539254] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:30:51 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) tkill(0x0, 0x1e) 19:30:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x800000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:30:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xa00, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:30:51 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = fork() getpgrp(r2) waitid(0x0, r1, &(0x7f0000000000), 0x20000000, &(0x7f0000000080)) 19:30:51 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) ptrace$setsig(0x4203, r0, 0xff, &(0x7f0000000300)={0x3e, 0x5a2f8ea6, 0x5b}) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000180)=""/17) clone3(&(0x7f0000000200)={0x420003400, &(0x7f0000000180), &(0x7f0000000040)=0x0, &(0x7f0000000080), {0x3e}, &(0x7f00000000c0)=""/79, 0x4f, &(0x7f0000000140)=""/58, &(0x7f00000001c0)=[r0, r0, r0, r0], 0x4, {r1}}, 0x58) ptrace$setsig(0x4203, r2, 0x9, &(0x7f0000000280)={0x30, 0xfffffffc, 0x680}) syz_io_uring_setup(0x1292, &(0x7f0000000380)={0x0, 0x9c98, 0x4, 0x1, 0x3}, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000400)) r4 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x12, r1, 0x10000000) r5 = syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r6 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r5, 0xa, 0x0, r6) syz_io_uring_submit(r3, r4, &(0x7f0000000440)=@IORING_OP_MADVISE={0x19, 0x1, 0x0, 0x0, 0x0, &(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x15, 0x1, {0x0, r6}}, 0xc5dc) ioctl$RTC_UIE_ON(r1, 0x7003) 19:30:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4aa00, 0x0) 19:30:51 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 46) 19:30:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x700, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1564.325944] FAULT_INJECTION: forcing a failure. [ 1564.325944] name failslab, interval 1, probability 0, space 0, times 0 [ 1564.328326] CPU: 1 PID: 8704 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1564.329721] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1564.331424] Call Trace: [ 1564.331990] dump_stack+0x107/0x167 [ 1564.332754] should_fail.cold+0x5/0xa [ 1564.333552] ? create_object.isra.0+0x3a/0xa20 [ 1564.334502] should_failslab+0x5/0x20 [ 1564.335294] kmem_cache_alloc+0x5b/0x360 [ 1564.336139] create_object.isra.0+0x3a/0xa20 [ 1564.337035] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1564.338062] kmem_cache_alloc_trace+0x151/0x360 [ 1564.339011] selinux_add_opt+0x256/0x360 [ 1564.339839] selinux_sb_eat_lsm_opts+0x374/0x790 [ 1564.341028] security_sb_eat_lsm_opts+0x4e/0xb0 [ 1564.341970] legacy_parse_monolithic+0x132/0x180 [ 1564.342926] path_mount+0x1376/0x20b0 [ 1564.343699] ? strncpy_from_user+0x9e/0x470 [ 1564.344583] ? finish_automount+0xa40/0xa40 [ 1564.345461] ? getname_flags.part.0+0x1dd/0x4f0 [ 1564.346412] __x64_sys_mount+0x282/0x300 [ 1564.347231] ? path_mount+0x20b0/0x20b0 [ 1564.348047] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1564.349099] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1564.350146] do_syscall_64+0x33/0x40 [ 1564.350902] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1564.351955] RIP: 0033:0x7f59f791304a [ 1564.352863] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1564.356556] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1564.358392] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f791304a [ 1564.359844] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1564.361293] RBP: 00007f59f4e87040 R08: 00007f59f4e87040 R09: 0000000020000000 [ 1564.362735] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1564.364177] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 1564.381113] 9pnet: Insufficient options for proto=fd [ 1564.387622] 9pnet: Insufficient options for proto=fd 19:30:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xb00, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1564.402763] SELinux: duplicate or incompatible mount options 19:30:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x900000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:30:52 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ab00, 0x0) 19:30:52 executing program 3: r0 = getpgrp(0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000001100)=0x0) clone3(&(0x7f0000001400)={0x800, &(0x7f0000001140), &(0x7f0000001180)=0x0, &(0x7f00000011c0), {0x5}, &(0x7f0000001200)=""/158, 0x9e, &(0x7f00000012c0)=""/225, &(0x7f00000013c0)=[r0, r0, r0, r0], 0x4}, 0x58) clone3(&(0x7f00000014c0)={0x10000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x34}, &(0x7f00000000c0)=""/4096, 0x1000, &(0x7f00000010c0)=""/64, &(0x7f0000001480)=[0x0, r1, r0, r2], 0x4}, 0x58) waitid(0x2, r0, 0x0, 0x8, 0x0) [ 1564.482799] 9pnet: Insufficient options for proto=fd [ 1564.496115] 9pnet: Insufficient options for proto=fd 19:30:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xa00000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:30:52 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = fork() getpgrp(r2) 19:30:52 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 47) 19:30:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x1020, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1564.613055] FAULT_INJECTION: forcing a failure. [ 1564.613055] name failslab, interval 1, probability 0, space 0, times 0 [ 1564.615514] CPU: 1 PID: 8746 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1564.616904] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1564.618592] Call Trace: [ 1564.619156] dump_stack+0x107/0x167 [ 1564.619905] should_fail.cold+0x5/0xa [ 1564.620701] should_failslab+0x5/0x20 [ 1564.621479] __kmalloc_track_caller+0x79/0x3c0 [ 1564.622419] ? selinux_sb_eat_lsm_opts+0x34e/0x790 [ 1564.623416] kmemdup_nul+0x2d/0xa0 [ 1564.624161] selinux_sb_eat_lsm_opts+0x34e/0x790 [ 1564.625130] security_sb_eat_lsm_opts+0x4e/0xb0 [ 1564.626077] legacy_parse_monolithic+0x132/0x180 [ 1564.627041] path_mount+0x1376/0x20b0 [ 1564.627814] ? strncpy_from_user+0x9e/0x470 [ 1564.628697] ? finish_automount+0xa40/0xa40 [ 1564.629573] ? getname_flags.part.0+0x1dd/0x4f0 [ 1564.630535] __x64_sys_mount+0x282/0x300 [ 1564.631362] ? path_mount+0x20b0/0x20b0 [ 1564.632187] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1564.633246] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1564.634306] do_syscall_64+0x33/0x40 [ 1564.635064] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1564.636135] RIP: 0033:0x7f59f791304a [ 1564.636887] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1564.640606] RSP: 002b:00007f59f4e86fa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1564.642164] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f791304a [ 1564.643603] RDX: 0000000020000000 RSI: 0000000020000080 RDI: 0000000000000000 [ 1564.645063] RBP: 00007f59f4e87040 R08: 00007f59f4e87040 R09: 0000000020000000 [ 1564.646506] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1564.647956] R13: 0000000020000080 R14: 00007f59f4e87000 R15: 0000000020001280 [ 1579.200012] kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:31:14 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) ptrace$setsig(0x4203, r1, 0x7, &(0x7f0000000000)={0x4, 0x8d0b, 0x800}) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r3, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r3, 0x330b) clone3(&(0x7f0000000380)={0x800, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x3f}, &(0x7f0000000140)=""/211, 0xd3, &(0x7f0000000240)=""/222, &(0x7f0000000340)=[r1, r1, r2, r0, r0], 0x5, {r3}}, 0x58) 19:31:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xb00000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:31:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ac00, 0x0) 19:31:14 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) fork() 19:31:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x2000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:31:14 executing program 3: r0 = syz_io_uring_setup(0x51cd, &(0x7f0000000000)={0x0, 0x8a54, 0x10, 0x2, 0x374}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000000080), &(0x7f00000000c0)) r1 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x20010, r0, 0x8000000) syz_io_uring_complete(r1) r2 = getpgrp(0x0) waitid(0x2, r2, 0x0, 0x8, 0x0) 19:31:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x900, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:31:14 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) (fail_nth: 48) [ 1586.847456] SELinux: duplicate or incompatible mount options [ 1586.854354] FAULT_INJECTION: forcing a failure. [ 1586.854354] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1586.857138] CPU: 0 PID: 8875 Comm: syz-executor.6 Not tainted 5.10.153 #1 [ 1586.858546] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1586.860270] Call Trace: [ 1586.860822] dump_stack+0x107/0x167 [ 1586.861580] should_fail.cold+0x5/0xa [ 1586.862376] _copy_from_user+0x2e/0x1b0 [ 1586.863203] kstrtouint_from_user+0xbd/0x220 [ 1586.864113] ? kstrtou8_from_user+0x210/0x210 [ 1586.865074] ? lock_acquire+0x197/0x490 [ 1586.865897] ? ksys_write+0x12d/0x260 [ 1586.866698] proc_fail_nth_write+0x78/0x220 [ 1586.867587] ? proc_task_getattr+0x1f0/0x1f0 [ 1586.868510] ? __fget_files+0x296/0x480 [ 1586.869343] ? proc_task_getattr+0x1f0/0x1f0 [ 1586.870243] vfs_write+0x29a/0xa30 [ 1586.870987] ksys_write+0x12d/0x260 [ 1586.871746] ? __ia32_sys_read+0xb0/0xb0 [ 1586.872598] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1586.873680] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1586.874748] do_syscall_64+0x33/0x40 [ 1586.875518] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1586.876587] RIP: 0033:0x7f59f78c45ff [ 1586.877354] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 fd ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 cc fd ff ff 48 [ 1586.881146] RSP: 002b:00007f59f4e87170 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 1586.882710] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f59f78c45ff [ 1586.884176] RDX: 0000000000000001 RSI: 00007f59f4e871e0 RDI: 0000000000000003 [ 1586.885652] RBP: 00007f59f4e871d0 R08: 0000000000000000 R09: 0000000020000000 [ 1586.887116] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 1586.888586] R13: 00007ffd54db8c7f R14: 00007f59f4e87300 R15: 0000000000022000 19:31:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x2010, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:31:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2000000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:31:14 executing program 5: r0 = getpgrp(0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x1, 0x7, 0x3f, 0x56, 0x0, 0x101, 0xa4002, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0x7}, 0x20, 0x8, 0x8, 0x8, 0x7fffffff, 0x800, 0xff, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x6, 0xffffffffffffffff, 0x2) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000002880)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x8, @dev={0xfe, 0x80, '\x00', 0x33}, 0x7}, 0x1c, &(0x7f0000000280)=[{&(0x7f0000000100)="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", 0xfb}, {&(0x7f0000000200)="4f6fc911da423ec2e0be371c699d87f0d1754f6dfb65afa665ba4b2ed1368453934241880995fa38703dab2320468ac53f65e4f9d21f9b8fdfb0ed9df4e05b2602", 0x41}], 0x2}}, {{&(0x7f00000002c0)={0xa, 0x4e24, 0x3, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x4}, 0x1c, &(0x7f0000000300), 0x0, &(0x7f0000000340)=[@pktinfo={{0x24, 0x29, 0x32, {@dev={0xfe, 0x80, '\x00', 0x31}}}}, @hoplimit_2292={{0x14, 0x29, 0x8, 0x6}}, @dstopts={{0x18, 0x29, 0x37, {0xff}}}], 0x58}}, {{&(0x7f00000003c0)={0xa, 0x4e22, 0x1, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x3}, 0x1c, &(0x7f0000000680)=[{&(0x7f0000000400)="a75032b1dae225508df182f13aed230a079e01015bdf33c9741a6623ad68fc9a9a3167", 0x23}, {&(0x7f0000000440)="376dd2bfe5e2a1a1b4e5987263f55c8b4a04fff68f5ed71c7ce0512234cdf7b1d6f1c5bea2c3f2b9dae04c3d6a306f4a0fe441b56484902316b2c4e0f51b92d0d4cdf6840b7b62904066a4cf1b42755577513d6871e458072a66c069925ed2", 0x5f}, {&(0x7f00000004c0)="e376258f777b7feb8b81f692c1d96351935a2c1f71948324ff924cb9c958cdc9c4254e635cbaf9f74c52a2f4a9bf1fc288ef0b9d7f985099bd81c2bdab9638f27e43b79214dc1b7d42831226bc06d104f88b1854a73012de416662ea85ef2cd797dc5c239d99fa8a988d24f7bbc532383c84b4b542572c44becbb52ce9162d8cc0080f275af89278dd84c47f3fafae5aff072a36ab94312cf966cc1ead8f837dde436522f4647bc7cf", 0xa9}, {&(0x7f0000000580)="e2732ab78477b3d518c06f9e2fca07648a51df2803c522b120065b174f786a7ed7cc80f3fb04ef7540591fc71bcfef11c98ee33813ecdb4264c0b7ec8b972e466be13e70f709409816dbe81ec4ed958f53e075e2b231a9c0238af807b96c94926dcc2d0a852f7501dc4d9a3242f087d1c6ad13331d21cf354ae1754a4a60a198104f3d689be884c3a5ac2ac2082695e1b6897e57def18c928d500d9f06b8e77263105083204f793be6a81e5c054c180c5e2c437c2819d1a319e796f6d81485fe7965a01a748cbdb84a9fa59809d9abfd7849c319240f08920aeae2573b7b06f2ddecb1", 0xe3}], 0x4, &(0x7f00000006c0)=[@dstopts_2292={{0x20, 0x29, 0x4, {0x16, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0x580}]}}}, @dstopts={{0x1d0, 0x29, 0x37, {0x84, 0x36, '\x00', [@calipso={0x7, 0x38, {0x2, 0xc, 0x1f, 0x1, [0x5, 0x3b, 0x56c, 0xffffffffffffffff, 0x8, 0x5]}}, @generic={0x40, 0xe5, "7ef52962646426661cd14af1fd575853791088ab615b521df2fd61a6a24f1030ddebe239cac1819127e3f21b9de475d9429081dc9f6b4a2aee398c4443bef2c827f367bab62de670ac20f61bd69155e882a55f5860933a2a407c3469e41d33eda763e654e513ce9124680b362edbbbbf4fd6e499b8b7ce099917b9692aba34f946def0b66593a9ddfcdedae5c27ed7d6543843379d0b958824cd4f57462f643fc2f01a724397f1eaabcd55bc980b4b082fac872a5b849fd8fe38b28916de2fbe1174af96e93da8156702db206e8296fb49a7ef3d47240b787c20b5aef399dc4a419a7d9fa5"}, @generic={0xff, 0x89, "d49b8efa3e6de31cc581cce133d6ebb5dc0a72911610795308872c0069f410571c1410b4a1be94915d8c323a7eda747a359cb89b04ec26292a1dccd5e0d4d059d488e3b204a2a869f04c988c6d43fbc6e83bfbf3b18838b7bac2956c1058c437baf6b79d33c1da7d48b55fbeea84ff0ea441c3c50a20104c1ed25986e715a755143c2d3f7ac13c04d8"}, @jumbo={0xc2, 0x4, 0x6}]}}}, @rthdr_2292={{0x28, 0x29, 0x39, {0x1, 0x2, 0x1, 0x80, 0x0, [@dev={0xfe, 0x80, '\x00', 0x24}]}}}, @flowinfo={{0x14, 0x29, 0xb, 0x7}}, @flowinfo={{0x14}}, @rthdrdstopts={{0x30, 0x29, 0x37, {0x21, 0x3, '\x00', [@enc_lim, @jumbo={0xc2, 0x4, 0xf4}, @enc_lim={0x4, 0x1, 0xef}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @padn={0x1, 0x2, [0x0, 0x0]}]}}}], 0x278}}, {{&(0x7f0000000940)={0xa, 0x4e22, 0xfa43, @mcast2, 0x7}, 0x1c, &(0x7f0000001ec0)=[{&(0x7f0000000980)="0764eaabafcdecc0d6d33dfc20fe7b991b4f0d0e6908f9e51d453d11de90ae55110fd9aee3a4200429503a574188bfbf2088660fbfa52d60d5760ba7e5a7469de7927f896f5c1ceae687a6ab93bcf200411fe25fad7dbe46825a7db50f29526330", 0x61}, {&(0x7f0000000a00)="1883f968dba95e80a596584a9660fd2952f613db8bb23b1f3cecdace0e75d21c38ece100982500e36487aaafe7db58611e524c", 0x33}, {0xffffffffffffffff}, {&(0x7f0000000a40)="11cfba2d8965b885f2280f784483bd95ff9f19d059cf22ead07deaec99dadcea60742a6fc84489fd6756d703716b370882ba5ae97c194ede1e9e05e2e2b8e81296715e25c3bbc79c72b0a9d97bda6b98c4808ac3b3baf6af3a13795bf3900504246f79dac67d0e94465d", 0x6a}, {&(0x7f0000000ac0)="ea5e233fd3085923863cc1ffe710245ee269c620ed4dd2df4ab34cd059226c29b53728bdace66aed1d5be1de902b4b5fadef1356793a48d6ffb725213354c349131e200ee882660b6a287bd3164b5a310a931f27b371a1f3dbfb2ca148fb5eec8b5f6366ecf19d23ba3f83c212c2674cf86fe04c87ca2f354b3d089ce30d2455debac34c3d56cfde6592e62ced8d9f9529838d169f0584246111f419ba56399796a67f36e6b08efde3394168a42cb221ae73092d8c0c5dcb20b85de6c42f7224", 0xc0}, {&(0x7f0000000b80)="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", 0x1000}, {&(0x7f0000001b80)="93a5769b1b9fa6088f24384b37d254bfbc843aa0a76fb053b61b03c919de7cdf25391858aed12a771a620173151e517d3c7c72524f2aead401f0d9bdc6bd7efd7a2183fd1f965ab664c83b82eb17c2f35a981e5b34e4786d67952dbd381d0b2e0279cd971e33c6c860ad95a1d8c74874d5ce87aefa9310e097ff41b0c79a5a9feeefeaa97b1e51b7d619edfa99849d15cacebf3079e5b75a6dd2539d87fb65ddd58390d21b2b114243a9", 0xaa}, {&(0x7f0000001c40)="19cc8668840e6c4bc601597472edaa88298d3cacf1692ea73817625a3f68b949f09d6e370184f7def8a245de07cd21b49f2fe65636a2d5f0e09e0c95cb38475e17b001d74afe442730facb393e222c86fd025a72ea8faa58ec5f8302a49051e07f7c7961c1bd", 0x66}, {&(0x7f0000001cc0)="09b7e97ba7c3af748afe18e60526eb4681b113757ce6531116eb644bda4b25a018322e3f04f68d3ccba5419585524e26d2c10e80196d66863d2ee550c5294f5e1e461333fa181258f8dfb578b303ede473ff988506bad404800f51700e2c7ca58611b37105f425199c3be3e7c36481d1ffa15d69ec2d826c1d59d30f388677be0a4bbb0b44f7c6931f15c2b0d193d096d696203b38eb2c713fff59942994f3ce627fb60010c444934941a04f6a9083f70630cdb9fc2521d26708769585c549932b5024e2bee42aa6cd2480bc6ab409c6505556c512d873d4ea9f025c9910e96823041f24848f51eff677ac69d751dedec52ed96212d69f7edb46e0", 0xfb}, {&(0x7f0000001dc0)="b683cbe2b16b591886416545f2602cf5f19c675ce75647628dc3926c26c0f7acbcb78ba7b1c81633c62e09df4b0fbd101858e9b01540e0b2df3f96f9972e3fd6ab1129420abee252a9e530d0d45bece0c8f666ad6b4c7e31ea6617b563f0195b739e382a1a9c4e209950e3a6496ac8bdfda61ca174b4e51b137796d9b7553a128e6ca600913626b3eb016a977a570c581cd1746e14f78e300f89877aade10b067748033e2b4df8710838a04278262c47c8ba96c32c4ba1e98b8c071e0f27fd652494d89d300f6ac4bf7c7156f7613f00e39b4a016911dc5869c8bc98f240", 0xde}], 0xa, &(0x7f0000001f80)=[@rthdr_2292={{0x78, 0x29, 0x39, {0x5c, 0xc, 0x1, 0xff, 0x0, [@ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @loopback, @empty, @local, @remote, @mcast2]}}}, @rthdr={{0x48, 0x29, 0x39, {0x84, 0x6, 0x1, 0x40, 0x0, [@local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}]}}}, @dstopts={{0xa8, 0x29, 0x37, {0xe5, 0x11, '\x00', [@generic={0xe4, 0x53, "e441122423ee376c66afe29908e326d897c20a942be79b0fc2d1265e919292ba84dbd2ad5028130f2ea674642f9b691604a1f44f4b9f9683a232af3c47f123b5ee5d15d84be078ab7257de1dd76f3ca8893861"}, @calipso={0x7, 0x38, {0x3, 0xc, 0x4, 0x8, [0xffffffffffff7fff, 0x1, 0x4, 0x9, 0x1, 0x8]}}]}}}, @rthdr={{0xa8, 0x29, 0x39, {0x6, 0x12, 0x2, 0x5, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @remote, @mcast2, @local, @local, @remote, @local, @dev={0xfe, 0x80, '\x00', 0x35}, @mcast1]}}}, @rthdr_2292={{0x38, 0x29, 0x39, {0x89, 0x4, 0x2, 0x1, 0x0, [@mcast2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02']}}}, @rthdr_2292={{0x48, 0x29, 0x39, {0x21, 0x6, 0x2, 0x5, 0x0, [@dev={0xfe, 0x80, '\x00', 0x43}, @ipv4={'\x00', '\xff\xff', @broadcast}, @private0={0xfc, 0x0, '\x00', 0x1}]}}}], 0x290}}, {{&(0x7f0000002240)={0xa, 0x4e20, 0x7fff, @mcast2, 0x7fffffff}, 0x1c, &(0x7f0000002480)=[{&(0x7f0000002280)="463bd97f50af5fe445f679616542eedc4a009b31c30641fe85000d0be58a287a2de8058e1b8eed469641b39603376b50f2be87ab21422e94a770769cf139e08bef9315d2bc2d9c0113b6ca4ad03b8e8856ae34ce4647c6ee8bc12b8ab2edd8b406ae13549a61a4387363fe4d716af804aad31f49521de784d42040fa08a0bdcc2d0bbc5997221562391252a21e592f915c7b45514e0af03ffe194e543e99017f4141e519ebdd24c76b2dd0", 0xab}, {&(0x7f0000002340)="74509c72870388335bfbfd9bdf182c72038b6155ca4b057ead838ff2d29dc8ab5550328194efdd1a62a6ac08a80f1285116f3eabcc6fedf3bb41145e61acaadfbd2c925cbdf2388a43871ce5386717066d3a714696c422f1fd11e26e0f60c383ad803e75f0167afb160da387e1227fdca1ea971f22b212fa41e3c5929b0d389f1260c480951c5c01b40f5fbbe5bbbab4d4b1c749c8753f03889149", 0x9b}, {&(0x7f0000002400)="599a228355847ba22d814e0eeb232b16c1001cb7d2aa9375e16a6ab425f828db6d4cf6bbdadf46d55e2f8d8bd38325cf73d0fb8a966457fa1b006e1098e34fe76f6dd0593543105e4ee76eb5f9bdb485515ba020b5126aa2662755d1b8a98ca5335c7170bceacb1d7b1893a5730fba0a4f1fea5b8f1ccf3e3d", 0x79}], 0x3, &(0x7f00000024c0)=[@tclass={{0x14, 0x29, 0x43, 0x3f}}, @pktinfo={{0x24, 0x29, 0x32, {@local}}}, @hoplimit={{0x14, 0x29, 0x34, 0xff}}, @dontfrag={{0x14, 0x29, 0x3e, 0x6}}, @hoplimit={{0x14, 0x29, 0x34, 0xffff}}, @rthdr={{0x38, 0x29, 0x39, {0x11, 0x4, 0x0, 0x5, 0x0, [@private1, @private1={0xfc, 0x1, '\x00', 0x1}]}}}, @hopopts_2292={{0x140, 0x29, 0x36, {0x6c, 0x24, '\x00', [@pad1, @jumbo={0xc2, 0x4, 0x7f}, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x6}, @generic={0x40, 0xd, "5f15def34f51e2793dd0230034"}, @generic={0x6, 0xd1, "2f1dd31ed55e7a0bbdef5e0b2f9101e52e63f2ab98b4283c9408d60b3e66b64668be2f04cc528c65940565859159afdd67b76ddb567c2369f0b533040d6695c623a4e06e62634c7524cd861a2907de20ed491e10793d4a9415810f80412050f9bfed4b16cd8beae8826bc30784c1e0e3f7cfeae0b0ea2c15e192e3343e930b10771fcf3e657f1f500709715c2c744823952faf66225c25258f1e4a064409de61dd01aaa0e5d84daf5483083adfa055a2f9831ed6778b2fe962b027410f443959b25a27e315e0b6eb94f02f783b2dfdd0c1"}, @hao={0xc9, 0x10, @remote}, @jumbo={0xc2, 0x4, 0xfffffffd}, @hao={0xc9, 0x10, @mcast2}]}}}, @hopopts_2292={{0x30, 0x29, 0x36, {0x58, 0x2, '\x00', [@pad1, @ra={0x5, 0x2, 0xc240}, @enc_lim={0x4, 0x1, 0x1}, @padn={0x1, 0x2, [0x0, 0x0]}, @pad1]}}}, @dstopts={{0x168, 0x29, 0x37, {0x3c, 0x29, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00'}, @padn={0x1, 0x2, [0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x1000}, @pad1, @enc_lim={0x4, 0x1, 0x8}, @calipso={0x7, 0x38, {0x0, 0xc, 0x1, 0x6, [0x1b01, 0x6, 0x0, 0x6, 0x3, 0x5]}}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @jumbo={0xc2, 0x4, 0x3}, @generic={0x3, 0xd4, "dedc90e83711944f7cc6dbde35ee88dadc43d34e4468ed434fd9f9d3a597dac985dd97b5a16360c21b54e13bd9babfa18b89c7eb5765a59d940caa238b2f41d0fc70d3baf987aa8122ca36bd736d3276b1da3797201208eecc4602a811378d8c3a4176580bedc03d9fe100a10b3dcd746bb6aa169d25445e2d745c5fa4aa39c85b185960de6622bc3d6b39249a287f5e4a47ea6d2d5a7ec856aa53b25aaa8c3ad662d0c547ace4951ff1ae74f5561f6ef956408ffb2421e48b594ec365e075e7eb0e56f4de9f57a676f1f2384c2b4cb617bbb63b"}]}}}], 0x398}}], 0x5, 0x2000) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:31:14 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) getpgrp(0x0) fork() 19:31:14 executing program 3: r0 = getpgrp(0x0) pidfd_open(r0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = getpgrp(r1) waitid(0x2, r2, 0x0, 0x8, 0x0) 19:31:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2010000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:31:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xd506, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:31:14 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:31:14 executing program 5: r0 = fork() r1 = getpgrp(r0) r2 = getpgrp(r1) waitid(0x2, r2, 0x0, 0x8, 0x0) 19:31:14 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) fork() [ 1587.125686] SELinux: duplicate or incompatible mount options [ 1603.055743] kmemleak: 22 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:31:38 executing program 3: r0 = getpgrp(0x0) pidfd_open(0x0, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:31:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ad00, 0x0) 19:31:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x8cffffff00000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:31:38 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:31:38 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:31:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xedc0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:31:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xa00, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:31:38 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r3, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r3, 0x330b) pidfd_getfd(r3, r2, 0x0) ptrace$setopts(0x4200, r1, 0x100000000, 0x2) waitid(0x2, r0, 0x0, 0x8, 0x0) [ 1610.821501] SELinux: duplicate or incompatible mount options [ 1610.838230] SELinux: duplicate or incompatible mount options 19:31:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x80000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:31:38 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) pidfd_open(r1, 0x0) 19:31:38 executing program 5: r0 = getpgrp(0x0) sched_getattr(r0, &(0x7f00000000c0)={0x38}, 0x38, 0x0) wait4(r0, 0x0, 0x1, &(0x7f0000000000)) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:31:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xef08000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:31:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ae00, 0x0) 19:31:38 executing program 7: getpgrp(0x0) fork() 19:31:38 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:31:38 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0xf6ffffff00000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:31:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xe0ffff, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1611.028836] SELinux: duplicate or incompatible mount options [ 1611.037929] SELinux: duplicate or incompatible mount options [ 1623.711109] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:31:58 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r1, r0) splice(0xffffffffffffffff, &(0x7f0000000000)=0x7, r0, &(0x7f0000000040)=0x4, 0x5, 0xc) getpgrp(0x0) 19:31:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xb00, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:31:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x2, &(0x7f00000002c0)) 19:31:58 executing program 7: getpgrp(0x0) fork() 19:31:58 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x4, 0x0) tkill(r0, 0x2c) r1 = getpgrp(r0) setpgid(r0, r1) 19:31:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4af00, 0x0) 19:31:58 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:31:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x1000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1631.108706] 9pnet: Insufficient options for proto=fd [ 1631.110158] 9pnet: Insufficient options for proto=fd [ 1631.122801] SELinux: duplicate or incompatible mount options [ 1631.131797] 9pnet: Insufficient options for proto=fd [ 1631.135267] 9pnet: Insufficient options for proto=fd [ 1631.138349] SELinux: duplicate or incompatible mount options 19:31:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4b000, 0x0) 19:31:58 executing program 3: r0 = getpgrp(0x0) clone3(&(0x7f0000002280)={0x121892000, &(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100), {0x35}, &(0x7f0000000140)=""/4096, 0x1000, &(0x7f0000001140)=""/4089, &(0x7f0000002140)}, 0x58) waitid(0x2, r0, 0x0, 0x40000000, 0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {0x20}}, './file0\x00'}) dup(r3) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, 0xffffffffffffffff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff, 0x7f}) 19:31:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x3, &(0x7f00000002c0)) 19:31:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x2000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:31:58 executing program 7: getpgrp(0x0) fork() 19:31:58 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x5, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:31:58 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x5, 0x558, 0x1f, 0x0, 0x8, r0}) [ 1631.288584] 9pnet: Insufficient options for proto=fd [ 1631.292098] 9pnet: Insufficient options for proto=fd [ 1631.308540] SELinux: duplicate or incompatible mount options 19:31:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x4, &(0x7f00000002c0)) [ 1631.317647] SELinux: duplicate or incompatible mount options 19:31:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x3000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1631.388266] 9pnet: Insufficient options for proto=fd [ 1631.391443] 9pnet: Insufficient options for proto=fd [ 1631.401186] 9pnet: Insufficient options for proto=fd [ 1631.403648] 9pnet: Insufficient options for proto=fd [ 1646.896399] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:32:22 executing program 5: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x101, 0x0) write$P9_RUNLINKAT(r0, &(0x7f0000000040)={0x7, 0x4d, 0x2}, 0x7) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000000080)=0x0) clone3(&(0x7f00000002c0)={0x8000000, &(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000140), {}, &(0x7f0000000180)=""/153, 0x99, &(0x7f0000000240)=""/22, &(0x7f0000000280)=[r1, 0xffffffffffffffff, 0xffffffffffffffff, r1, r1, r1], 0x6, {r0}}, 0x58) r3 = getpgrp(r2) waitid(0x1, r3, 0x0, 0x2, 0x0) 19:32:22 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = clone3(&(0x7f0000001140)={0x200600, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f00000000c0)=""/4096, 0x1000, &(0x7f00000010c0)=""/22, &(0x7f0000001100)=[r0, r0, r0, r0], 0x4}, 0x58) ptrace$setsig(0x4203, r1, 0x8, &(0x7f00000011c0)={0x33, 0x7, 0x7}) 19:32:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x1020, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:32:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x5, &(0x7f00000002c0)) 19:32:22 executing program 7: process_vm_readv(0x0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:32:22 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x6, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:32:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x4000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:32:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4b100, 0x0) [ 1654.749218] SELinux: duplicate or incompatible mount options [ 1654.756878] 9pnet: Insufficient options for proto=fd [ 1654.760497] SELinux: duplicate or incompatible mount options [ 1654.762438] 9pnet: Insufficient options for proto=fd [ 1654.776633] 9pnet: Insufficient options for proto=fd 19:32:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x6, &(0x7f00000002c0)) 19:32:22 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x7, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:32:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x5000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1654.863134] 9pnet: Insufficient options for proto=fd 19:32:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4b200, 0x0) [ 1654.881532] 9pnet: Insufficient options for proto=fd 19:32:22 executing program 7: process_vm_readv(0x0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 1654.930428] SELinux: duplicate or incompatible mount options [ 1654.938670] SELinux: duplicate or incompatible mount options [ 1654.940209] 9pnet: Insufficient options for proto=fd [ 1654.954810] 9pnet: Insufficient options for proto=fd 19:32:37 executing program 5: r0 = getpgrp(0x0) r1 = gettid() process_vm_writev(r1, &(0x7f0000002100)=[{&(0x7f0000000000)=""/243, 0xf3}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/4096, 0x1000}], 0x3, &(0x7f00000023c0)=[{&(0x7f0000002140)=""/206, 0xce}, {&(0x7f0000002240)=""/164, 0xa4}, {&(0x7f0000002300)=""/188, 0xbc}], 0x3, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r2 = syz_open_dev$vcsu(&(0x7f0000002480), 0x2, 0x125002) perf_event_open(&(0x7f0000002400)={0x2, 0x80, 0xfa, 0x92, 0x8, 0x3f, 0x0, 0x1f, 0x200, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x4, @perf_config_ext={0x1ff, 0x1}, 0x880, 0x6, 0xfffffffe, 0x3, 0x5, 0x1ff, 0x3, 0x0, 0x7, 0x0, 0x3d}, r1, 0xd, r2, 0xb) 19:32:37 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x7, &(0x7f00000002c0)) 19:32:37 executing program 7: process_vm_readv(0x0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:32:37 executing program 3: waitid(0x2, 0x0, 0x0, 0x8, 0x0) 19:32:37 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:32:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x6000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:32:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4b300, 0x0) 19:32:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x2000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1669.924884] SELinux: duplicate or incompatible mount options [ 1669.929084] 9pnet: Insufficient options for proto=fd [ 1669.932101] SELinux: duplicate or incompatible mount options [ 1669.934193] 9pnet: Insufficient options for proto=fd 19:32:37 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x8, &(0x7f00000002c0)) 19:32:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x7000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:32:37 executing program 3: r0 = getpgrp(0x0) waitid(0x0, r0, 0x0, 0x40000004, 0x0) clone3(&(0x7f0000000380)={0x18100, &(0x7f00000000c0)=0xffffffffffffffff, &(0x7f0000000100), &(0x7f0000000140)=0x0, {0x1}, &(0x7f0000000180)=""/163, 0xa3, &(0x7f0000000240)=""/255, &(0x7f0000000340)=[r0, r0, r0, r0, 0x0], 0x5}, 0x58) tgkill(r2, r0, 0x2a) getpgrp(r0) r3 = fcntl$getown(0xffffffffffffffff, 0x9) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000080)={0xffffffffffffffff, 0x2, 0xc2, 0x8}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000400)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_WAIT_SYNC(r1, 0x40089416, &(0x7f0000000600)=r5) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x1f, 0x0, 0x0, 0x0, 0x1, 0x400, 0x4, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x1, @perf_config_ext={0x5, 0x3}, 0x11, 0x6, 0x9, 0x1, 0x7, 0x3738, 0x7, 0x0, 0x9, 0x0, 0x5}, r3, 0x6, r4, 0x9) 19:32:37 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x300, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:32:37 executing program 5: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES32=0xffffffffffffffff, @ANYBLOB="03000000000000002e2f66696c653000"]) recvmsg$unix(r0, &(0x7f0000000200)={&(0x7f00000002c0), 0x6e, &(0x7f0000000040)=[{&(0x7f0000000080)=""/134, 0x86}, {&(0x7f0000000280)=""/55, 0x37}], 0x2, &(0x7f0000000000)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x20}, 0x40012001) r2 = getpgrp(r1) waitid(0x2, r2, 0x0, 0x8, 0x0) [ 1670.032202] 9pnet: Insufficient options for proto=fd [ 1670.036085] 9pnet: Insufficient options for proto=fd 19:32:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4b400, 0x0) [ 1670.049101] 9pnet: Insufficient options for proto=fd [ 1670.050998] 9pnet: Insufficient options for proto=fd 19:32:37 executing program 7: getpgrp(0x0) process_vm_readv(0x0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:32:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x2010, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1670.100952] SELinux: duplicate or incompatible mount options [ 1670.106194] SELinux: duplicate or incompatible mount options 19:32:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x8000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:32:37 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x9, &(0x7f00000002c0)) [ 1670.149316] cgroup: fork rejected by pids controller in /syz7 19:32:37 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(0x0) prlimit64(r1, 0xf, &(0x7f0000000000)={0x10000}, &(0x7f0000000040)) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:32:37 executing program 5: r0 = getpgid(0x0) r1 = getpgrp(r0) waitid(0x2, r1, 0x0, 0x8, 0x0) [ 1670.195419] 9pnet: Insufficient options for proto=fd [ 1670.202650] 9pnet: Insufficient options for proto=fd [ 1670.222606] 9pnet: Insufficient options for proto=fd [ 1670.234410] 9pnet: Insufficient options for proto=fd [ 1684.291392] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:33:00 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x500, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:33:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xedc0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:33:00 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = getpgrp(0x0) r4 = pidfd_open(r3, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f00000011c0)) r5 = syz_open_dev$vcsu(&(0x7f0000001240), 0x6, 0x80000) r6 = getpgrp(0x0) r7 = pidfd_open(r6, 0x0) clone3(&(0x7f0000001280)={0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x3f}, &(0x7f00000000c0)=""/241, 0xf1, &(0x7f00000001c0)=""/4088, &(0x7f0000001200)=[r0, r1, 0x0, 0xffffffffffffffff, 0x0, r3, r0, r3], 0x8, {r5}}, 0x58) r8 = getpgrp(0x0) waitid(0x2, r8, 0x0, 0x2, 0x0) r9 = accept(r5, &(0x7f0000001300)=@in6={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000001380)=0x80) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r5, 0xc018937e, &(0x7f00000014c0)={{0x1, 0x1, 0x18, r4, @out_args}, './file0\x00'}) ioctl$sock_inet_SIOCGIFPFLAGS(r10, 0x8935, &(0x7f0000001500)={'veth1_macvtap\x00'}) openat$cgroup_devices(r5, &(0x7f0000001540)='devices.deny\x00', 0x2, 0x0) r11 = dup3(r2, r7, 0x80000) r12 = fcntl$dupfd(r11, 0x406, r4) ioctl$sock_SIOCGIFVLAN_SET_VLAN_FLAG_CMD(r12, 0x8982, &(0x7f0000001480)={0x7, 'gre0\x00', {0x5}, 0x3}) ioctl$sock_inet_SIOCRTMSG(r9, 0x890d, &(0x7f0000001400)={0x0, {0x2, 0x4e24, @rand_addr=0x64010100}, {0x2, 0x4e24, @multicast2}, {0x2, 0x4e20, @private=0xa010101}, 0x200, 0x0, 0x0, 0x0, 0x2, &(0x7f00000013c0)='veth0_virt_wifi\x00', 0x400, 0x101, 0xa1cd}) 19:33:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xa, &(0x7f00000002c0)) 19:33:00 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4b500, 0x0) 19:33:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x9000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:33:00 executing program 7: getpgrp(0x0) process_vm_readv(0x0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:33:00 executing program 3: r0 = getpgrp(0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r1, 0x330b) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000000)={'\x00', 0x83, 0x9, 0x0, 0x7, 0x9, r0}) waitid(0x2, r0, 0x0, 0x8, 0x0) [ 1692.798179] 9pnet: Insufficient options for proto=fd [ 1692.799766] SELinux: duplicate or incompatible mount options [ 1692.802599] 9pnet: Insufficient options for proto=fd [ 1692.806040] SELinux: duplicate or incompatible mount options [ 1692.815920] 9pnet: Insufficient options for proto=fd [ 1692.818690] 9pnet: Insufficient options for proto=fd [ 1706.817963] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:33:22 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x600, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:33:22 executing program 5: ioctl$FS_IOC_GET_ENCRYPTION_KEY_STATUS(0xffffffffffffff9c, 0xc080661a, &(0x7f0000000000)={@desc={0x1, 0x0, @auto="fbd42f7bd8c86d93"}}) r0 = getpgrp(0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r1, 0x330b) openat2(r1, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)={0x505882, 0x1, 0x14}, 0x18) waitid(0x2, r0, 0x0, 0x8, 0x0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x4, 0x7, 0xe1, 0x8, 0x0, 0x512, 0x80, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x401, 0x1, @perf_config_ext={0x9, 0x71eaf1e4}, 0xc9, 0x9777, 0x81, 0x8, 0x5, 0x9e, 0x7ffe, 0x0, 0xb9c9, 0x0, 0xc7}, r2, 0x10, 0xffffffffffffffff, 0x1) 19:33:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x80000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:33:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xb, &(0x7f00000002c0)) 19:33:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xa000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:33:22 executing program 7: getpgrp(0x0) process_vm_readv(0x0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:33:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4b600, 0x0) 19:33:22 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x1f, 0x1, 0x6, 0x3, 0x0, 0x7, 0x64504, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xe8e5, 0x4, @perf_bp, 0x880a, 0x2, 0x7f, 0x6, 0x2, 0x7, 0x9, 0x0, 0x6, 0x0, 0x80000000}, r0, 0x10, 0xffffffffffffffff, 0x9) [ 1714.842000] SELinux: duplicate or incompatible mount options [ 1714.843555] 9pnet: Insufficient options for proto=fd [ 1714.857092] 9pnet: Insufficient options for proto=fd [ 1714.860152] SELinux: duplicate or incompatible mount options [ 1714.865595] 9pnet: Insufficient options for proto=fd [ 1714.871312] 9pnet: Insufficient options for proto=fd 19:33:22 executing program 5: getpgrp(0x0) r0 = getpgrp(0x0) pidfd_open(r0, 0x0) waitid(0x0, r0, 0x0, 0x2, 0x0) ptrace$setsig(0x4203, 0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x3d, 0xfffffffe, 0x6f}) 19:33:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x300, &(0x7f00000002c0)) 19:33:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4b700, 0x0) 19:33:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xb000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:33:22 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x700, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:33:22 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, 0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:33:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x1000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 1715.045860] 9pnet: Insufficient options for proto=fd [ 1715.051930] 9pnet: Insufficient options for proto=fd [ 1715.063280] 9pnet: Insufficient options for proto=fd 19:33:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x10000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:33:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x500, &(0x7f00000002c0)) [ 1715.108867] SELinux: duplicate or incompatible mount options [ 1715.117581] SELinux: duplicate or incompatible mount options [ 1715.134075] 9pnet: Insufficient options for proto=fd 19:33:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4b800, 0x0) [ 1715.147307] 9pnet: Insufficient options for proto=fd [ 1715.155942] 9pnet: Insufficient options for proto=fd [ 1730.257650] kmemleak: 29 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:33:46 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x2000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:33:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x20000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:33:46 executing program 5: r0 = getpgrp(0x0) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000380), 0x160160, 0x0) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) r4 = clone3(&(0x7f0000000100)={0x20100000, &(0x7f0000000080), &(0x7f0000000040), &(0x7f00000000c0), {0xb}, &(0x7f0000000480)=""/202, 0xca, &(0x7f0000000180)=""/180, &(0x7f0000000240)=[r0, r0, r2, r0, r0, r0], 0x61, {r1}}, 0x58) capget(&(0x7f0000000300)={0x20071026, r4}, &(0x7f0000000340)={0xff, 0xf9b0, 0x0, 0xb94f, 0x3, 0x7fff}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r1, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, r3, {0xffffffffffffffff, 0xffffffffffffffff}}, './file0\x00'}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {}, {0x0, @struct, 0x0}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000900)={r6, 0x3ff, 0x20}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000440)={r6, 0x7, 0x5, 0x1}) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f0000000740)={0x0, 0xc24, @start={r6, 0x0, "b777a7c782a07d7a5606bb2105f57e37d80f6dafd4273298b6f18663b341585c5e79008a012fa435f87347e66d25cff0cb73789ce7308fcd0c3130c4afa34aa2ea6579e2a17aef3fdb43d5561c942ffd34153516cf46b516466989b270d2017fe9bcaf190b2c684b5d4b56f3e77e865c9965366cd481928c3636964ba529539f0857dbe1b8f8853fc802fb9e9f75b0b1eca6990d7778c09fe67615872d7bd30fb2cd9949087cb0fe88f12a470720785fdfa5b5f070c9703b76128278bcb21c3f25ce2e3c1d3b6d4baffad82e2bc9fb072068346f4a35e27e594bfbd5fc63bb4bddc44c5ec368aa627d203cce1a7985b23a6283fc5eb6450c0ecb7d1360fa0eca18fcd731f691573b048813e1138dcfaf576a6093f1cfa7f733e2cf071ed7a8ae25b8158aa3594e0171da69b95c8ebd0b1062243da8662568d694dd61c1bee50b82d53ca5a08ec8f77cd68ccf80ec8809770b0ecc10c8153f747945dcbafb9736217ba4c7c97b87a22055a01700c6f4004ac1dc848d939872e3ff0aa9a969ca143a4e71ab05e7a0dd1b221e22b2ce069f405318adafdc51e1de51ac1a3876c550085fcd85710c200cc0c144f2603afd8b3eb2ee231a3ccf485f9e78d75517a3c10007379f6ccfc3a6ba926c5ef8271e4c8fa79ce8c462fe5e183582d1b8ba431a82f52a1d18ff0a736f4599602f9d79400b5e19bdf601b34065abac61089f7a3671efe49d7cf695254afd34a966c87d5f7f94e0189c6acac472b033334c579c74a214013dcf805f6031589dc41f41bbddf8b61bc1b49bc800aedfc273163ba99ea1524aca02fad4005ee36c48783b4c95a49ae3eae9a67833028f3bda6cf25f3f801ed3916d8d426b45309b4bd2383370468f2a79eefc133e93a7b95459582253794b4bdeb431c891e52ae677ce78599687b2eb58db95b5ad0e4be7cec5fc71f104b935ba279f1c2d25b4a7c9ae6874f9663d759ccc262366764974b4c462b9e748edcbfa5083872c94b5925f56dc743d2737740c21ff5bf9dc51de12874cc727a46b8855e14aa1c66114d42146686c30c11b02a196d89ff0e984ccc7dc03ac2c0da4a7213aa6003c3290f2b48281ff5adc27df5566ed320b37cc75f15b8307a32dadd0fd5309b679be4bdf5efc485fbcdcd6844c72b1feb8ac2d2e9927db8d99a24415df295efd4520ebaeddec9bede400254ea9814807e3cbdcf6cd42860664927bccda7b41e27dbc15704f683ca1b7aae1b2c5601485764e1537ba227ae758285b19ced33dfd8419fd6016e3176432b59e89f344da999f25c28ba736b484dc6cc3588be6a38c31849b1b67ba4d05e8fc138645833cde91a76a9162c4469f95750a053f1753c843bc1761747bb96304a82472588de8f56b2c9e5f3bc920f1ae8c98e279f4c2dc761cfb7390e18eeb077abd183831322b80170d2e0d980cb9748f", "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"}, [0x2, 0x40000002c8a, 0x66, 0x101, 0x9, 0x401, 0x4, 0xc000000000000000, 0x7, 0x101, 0x1, 0x3, 0x4, 0x0, 0xff, 0x7, 0x3, 0x5, 0x93c, 0xe5, 0x7, 0x0, 0x1b000000000, 0x8000, 0x84, 0xd8bb, 0x4, 0x0, 0x20, 0x200, 0x200, 0x9, 0x401, 0x5, 0x0, 0x6000, 0xa67, 0x20, 0x4, 0x9, 0x1, 0x8, 0x6, 0x8, 0x1ff, 0x1000, 0x6, 0xbb2, 0x0, 0x8, 0x1f, 0x5, 0x81, 0x0, 0x3, 0x0, 0x200000, 0xffff, 0x0, 0x8000, 0xce20, 0x1f, 0x790b, 0x9]}) ioctl$BTRFS_IOC_DEV_REPLACE(r5, 0xca289435, &(0x7f0000000580)={0x0, 0x3, @start={r6, 0x1, "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", "2546d1a0692d8b86fb86bd700e09b02c0f68c96a592205d3819b1fe9118b844669e68e3e72a07eb539aae3e33d646fcd5db7feeb8ef5cbd10a88784cc62f16da7200d283b70f330b2da2b25a16a84b5c0c3036fbf94e35505959ba645b74cfefe40aeaad3691d8ac52eab03e5c289a6067410e97021e374f25ee7809229d61db4b66f7ce356ccfc924e4521e454f95213fe28114fd386cf46b0610a5b8b1179e2bdb805b26c8dabbef97f147595e3c8cc88c6f1208e3415e64f605c2bfec26361dd2669ae1be5dae8179613691b5e4c85f83bb86e090372c5e3e0238bdefede33386112e13e9d87c89a475db6f028b6dd2c9277f63716a9a991689c6d0ab03106aa2a281f51e3ec01cf7ae8ab2aab5dbe9d5ddb8101598b104f0e52795da7ae34fd9f12e021440f6997e68b461f5d069f21c0cd626e41c1fba99b49abd0249eaaa9db180e2801e6ded6d66526bec441ba3d8dc28f590ed68b26d0f4454de9cd963acb03404594521d2ded99a76e391ce905bdf05ba40ed43edcc1058f1deb59dadca6e39f8d7744cc7c660a0fd09f5703984b1461c768e28d09324838d8f69f45678bd3cd010db69ab915614934d42ea8e6b2e4e62c6db5b0b3cb73d260dbbc47d820f97358c08417eeb775e184f952b1265f27f57b5a73aac1facac1739157fe2c492d155f7c95206b85d35e9206ac9e61ba32b99199a23a644d24b262bba6ce7c2e9c07113412919a846cb70931885af89bd681bc8997f837ec3dedefc62a60c8ea2df5fad83cbb8990b6f520e5027ed700fa53fabbe0febb56fe2a6ea8795cbe67114b47dbe2acf1c24039f6db72151da63b15726224d955defca0bfbd26962747946558016e9ef6fde1e4e050bab422d170a560a2cc7bdf2c8eb26fb29fab51f9951a639f626edd0b04ebd61ab1255acb6fd2ec4a87ed5401227d014e367710b0869554f82bbca82ee3a2bd9ec75248c74b68b066034c266f6b288623c26f5791864df3a722e46bc7b1366c06e23068c1a11b66cdc2e30f6f499fc7a2be1920a3427eb267fcc1eff3ef2fcad5b546163d88f09c2ec3559165e16e600bf96a56677caf473d58aba988c2caa63b882f856d4f1a3b371a61f1e6a05b797ca355815249f2678761bf8e5b45494c2c4c12ac715836f97dae10abad2c85e3ff283adff9e238e182747b36190dee431575a5ef266d5861e17584159e2f5afa27d21c3f35b59d096e63e4543e8a275c0d7bb3f402c895bed321bd9d49773f9c8e85a85335b191e9600c54526a629e1f6641c16c1f5bf35c259b1c0a26a6d51064b55b0062c997d4c3196ec3c927e13142f87404e33fdf943b83529dac74219c7b25022d5c1780fd02733139c016d961a31cd82d57ed3a5cd7d5ffb56156df21c5e1bed75c613e82ab9a4f49097f2a2f1ea64654450509e7a4f505f4382cb8265a2b1cd"}, [0x7, 0x1, 0xffffffffffffff01, 0x400, 0x9, 0x7f, 0x1, 0x80000001, 0xe628, 0xbd, 0xbb, 0x9e88, 0x20, 0xfb31, 0x1ff, 0x7, 0xb0, 0x7fffffff, 0x0, 0x9, 0x0, 0x7, 0x3, 0x7f, 0x3, 0x9, 0x7fff, 0x1, 0x618, 0x80000001, 0x7a3, 0xc6, 0x3, 0x65, 0x101, 0xffffffff80000001, 0x9, 0xff, 0x2, 0x401, 0x6, 0x5, 0x8, 0x4, 0x1, 0x1, 0xa, 0x8000, 0x0, 0x20, 0x40, 0x7, 0xfcb, 0xb224, 0x7f, 0x10000, 0x5, 0x6, 0x3, 0x5, 0x9, 0x7, 0x20, 0x1]}) waitid(0x2, r0, 0x0, 0x8, 0x0) r7 = getpgrp(0xffffffffffffffff) r8 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r8, 0x8018456f, &(0x7f0000000180)=""/17) clone3(&(0x7f0000001300)={0x8010000, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f00000003c0), {0x24}, &(0x7f0000001180)=""/126, 0x7e, &(0x7f0000001200)=""/234, &(0x7f0000000400)=[r2, r7], 0x2, {r8}}, 0x58) 19:33:46 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xf29, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:33:46 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x600, &(0x7f00000002c0)) 19:33:46 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, 0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:33:46 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4b900, 0x0) 19:33:46 executing program 3: r0 = getpgrp(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000280)={0x0, 0x0}) r2 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000180)=""/17) r3 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f0000000180)=""/17) clone3(&(0x7f0000000300)={0x80, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x7}, &(0x7f00000000c0)=""/225, 0xe1, &(0x7f0000000380)=""/186, &(0x7f00000002c0)=[r1], 0x1, {r3}}, 0x58) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {}, {0x0, @struct, 0x0}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000900)={r4, 0x3ff, 0x20}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000440)={r4, 0x7, 0x5, 0x1}) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f0000000740)={0x0, 0x1, @start={r4, 0x0, "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", "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"}, [0x2, 0x2c8a, 0x62, 0x101, 0x9, 0x401, 0x4, 0xc000000000000000, 0x7, 0x101, 0x1, 0x3, 0x4, 0x0, 0xff, 0x7, 0x3, 0x5, 0x93c, 0xe5, 0x7, 0x0, 0x1b000000000, 0x8000, 0x81, 0xd8bb, 0x4, 0x0, 0x20, 0x200, 0x200, 0x9, 0x401, 0x5, 0x0, 0x6000, 0xa67, 0x20, 0x4, 0x9, 0x1, 0x8, 0x6, 0x8, 0x1ff, 0x1000, 0x6, 0xbb2, 0x7, 0x8, 0x80, 0x5, 0x81, 0x0, 0x3, 0x0, 0x200000, 0xffff, 0x0, 0x8000, 0xce20, 0x1f, 0x790b, 0x9]}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000500)={0x0, 0x0, {}, {0x0, @struct, 0x0}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000900)={r5, 0x3ff, 0x20}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000440)={r5, 0x7, 0x5, 0x1}) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f0000000740)={0x0, 0x1, @start={r5, 0x0, "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", "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"}, [0x2, 0x2c8a, 0x62, 0x101, 0x9, 0x401, 0x4, 0xc000000000000000, 0x7, 0x101, 0x1, 0x3, 0x4, 0x0, 0xff, 0x7, 0x3, 0x5, 0x93c, 0xe5, 0x7, 0x0, 0x1b000000000, 0x8000, 0x81, 0xd8bb, 0x4, 0x0, 0x20, 0x200, 0x200, 0x9, 0x401, 0x5, 0x0, 0x6000, 0xa67, 0x20, 0x4, 0x9, 0x1, 0x8, 0x6, 0x8, 0x1ff, 0x1000, 0x6, 0xbb2, 0x7, 0x8, 0x80, 0x5, 0x81, 0x0, 0x3, 0x0, 0x200000, 0xffff, 0x0, 0x8000, 0xce20, 0x1f, 0x790b, 0x9]}) ioctl$BTRFS_IOC_BALANCE_V2(r2, 0xc4009420, &(0x7f0000000440)={0xa, 0x0, {0x4, @struct={0x1}, r4, 0x2, 0xfffffffffffffe00, 0x7, 0x6, 0x9, 0x48, @usage=0x9323, 0x10001, 0x8, [0xffffffffffffff02, 0x1000, 0x3, 0x81, 0xb65, 0x1]}, {0xe975, @struct={0x3, 0x5}, r5, 0x9, 0x5, 0x0, 0x600000, 0x6, 0x48, @struct={0x7, 0x7fffffff}, 0xfffff5ad, 0x400, [0x80, 0x6, 0x0, 0x6, 0xa422, 0x6]}, {0x4, @usage=0x8, 0x0, 0x20, 0x0, 0x7fffffff, 0x3f, 0xffff, 0x80, @usage=0xfffffffffffffffe, 0x8, 0x3, [0x39f, 0x8, 0x4, 0x800, 0x6, 0x3]}, {0x4, 0x1, 0x100000000}}) waitid(0x2, r0, 0x0, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r3, 0xc0189375, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r3, @ANYBLOB="00001000000000202e2f26696c653000"]) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000200)=""/128) [ 1739.386932] capability: warning: `syz-executor.5' uses deprecated v2 capabilities in a way that may be insecure [ 1739.398012] SELinux: duplicate or incompatible mount options [ 1739.399455] 9pnet: Insufficient options for proto=fd [ 1739.400228] SELinux: duplicate or incompatible mount options [ 1739.405756] 9pnet: Insufficient options for proto=fd [ 1739.417869] 9pnet: Insufficient options for proto=fd 19:33:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x700, &(0x7f00000002c0)) 19:33:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ba00, 0x0) 19:33:47 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x1020, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:33:47 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = fork() waitid(0x2, r1, &(0x7f0000000000), 0x2, &(0x7f0000000080)) 19:33:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x20100000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1739.510956] 9pnet: Insufficient options for proto=fd 19:33:47 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, 0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 1739.522605] 9pnet: Insufficient options for proto=fd 19:33:47 executing program 5: r0 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000001380), 0x2, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f00000013c0)=0x25fa) r1 = getpgrp(0x0) waitid(0x2, r1, 0x0, 0x8, 0x0) clone3(&(0x7f00000011c0)={0x5000000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x39}, &(0x7f00000000c0)=""/158, 0x9e, &(0x7f0000000180)=""/4096, &(0x7f0000001180)}, 0x58) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) rt_sigqueueinfo(r2, 0x2e, &(0x7f0000001240)={0x3f, 0x6c5, 0x4}) r3 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f0000000180)=""/17) r4 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r4, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000001180)={0x0}, &(0x7f0000001400)=0x3) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000001300)={'\x00', 0xa3, 0x1, 0x6, 0x4, 0xffffffffffff0000, r5}) [ 1739.583454] SELinux: duplicate or incompatible mount options 19:33:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x8cffffff, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1739.590135] SELinux: duplicate or incompatible mount options [ 1755.752627] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:34:11 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x2000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:34:11 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 1763.492836] SELinux: duplicate or incompatible mount options [ 1763.504941] SELinux: duplicate or incompatible mount options 19:34:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x8ef, &(0x7f00000002c0)) 19:34:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4bb00, 0x0) 19:34:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x7000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:34:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xc0ed0000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:34:11 executing program 5: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) r0 = getpgrp(0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r2, r1) pwritev(r1, &(0x7f0000000100)=[{&(0x7f0000000040)="2a58b83be25917b408d06e35474eb9e85fbc1cd1416d5e2920bfcb3ebc35ef13387ab05c216c1ef0fb772fe418c542bb14ad228db6c2d4214f2f4b0090c72c79abe2af655b6cef1da6086711b8cb6e74ac683a585c662b4179ca2f6ea13cc1403f53e37c8a7aa4d5927b03729df90f21152c31e4854c41350e8a7d1a4820bf11913784b4e57b580030a5bdbf09d5d0def55c9498ddaa9384886ec787f0e1a31f17dfec177c8ce41c6535d159bca45204286e2f6191e1ad1fefdb", 0xba}], 0x1, 0x7fff, 0x9) pidfd_open(r0, 0x0) r3 = getpgrp(r0) waitid(0x2, r3, 0x0, 0x8, 0x0) 19:34:11 executing program 3: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000040)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="07f9ff1f0000c80affd832a1e9bcdd00"]) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x80, 0x13, 0x0, 0xf2, 0x0, 0x400, 0x10000, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x80000001, 0x100}, 0x12008, 0x9, 0x6, 0xd, 0xffff, 0x9, 0xded, 0x0, 0x1, 0x0, 0x7c}, 0x0, 0x7, r1, 0x2) ioctl$TIOCMIWAIT(r1, 0x545c, 0x0) r2 = syz_open_dev$vcsa(&(0x7f00000001c0), 0x4, 0x42000) ioctl$TIOCSISO7816(r2, 0xc0285443, &(0x7f0000000200)={0x7ff, 0x7ff, 0x3, 0x6501562a, 0x1}) r3 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f0000000180)=""/17) bind$unix(r3, &(0x7f0000000100)=@file={0x1, './file0\x00'}, 0x6e) r4 = getpgrp(r0) waitid(0x2, r4, 0x0, 0x8, 0x0) 19:34:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x900, &(0x7f00000002c0)) [ 1763.543242] 9pnet: Insufficient options for proto=fd 19:34:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xd5060000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:34:11 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={[0x8001]}, &(0x7f0000000040), &(0x7f0000000100)={r1, r2+60000000}, 0x8) clock_gettime(0x5, &(0x7f0000000140)) mq_timedsend(0xffffffffffffffff, &(0x7f0000000180)="9de5015074dfaeb9c36f52014f9fc168c17f85c2d1cb09", 0x17, 0x103d, &(0x7f00000001c0)) 19:34:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4bc00, 0x0) 19:34:11 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = gettid() r2 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r2, 0x330b) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x288001, 0x0) kcmp$KCMP_EPOLL_TFD(r1, 0x0, 0x7, r2, &(0x7f0000000040)={r3, 0xffffffffffffffff, 0x3}) [ 1763.585215] 9pnet: Insufficient options for proto=fd [ 1763.591512] 9pnet: Insufficient options for proto=fd 19:34:11 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x2010, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 1763.622537] cgroup: fork rejected by pids controller in /syz2 19:34:11 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:34:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xa00, &(0x7f00000002c0)) 19:34:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xf6ffffff, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:34:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xffffe000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:34:11 executing program 3: r0 = getpgrp(0x0) r1 = getpid() ptrace$pokeuser(0x6, r1, 0x80, 0x8) waitid(0x2, r0, 0x0, 0x8, 0x0) [ 1763.696091] SELinux: duplicate or incompatible mount options [ 1763.707012] SELinux: duplicate or incompatible mount options [ 1763.712929] 9pnet: Insufficient options for proto=fd 19:34:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4bd00, 0x0) [ 1778.381065] kmemleak: 16 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:34:33 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) wait4(r0, &(0x7f0000000000), 0x40000000, &(0x7f0000000040)) waitid$P_PIDFD(0x3, 0xffffffffffffffff, &(0x7f0000000100), 0x80000000, &(0x7f0000000180)) 19:34:33 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x290f, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:34:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x8000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:34:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xb00, &(0x7f00000002c0)) 19:34:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xffffff8c, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:34:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4be00, 0x0) 19:34:33 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:34:33 executing program 3: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = getpgrp(0x0) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) r4 = fcntl$getown(0xffffffffffffffff, 0x9) clone3(&(0x7f0000000440)={0x60000080, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240), {0x23}, &(0x7f0000000280)=""/82, 0x52, &(0x7f0000000300)=""/227, &(0x7f0000000400)=[r2, r2, r2, 0xffffffffffffffff, r2, r2], 0x6}, 0x58) r6 = getpid() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000004c0)=0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000500)={0x0, 0x0}) r9 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r9, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r9, 0x330b) clone3(&(0x7f0000000580)={0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x32}, &(0x7f00000000c0)=""/175, 0xaf, &(0x7f0000000180)=""/23, &(0x7f0000000540)=[r3, r0, r2, r4, r5, r6, r7, r8], 0x8, {r9}}, 0x58) pidfd_open(0x0, 0x0) waitid(0x2, r2, 0x0, 0x8, 0x0) [ 1786.159663] 9pnet: Insufficient options for proto=fd [ 1786.161646] SELinux: duplicate or incompatible mount options [ 1786.165660] 9pnet: Insufficient options for proto=fd [ 1786.171571] SELinux: duplicate or incompatible mount options 19:34:33 executing program 5: pidfd_open(0x0, 0x0) waitid(0x2, 0x0, 0x0, 0x8, 0x0) 19:34:33 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xedc0, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:34:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xfffffff6, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:34:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4bf00, 0x0) 19:34:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x1020, &(0x7f00000002c0)) [ 1786.323443] SELinux: duplicate or incompatible mount options [ 1786.337285] SELinux: duplicate or incompatible mount options 19:34:33 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {0x0}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:34:33 executing program 5: r0 = getpgrp(0x0) waitid(0x0, r0, 0x0, 0x80000000, 0x0) r1 = gettid() ptrace$setsig(0x4203, r1, 0x19b6fd13, &(0x7f0000000000)={0x21, 0xbfb, 0x20}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f00000014c0)=[{&(0x7f0000000100)=""/36, 0x24}, {&(0x7f0000000140)=""/218, 0xda}, {&(0x7f0000000240)=""/58, 0x3a}, {&(0x7f0000000280)=""/67, 0x43}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/49, 0x31}, {&(0x7f0000001340)=""/57, 0x39}, {&(0x7f0000001380)=""/71, 0x47}, {&(0x7f0000001400)=""/69, 0x45}, {&(0x7f0000001480)=""/35, 0x23}], 0xa, &(0x7f0000001580)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xf0}, 0x40010000) getpgrp(r2) 19:34:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x2000, &(0x7f00000002c0)) 19:34:33 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4c000, 0x0) 19:34:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xedc000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1799.188906] kmemleak: 25 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:34:55 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x80000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:34:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x9000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:34:55 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {0x0}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:34:55 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4c100, 0x0) 19:34:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x8000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:34:55 executing program 3: sendmsg$NFNL_MSG_ACCT_GET_CTRZERO(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x38}, 0x1, 0x0, 0x0, 0x4060}, 0x8040) r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IEEE802154_LIST_PHY(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14, r0, 0x8, 0x70bd26, 0x25dfdbfe, {}, [""]}, 0x14}, 0x1, 0x0, 0x0, 0x4090}, 0x4) syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$inet_icmp(0x2, 0x2, 0x1) connect(r1, &(0x7f0000000240)=@in6={0xa, 0x4e21, 0x4, @empty, 0x3}, 0x80) r2 = getpgrp(0x0) waitid(0x2, r2, 0x0, 0x8, 0x0) 19:34:55 executing program 5: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) fork() r3 = getpgrp(r2) waitid(0x2, r3, 0x0, 0x8, 0x0) 19:34:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x2010, &(0x7f00000002c0)) [ 1808.428318] SELinux: duplicate or incompatible mount options [ 1808.435308] SELinux: duplicate or incompatible mount options [ 1823.748999] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:35:20 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xe0ffff, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:35:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xedc0, &(0x7f00000002c0)) 19:35:20 executing program 5: waitid(0x2, 0x0, 0x0, 0x8, 0x0) 19:35:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xa000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:35:20 executing program 3: getpgrp(0x0) waitid(0x1, 0x0, 0x0, 0x8, 0x0) 19:35:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4c200, 0x0) 19:35:20 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {0x0}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 1832.449508] SELinux: duplicate or incompatible mount options 19:35:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xe0ffff00000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1832.458606] SELinux: duplicate or incompatible mount options 19:35:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xef08, &(0x7f00000002c0)) 19:35:20 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:35:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x100000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1832.557206] SELinux: duplicate or incompatible mount options 19:35:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x80000, &(0x7f00000002c0)) [ 1832.572096] SELinux: duplicate or incompatible mount options 19:35:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4c300, 0x0) 19:35:20 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) ptrace$setregs(0xf, r0, 0x3, &(0x7f0000000000)="7ec470246b200a7b87d4f3bcc67462e28e56ca4ecac33f42") r1 = getpgrp(0x0) pidfd_open(r1, 0x0) setpgid(r1, r0) 19:35:20 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:35:20 executing program 5: r0 = socket$inet(0x2, 0x4, 0x8d) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="1698533476775cde8848d6963927b6a96da90e25ad23ed87bbc3acad8826d95504c5052b3834e87f8fbfee07a807e28ee5a1db4fd3bf01cedfa1bf12a49a81148f5f972802678a2e405c7f92b51276a6aedd62c53a906daae772b7553e429a67fe218d06a6383fc476285f3bebe46cb752203a17397581a5ef0ee335310f43449560ee55e3584145f1b0a46a65c90214a9736ef8c3a878756e160391c436f77e6cfd673449f74e54e9abf480a157dd1e4842247950b498cd3bb5bb6cbc21c170c6e937bd59e75a3e7587ecc924b114dc8a06bd", 0xd3}], 0x1) getpgrp(0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)) r2 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r2, 0x330b) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000001740)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r4, 0x0) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r5, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000100)={@private0, r7}, 0x14) sendmsg$inet(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000200)="526294739b2aefbba030b895c44597c0fbc0bab73a345aa17694f1f5150bbfcac91ad7c9a3298d89ac68bfd9ce2f6ee6e6520043ee9b7caa28a90b1dad5ad6b819d72b0a5c0f089a2d5227fcc5b7be2054d7abbe985f85cc1ca6d9ae8e8a9f9cbbac8987c196295cadff0983334863f31694ec617912c0e42d97902beb1f49bbf7e7dc71e849c9dc984d94d36f82b62580dfa39b7c1982371792715814c12de100822a52b91ad7da08feef0f00789dc183bddfeff9e837998b7a619b454983c64071b897706cfdb44b5345bb54e64972fd160d7654a9e2664ebec3d525f4c657f5cb399654f9a24b", 0xe8}, {&(0x7f0000000300)="9f8a5274fe3e5e", 0x7}, {&(0x7f0000000340)="893951408a3e0a3fb290cf8f2451e70d9a3f2494d09bd738633efe600f662dd2eafcad58ed557d60627f", 0x2a}, {&(0x7f0000000380)="67e399a63f23b841dea1fb810087a3e3d9bc", 0x12}, {&(0x7f00000003c0)="b2841447ea33c5d72b1efacd3a593ecd4cb9235ff92e7a703416d279e17305a20531fd4e1e8531006c4bd40d6bfd8703a51b69f36308046938da53985f59aa11397e77089a42981ac90821fbb990129b3970c9c1098ee23333bce9632f2272ef7818cb430688b8dd22582881849cb5ed1e130505ceb95add6c406dae0cb0c232a9dbf4a2ed8a57897397451ef291931a00b74c594eab6f9cccd3b3345cfeaf6bf94710629434bc411cad1ab441d0a279a2bd", 0xb2}, {&(0x7f0000000480)="b9aeeed58f2c06bbbbb6d18e3e942f", 0xf}], 0x6, &(0x7f0000000540)=[@ip_retopts={{0x74, 0x0, 0x7, {[@ssrr={0x89, 0x27, 0x78, [@loopback, @private=0xa010101, @private=0xa010101, @rand_addr=0x64010100, @multicast1, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102, @private=0xa010102]}, @timestamp_addr={0x44, 0x3c, 0x4f, 0x1, 0x4, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3c5}, {@loopback, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}, {@multicast1, 0x3ff}, {@private=0xa010100}, {@dev={0xac, 0x14, 0x14, 0x43}}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8000}}], 0xc8}, 0x4004811) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) waitid(0x0, r8, 0x0, 0x20000000, 0x0) 19:35:20 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:35:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4c400, 0x0) 19:35:20 executing program 3: r0 = getpgrp(0x0) r1 = fork() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x2f, 0x9, 0x1, 0xcf, 0x0, 0xa638, 0x804, 0xa, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x0, 0x8, 0x7fff, 0x6, 0x5, 0xfffffff8, 0x6, 0x0, 0x8e4, 0x0, 0x1200000000}, r1, 0xc, 0xffffffffffffffff, 0x2) r2 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000180)=""/17) syz_io_uring_setup(0x6603, &(0x7f00000000c0)={0x0, 0xec1d, 0x8, 0x1, 0x150, 0x0, r2}, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000140)=0x0, &(0x7f0000000180)=0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) syz_io_uring_submit(r3, r4, &(0x7f0000000240)=@IORING_OP_TIMEOUT={0xb, 0x7, 0x0, 0x0, 0x9, &(0x7f0000000200)={r5, r6+10000000}, 0x1, 0x1, 0x1}, 0x8001) waitid(0x2, r0, 0x0, 0x8, 0x0) [ 1832.719508] SELinux: duplicate or incompatible mount options [ 1832.721849] SELinux: duplicate or incompatible mount options [ 1847.647013] kmemleak: 18 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:35:44 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:35:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x200000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:35:44 executing program 3: r0 = getpgrp(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) pidfd_open(r1, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:35:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xb000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:35:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4c500, 0x0) 19:35:44 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) prctl$PR_SCHED_CORE(0x3e, 0x4, r1, 0x1, &(0x7f0000000080)) 19:35:44 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:35:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xe0ffff, &(0x7f00000002c0)) [ 1856.767966] SELinux: duplicate or incompatible mount options [ 1856.781505] SELinux: duplicate or incompatible mount options 19:35:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x1000000, &(0x7f00000002c0)) 19:35:44 executing program 5: r0 = getpgrp(0xffffffffffffffff) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgid(r0) pidfd_open(r1, 0x0) 19:35:44 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:35:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4c600, 0x0) 19:35:44 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = fork() waitid(0x1, r1, &(0x7f0000000040), 0x8, &(0x7f00000000c0)) prctl$PR_SCHED_CORE(0x3e, 0x0, r0, 0x0, &(0x7f0000000000)) pidfd_open(r0, 0x0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) rt_tgsigqueueinfo(r2, r1, 0xf, &(0x7f0000000180)={0x3c, 0xef2, 0x6}) [ 1856.923147] 9pnet: Insufficient options for proto=fd 19:35:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x300000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1856.943318] 9pnet: Insufficient options for proto=fd [ 1856.943946] SELinux: duplicate or incompatible mount options [ 1856.956431] SELinux: duplicate or incompatible mount options 19:35:44 executing program 5: r0 = getpgrp(0x0) tkill(r0, 0x5) wait4(r0, &(0x7f0000000000), 0x1, &(0x7f0000000240)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) r2 = openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000140)='cpuset.mems\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r3, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r3, 0x330b) capset(&(0x7f00000001c0)={0x19980330, r0}, &(0x7f0000000200)={0x6, 0x3, 0x4, 0x20, 0xffffffff, 0x1a86}) kcmp$KCMP_EPOLL_TFD(r1, r0, 0x7, r2, &(0x7f0000000180)={r3, 0xffffffffffffffff, 0x400}) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:35:44 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:35:44 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x5000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:35:44 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4c700, 0x0) 19:35:44 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x2000000, &(0x7f00000002c0)) [ 1857.086608] SELinux: duplicate or incompatible mount options [ 1857.099232] SELinux: duplicate or incompatible mount options [ 1857.116135] 9pnet: Insufficient options for proto=fd [ 1857.123441] 9pnet: Insufficient options for proto=fd 19:35:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x10000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:35:45 executing program 5: r0 = getpgrp(0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r3, r2) preadv(r3, &(0x7f0000001200)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/251, 0xfb}, {&(0x7f0000000040)=""/124, 0x7c}], 0x3, 0x2, 0x7) move_pages(r1, 0x1, &(0x7f00000000c0)=[&(0x7f0000ffb000/0x3000)=nil], &(0x7f0000000000)=[0x80, 0x40], &(0x7f0000000080), 0x2) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:35:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x400000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:35:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4c800, 0x0) 19:35:45 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x6000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:35:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x3000000, &(0x7f00000002c0)) 19:35:45 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {0x0}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 1857.696633] 9pnet: Insufficient options for proto=fd [ 1857.715234] 9pnet: Insufficient options for proto=fd 19:35:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x4000000, &(0x7f00000002c0)) [ 1857.734221] SELinux: duplicate or incompatible mount options [ 1857.745182] SELinux: duplicate or incompatible mount options [ 1857.808450] 9pnet: Insufficient options for proto=fd 19:35:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4c900, 0x0) [ 1857.824566] 9pnet: Insufficient options for proto=fd [ 1871.698140] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:36:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x20000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:36:08 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpid() pidfd_open(r1, 0x0) fork() 19:36:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x500000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:36:08 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {0x0}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:36:08 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x7000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:36:08 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff, 0xee00}}, './file0\x00'}) ioctl$KDSETLED(r1, 0x4b32, 0x3ff) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000080)=0x0) tkill(r2, 0x25) 19:36:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x5000000, &(0x7f00000002c0)) 19:36:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ca00, 0x0) [ 1880.732193] SELinux: duplicate or incompatible mount options [ 1880.738126] 9pnet: Insufficient options for proto=fd [ 1880.740204] SELinux: duplicate or incompatible mount options [ 1880.757384] 9pnet: Insufficient options for proto=fd 19:36:08 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x20000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:36:08 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:36:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4cb00, 0x0) 19:36:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x6000000, &(0x7f00000002c0)) 19:36:08 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {0x0}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:36:08 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) write$P9_RGETLOCK(0xffffffffffffffff, &(0x7f0000000000)={0x1f, 0x37, 0x2, {0x1, 0x97d, 0x81, 0xffffffffffffffff, 0x1, '&'}}, 0x1f) [ 1880.891214] SELinux: duplicate or incompatible mount options [ 1880.900172] SELinux: duplicate or incompatible mount options 19:36:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x600000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1880.936395] 9pnet: Insufficient options for proto=fd [ 1880.950425] 9pnet: Insufficient options for proto=fd 19:36:08 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4cc00, 0x0) [ 1895.774175] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:36:31 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x7000000, &(0x7f00000002c0)) 19:36:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x20100000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:36:31 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:36:31 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f00000010c0)=0x0) perf_event_open(&(0x7f0000001040)={0x1, 0x80, 0x16, 0x2, 0x8d, 0x3d, 0x0, 0x6, 0x80480, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x101, 0x0, @perf_config_ext={0x2, 0x7}, 0x2000, 0x8, 0x3, 0x1, 0x8, 0x6, 0x9, 0x0, 0x4, 0x0, 0x5}, r1, 0xd, 0xffffffffffffffff, 0x2) ptrace$getregset(0x4204, r0, 0x201, &(0x7f0000001000)={&(0x7f0000000000)=""/4096, 0x1000}) 19:36:31 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x20100000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:36:31 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) ioprio_set$pid(0x1, r1, 0x2007) 19:36:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x700000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:36:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4cd00, 0x0) [ 1904.213696] SELinux: duplicate or incompatible mount options [ 1904.225082] 9pnet: Insufficient options for proto=fd [ 1904.229019] SELinux: duplicate or incompatible mount options [ 1904.241486] 9pnet: Insufficient options for proto=fd 19:36:31 executing program 5: r0 = getpgrp(0x0) tgkill(0x0, r0, 0x16) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) waitid(0x2, r1, &(0x7f0000000000), 0x20000000, 0x0) 19:36:31 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ce00, 0x0) [ 1919.539398] kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:36:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x800000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:36:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x8000000, &(0x7f00000002c0)) 19:36:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4cf00, 0x0) 19:36:54 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x290f0000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:36:54 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000180)=""/17) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000100)={&(0x7f0000000040)={0x88, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r0}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r0}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r1}}]}, 0x88}, 0x1, 0x0, 0x0, 0x20040840}, 0x40841) 19:36:54 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:36:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x8cffffff, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:36:54 executing program 3: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000380)={0x0}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x6, 0x2e) ftruncate(0xffffffffffffffff, 0x1000003) r2 = socket$inet(0x2, 0x1, 0x0) r3 = fork() ptrace(0x10, r3) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000000)="8b7dff3da023485e5fa2c567781b15a668df1c528ae60675d677da3556765196b4c703245cee80d509c2dd59da7ea5eb788abe542bb73626ef6f3af9a366d1ba9ab595c181dd41d1a9fef1a77fa6c00757150c9832fda8395d26340456a98b9529bb84bee5b292b6810e930bb1bd6ba0557e9e001ca1823b291396198f52360c2d132dfd772e7f30d7") ptrace$cont(0x9, r3, 0x0, 0x0) shutdown(r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0xc0182101, &(0x7f0000000440)={r1}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000080)={r1, 0x1, 0xffffffffffffffff, 0x2}) r4 = getpgrp(r0) waitid(0x2, r4, 0x0, 0x8, 0x0) [ 1926.937273] 9pnet: Insufficient options for proto=fd [ 1926.956164] SELinux: duplicate or incompatible mount options [ 1926.956618] 9pnet: Insufficient options for proto=fd [ 1926.965153] SELinux: duplicate or incompatible mount options 19:36:54 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = pidfd_open(0x0, 0x0) waitid(0x1, r0, &(0x7f0000000000), 0x2, &(0x7f0000000080)) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000140), 0x101000, 0x0) pidfd_getfd(r1, r2, 0x0) 19:36:54 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4d000, 0x0) 19:36:54 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x9000000, &(0x7f00000002c0)) 19:36:54 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8cffffff, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:36:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x900000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1927.134689] 9pnet: Insufficient options for proto=fd [ 1927.142468] SELinux: duplicate or incompatible mount options [ 1927.151144] 9pnet: Insufficient options for proto=fd [ 1927.157192] SELinux: duplicate or incompatible mount options [ 1939.207419] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:37:15 executing program 5: ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000006a00)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000006b40)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$binfmt_misc(r1, &(0x7f0000006b80)={'syz1', "71e8124018ff5d7b17b6197cf19517744d1fbf257e02156f9f0a3bf60b4f60ad52fc1153e5b19986d0ddeb6a41fef3ba994321be4b3c8088692b3fe5efc74c1836fb6c8ec23e4470b0b7f85c5d8631aeafeb74a7edf99ac1f98e1f84a0e931e70474242096a7b41875751c8f7a36c714f89e38d7433dc2f92a0307a34041a34222def8f6766cd09e99e11f97ce7fc528988ea767ba55254f41ed1be95b1e60ef9b22b475a4bac62283f63fc12733789887794b43ed8dabad16b3bcd476ed2ff6c0f6587796c0d1597c17fc2cf07cedb58362854f111f4f89160201d0f091445a5ca6cb009a6af063"}, 0xec) sendto(r0, &(0x7f0000006a40)="443c5fc56aa466c4642ede0d9632ad81b999ebd11b09290408ae8b8815e35b21655025bb74f3a6b1bc22eb6ace4960c27edecaca00d11b710a34077e5c8a2a0dff25bc2feb091b6f3cc542fb3b096b32d84b7395", 0x54, 0x40, &(0x7f0000006ac0)=@isdn={0x22, 0xce, 0x1, 0x10, 0x2}, 0x80) r2 = getpgrp(0xffffffffffffffff) clock_gettime(0x0, &(0x7f00000069c0)={0x0, 0x0}) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000006c80)={0x0, 0x3}) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000067c0)=[{{0x0, 0x0, &(0x7f0000001100)=[{&(0x7f0000000000)=""/134, 0x86}, {&(0x7f00000000c0)=""/17, 0x11}, {&(0x7f0000000100)=""/4096, 0x1000}], 0x3, &(0x7f0000001140)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}}, {{&(0x7f00000011c0)=@abs, 0x6e, &(0x7f0000001440)=[{&(0x7f0000001240)=""/225, 0xe1}, {&(0x7f0000001340)=""/232, 0xe8}], 0x2, &(0x7f0000001480)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32, @ANYBLOB="00000000100000000000000001000000010000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000050671f01802036f00"/20, @ANYRES32, @ANYRES32, @ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0xb8}}, {{0x0, 0x0, &(0x7f0000002a80)=[{&(0x7f0000001540)=""/212, 0xd4}, {&(0x7f0000001640)=""/210, 0xd2}, {&(0x7f0000001740)=""/32, 0x20}, {&(0x7f0000001780)=""/45, 0x2d}, {&(0x7f00000017c0)=""/191, 0xbf}, {&(0x7f0000001880)=""/217, 0xd9}, {&(0x7f0000001980)=""/200, 0xc8}, {&(0x7f0000001a80)=""/4096, 0x1000}], 0x8, &(0x7f0000002b00)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb8}}, {{0x0, 0x0, &(0x7f0000003c80)=[{&(0x7f0000002bc0)=""/4096, 0x1000}, {&(0x7f0000003bc0)=""/179, 0xb3}], 0x2, &(0x7f0000003cc0)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x38}}, {{&(0x7f0000003d00)=@abs, 0x6e, &(0x7f0000004040)=[{&(0x7f0000003d80)=""/168, 0xa8}, {&(0x7f0000003e40)=""/255, 0xff}, {&(0x7f0000003f40)=""/223, 0xdf}], 0x3}}, {{0x0, 0x0, &(0x7f0000005400)=[{&(0x7f0000004080)=""/141, 0x8d}, {&(0x7f0000004140)=""/168, 0xa8}, {&(0x7f0000004200)=""/167, 0xa7}, {&(0x7f00000042c0)=""/70, 0x46}, {&(0x7f0000004340)=""/4096, 0x1000}, {&(0x7f0000005340)=""/53, 0x35}, {&(0x7f0000005380)=""/1, 0x1}, {&(0x7f00000053c0)=""/14, 0xe}], 0x8, &(0x7f0000005480)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}, {{&(0x7f00000054c0)=@abs, 0x6e, &(0x7f0000006640)=[{&(0x7f0000005540)=""/38, 0x26}, {&(0x7f0000005580)=""/186, 0xba}, {&(0x7f0000005640)=""/4096, 0x1000}], 0x3, &(0x7f0000006680)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x130}}], 0x7, 0x20, &(0x7f0000006980)={r3, r4+60000000}) r5 = getpgrp(r2) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000007080)) waitid(0x2, r5, 0x0, 0x8, 0x0) 19:37:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xc0ed0000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:37:15 executing program 3: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) ptrace$setsig(0x4203, r0, 0x2, &(0x7f0000000000)={0x14, 0x0, 0x4}) capget(&(0x7f0000000080)={0x20080522, r0}, &(0x7f00000000c0)={0xffffffff, 0x5, 0x8001, 0x23e, 0x401}) 19:37:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xa00000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:37:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xa000000, &(0x7f00000002c0)) 19:37:15 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xc0ed0000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:37:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4d100, 0x0) 19:37:15 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 1947.700623] SELinux: duplicate or incompatible mount options [ 1947.706284] SELinux: duplicate or incompatible mount options [ 1947.711568] 9pnet: Insufficient options for proto=fd 19:37:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xb000000, &(0x7f00000002c0)) 19:37:15 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:37:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4d200, 0x0) 19:37:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) sendmsg$inet6(r0, &(0x7f0000000300)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @private0, 0x101}, 0x1c, &(0x7f0000000280)=[{&(0x7f0000000040)="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", 0xff}, {&(0x7f00000003c0)="1678777ef11893beaaed09a0c7823710f9067ece20b611095a7a77e89815591fce0de3bf807205c4eb2cb1aee59082e988e5125e67f09c011635b57ea201d761b675255d37e15b91167fb92d2d9f55875f374aef7aeff7ce17a0e469a8886654628fcbcdc0eeaf4b6a07b308e04700c234c778863b8adf4a9323b29d758a68f835412309535924c7869bd6", 0x8b}, {&(0x7f0000000340)="b34c9e93b46892534e4ad83f42f7c81ae25c99b9803c51573d14effd9dc51fbf75435486c42c99ba7600f5268c78d91b7b0bf9c98fc94e1b2b5a610b78f276b54d2e5f005f28ecfe61dd41fa12c72f0ba864a06a", 0x54}], 0x3, &(0x7f0000000200)=[@rthdr_2292={{0x48, 0x29, 0x39, {0x8, 0x6, 0x2, 0x3, 0x0, [@private0, @remote, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}]}}}], 0x48}, 0x4081) r1 = getpgrp(0x0) waitid(0x2, r1, 0x0, 0x8, 0x0) [ 1947.813216] 9pnet: Insufficient options for proto=fd [ 1947.831577] 9pnet: Insufficient options for proto=fd 19:37:15 executing program 5: r0 = getpgrp(0x0) waitid(0x0, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = getpgrp(r1) pidfd_open(r2, 0x0) pidfd_open(r1, 0x0) 19:37:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xb00000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1947.873068] SELinux: duplicate or incompatible mount options [ 1947.880870] SELinux: duplicate or incompatible mount options 19:37:15 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {0x0}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:37:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x20000000, &(0x7f00000002c0)) 19:37:15 executing program 3: prctl$PR_GET_NO_NEW_PRIVS(0x27) prctl$PR_GET_NO_NEW_PRIVS(0x27) ioctl$sock_inet_SIOCGIFBRDADDR(0xffffffffffffffff, 0x8919, &(0x7f0000000000)={'veth0_to_bond\x00', {0x2, 0x0, @remote}}) prctl$PR_GET_NO_NEW_PRIVS(0x27) r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x40000000, 0x0) [ 1948.001317] 9pnet: Insufficient options for proto=fd [ 1948.007750] 9pnet: Insufficient options for proto=fd [ 1961.395887] kmemleak: 19 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:37:37 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xffffe000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:37:37 executing program 5: r0 = getpgrp(0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) pidfd_open(r2, 0x0) r3 = syz_open_dev$vcsn(&(0x7f0000000380), 0x8000100000000, 0x100) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f0000000180)=""/17) recvmmsg(r3, &(0x7f00000019c0)=[{{&(0x7f00000003c0)=@ieee802154={0x24, @short}, 0x80, &(0x7f00000005c0)=[{&(0x7f0000001b00)=""/201, 0xc9}, {&(0x7f0000000540)=""/97, 0x61}, {&(0x7f00000000c0)=""/56, 0x38}], 0x3, &(0x7f0000000600)=""/70, 0x46}, 0xd124}, {{0x0, 0x0, &(0x7f0000001900)=[{&(0x7f0000001a40)=""/176, 0xb0}, {&(0x7f0000000740)=""/67, 0x43}, {&(0x7f00000007c0)=""/39, 0x27}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/1, 0x1}, {&(0x7f0000001840)=""/173, 0xad}], 0x6, &(0x7f0000001980)=""/15, 0xf}, 0xfff}], 0x2, 0x2000, 0x0) setns(r3, 0x8000000) r4 = getpgrp(r0) waitid(0x2, r4, 0x0, 0x8, 0x0) writev(r3, &(0x7f0000000140)=[{&(0x7f0000000000)="9369754ca823418a48f7889cb7194652be7a617ef211b4c1eef478ec3538cae14708b072fb0fac78ca72c326957c7cd7632879e78ba6fd757276ef894b913118a108784739774f4572cb03a53b6e158f6076811f90618471293f9efac799c4c7ad1d51b0bcc4db6b100ce84a9183ed878ffa04f21b1a2da6f7b44cd71cd1d5464ffe9bd980ec5ac1f4845726a5", 0x8d}, {&(0x7f00000001c0)="0c5e9e5649df1ef445cacc7de9ca58f4d29fb47327291752a072bc8304d51aad0d4920444c02a8bb68dffaf648ffd92ecb85272a1fb1563bceaaece8cbc06666e8c25134647ce3749dfb413f30711329ccc04959e5ed2ea92174368793ae62250c0014811d32724ab41c551f252f53ddfc619c3cea5951c206fcd9c22be9d493c47860dd741936769c45451fa37b44e520e8049ae31a31905d77f540ab6bbfb850b03d42c06c1ede59d00a73e14932317dbead176e8437df32d29a57e3c4b33a73ed728adeff0f9386f400757a825eb7d7b588aa8c084804f863b8a9b9c5ff25e1ab1301eb123876feb8c3c651d94a734c7ccca43ac4fe8838d590e1", 0xfc}, {&(0x7f00000002c0)="067e0db6fdb72b5f1a1b81e02f9774d79a326e1f1b1c9435cad7733cb54559595df01e281b8bb6905f6884571e1f9f950e6453ebfd0c7a6b83849ab26df860f314728278a602c0e80d50821d3f96122299cb5cddf06ca64c7402d959aa252b2d9a35f8099145946e1ca7233c93f106cadd61f0dd4684c51945e172afcbc7fc2564", 0x81}, {&(0x7f0000000100)="2ae63c317bc1d54a1a0aae3ec04ca7a6c06d662408f41970984ce685a83ebcfbc6141dfff06e47e67c0403535c7aa350d8facd5412fc298b", 0x38}], 0x4) 19:37:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4d300, 0x0) 19:37:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xf6ffffff, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:37:37 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {0x0}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:37:37 executing program 3: ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(0xffffffffffffffff, 0x40605346, &(0x7f0000000080)={0x10001, 0x0, {0x2, 0x3, 0xfc19, 0x2, 0xfffffffb}, 0x1000}) fcntl$getown(0xffffffffffffffff, 0x9) r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0xc) r1 = clone3(&(0x7f0000002c40)={0x118000000, &(0x7f0000002a80), &(0x7f0000002ac0), &(0x7f0000002b00), {0x31}, &(0x7f0000002b40)=""/27, 0x1b, &(0x7f0000002b80)=""/80, &(0x7f0000002c00)=[r0, 0xffffffffffffffff, r0], 0x3}, 0x58) syz_open_procfs(r1, &(0x7f0000002cc0)='net/bnep\x00') 19:37:37 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x20100000, &(0x7f00000002c0)) 19:37:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x1000000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 1970.277146] SELinux: duplicate or incompatible mount options [ 1970.289412] SELinux: duplicate or incompatible mount options 19:37:37 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x8cffffff, &(0x7f00000002c0)) 19:37:37 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4d400, 0x0) 19:37:37 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xffffff8c, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:37:38 executing program 5: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) pidfd_open(r2, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) r4 = getpgrp(r3) clone3(&(0x7f00000002c0)={0x4144000, &(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0), {0x37}, &(0x7f0000000100)=""/105, 0x69, &(0x7f0000000180)=""/243, &(0x7f0000000280)=[r3, r2, r4, r3], 0x4}, 0x58) waitid(0x1, r5, 0x0, 0x4, 0x0) 19:37:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x2000000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:37:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xffff0000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:37:38 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {0x0}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 1970.527411] SELinux: duplicate or incompatible mount options 19:37:38 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4d500, 0x0) [ 1970.545459] SELinux: duplicate or incompatible mount options [ 1982.554244] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:38:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xc0ed0000, &(0x7f00000002c0)) 19:38:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x2010000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:38:06 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = fork() r2 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000180)=""/17) clone3(&(0x7f00000001c0)={0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x31}, &(0x7f00000000c0)=""/128, 0x80, &(0x7f0000000140)=""/56, &(0x7f0000000180)=[r0, r0, r1, r0], 0x4, {r2}}, 0x58) 19:38:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4d600, 0x0) 19:38:06 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:38:06 executing program 3: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {0x0}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:38:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xffffff8c, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:38:06 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 1998.483560] 9pnet: Insufficient options for proto=fd [ 1998.490891] SELinux: duplicate or incompatible mount options [ 1998.501250] 9pnet: Insufficient options for proto=fd [ 1998.504931] SELinux: duplicate or incompatible mount options 19:38:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4d700, 0x0) 19:38:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xef080000, &(0x7f00000002c0)) 19:38:06 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xedc000000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:38:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xfffffff6, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:38:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x8cffffff00000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:38:06 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 1998.686472] SELinux: duplicate or incompatible mount options [ 1998.699562] SELinux: duplicate or incompatible mount options 19:38:06 executing program 3: r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) pidfd_open(r2, 0x0) fcntl$getownex(r1, 0x10, &(0x7f0000000000)={0x0, 0x0}) r4 = getpgrp(r3) clone3(&(0x7f00000002c0)={0x4144000, &(0x7f0000000040), &(0x7f0000000080)=0x0, &(0x7f00000000c0), {0x37}, &(0x7f0000000100)=""/105, 0x69, &(0x7f0000000180)=""/243, &(0x7f0000000280)=[r3, r2, r4, r3], 0x4}, 0x58) waitid(0x1, r5, 0x0, 0x4, 0x0) 19:38:06 executing program 5: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000001400)=0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)) getpgrp(r0) 19:38:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xf6ffffff, &(0x7f00000002c0)) 19:38:06 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8000000000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 1998.901774] SELinux: duplicate or incompatible mount options [ 1998.912220] SELinux: duplicate or incompatible mount options [ 2011.776466] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:38:27 executing program 3: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)={0x0, 0x0}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000380)={0x0}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readahead(0xffffffffffffffff, 0x6, 0x2e) ftruncate(0xffffffffffffffff, 0x1000003) r2 = socket$inet(0x2, 0x1, 0x0) r3 = fork() ptrace(0x10, r3) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000000)="8b7dff3da023485e5fa2c567781b15a668df1c528ae60675d677da3556765196b4c703245cee80d509c2dd59da7ea5eb788abe542bb73626ef6f3af9a366d1ba9ab595c181dd41d1a9fef1a77fa6c00757150c9832fda8395d26340456a98b9529bb84bee5b292b6810e930bb1bd6ba0557e9e001ca1823b291396198f52360c2d132dfd772e7f30d7") ptrace$cont(0x9, r3, 0x0, 0x0) shutdown(r2, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0xc0182101, &(0x7f0000000440)={r1}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0x40182103, &(0x7f0000000080)={r1, 0x1, 0xffffffffffffffff, 0x2}) r4 = getpgrp(r0) waitid(0x2, r4, 0x0, 0x8, 0x0) 19:38:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xffffe000, &(0x7f00000002c0)) 19:38:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xd506000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:38:27 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:38:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xedc000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:38:27 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xe0ffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:38:27 executing program 5: r0 = getpgrp(0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = fork() r2 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000180)=""/17) clone3(&(0x7f00000001c0)={0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x31}, &(0x7f00000000c0)=""/128, 0x80, &(0x7f0000000140)=""/56, &(0x7f0000000180)=[r0, r0, r1, r0], 0x4, {r2}}, 0x58) 19:38:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4d800, 0x0) [ 2019.689557] SELinux: duplicate or incompatible mount options [ 2019.696582] SELinux: duplicate or incompatible mount options 19:38:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xffffff8c, &(0x7f00000002c0)) [ 2019.874142] cgroup: fork rejected by pids controller in /syz3 [ 2033.330580] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:38:50 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:38:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xf6ffffff00000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:38:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4d900, 0x0) 19:38:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xfffffff6, &(0x7f00000002c0)) 19:38:50 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{0x0}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:38:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x8000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:38:50 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x9000000, &(0x7f00000002c0)) 19:38:50 executing program 3: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 2043.079642] SELinux: duplicate or incompatible mount options [ 2043.089389] 9pnet: Insufficient options for proto=fd [ 2043.095654] SELinux: duplicate or incompatible mount options 19:38:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:38:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xedc000000000, &(0x7f00000002c0)) 19:38:50 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:38:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4da00, 0x0) [ 2043.264059] SELinux: duplicate or incompatible mount options 19:38:50 executing program 3: r0 = socket$inet(0x2, 0x4, 0x8d) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="1698533476775cde8848d6963927b6a96da90e25ad23ed87bbc3acad8826d95504c5052b3834e87f8fbfee07a807e28ee5a1db4fd3bf01cedfa1bf12a49a81148f5f972802678a2e405c7f92b51276a6aedd62c53a906daae772b7553e429a67fe218d06a6383fc476285f3bebe46cb752203a17397581a5ef0ee335310f43449560ee55e3584145f1b0a46a65c90214a9736ef8c3a878756e160391c436f77e6cfd673449f74e54e9abf480a157dd1e4842247950b498cd3bb5bb6cbc21c170c6e937bd59e75a3e7587ecc924b114dc8a06bd", 0xd3}], 0x1) getpgrp(0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)) r2 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r2, 0x330b) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000001740)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r4, 0x0) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r5, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000100)={@private0, r7}, 0x14) sendmsg$inet(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000200)="526294739b2aefbba030b895c44597c0fbc0bab73a345aa17694f1f5150bbfcac91ad7c9a3298d89ac68bfd9ce2f6ee6e6520043ee9b7caa28a90b1dad5ad6b819d72b0a5c0f089a2d5227fcc5b7be2054d7abbe985f85cc1ca6d9ae8e8a9f9cbbac8987c196295cadff0983334863f31694ec617912c0e42d97902beb1f49bbf7e7dc71e849c9dc984d94d36f82b62580dfa39b7c1982371792715814c12de100822a52b91ad7da08feef0f00789dc183bddfeff9e837998b7a619b454983c64071b897706cfdb44b5345bb54e64972fd160d7654a9e2664ebec3d525f4c657f5cb399654f9a24b", 0xe8}, {&(0x7f0000000300)="9f8a5274fe3e5e", 0x7}, {&(0x7f0000000340)="893951408a3e0a3fb290cf8f2451e70d9a3f2494d09bd738633efe600f662dd2eafcad58ed557d60627f", 0x2a}, {&(0x7f0000000380)="67e399a63f23b841dea1fb810087a3e3d9bc", 0x12}, {&(0x7f00000003c0)="b2841447ea33c5d72b1efacd3a593ecd4cb9235ff92e7a703416d279e17305a20531fd4e1e8531006c4bd40d6bfd8703a51b69f36308046938da53985f59aa11397e77089a42981ac90821fbb990129b3970c9c1098ee23333bce9632f2272ef7818cb430688b8dd22582881849cb5ed1e130505ceb95add6c406dae0cb0c232a9dbf4a2ed8a57897397451ef291931a00b74c594eab6f9cccd3b3345cfeaf6bf94710629434bc411cad1ab441d0a279a2bd", 0xb2}, {&(0x7f0000000480)="b9aeeed58f2c06bbbbb6d18e3e942f", 0xf}], 0x6, &(0x7f0000000540)=[@ip_retopts={{0x74, 0x0, 0x7, {[@ssrr={0x89, 0x27, 0x78, [@loopback, @private=0xa010101, @private=0xa010101, @rand_addr=0x64010100, @multicast1, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102, @private=0xa010102]}, @timestamp_addr={0x44, 0x3c, 0x4f, 0x1, 0x4, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3c5}, {@loopback, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}, {@multicast1, 0x3ff}, {@private=0xa010100}, {@dev={0xac, 0x14, 0x14, 0x43}}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8000}}], 0xc8}, 0x4004811) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) waitid(0x0, r8, 0x0, 0x20000000, 0x0) [ 2043.275735] SELinux: duplicate or incompatible mount options 19:38:50 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x8000000000000, &(0x7f00000002c0)) 19:38:50 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{0x0}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 2043.285385] SELinux: duplicate or incompatible mount options 19:38:50 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x100000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:38:50 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0xa, r0}}) 19:38:50 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:38:50 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4db00, 0x0) [ 2043.385461] 9pnet: Insufficient options for proto=fd 19:38:51 executing program 5: r0 = socket$inet(0x2, 0x4, 0x8d) writev(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)="1698533476775cde8848d6963927b6a96da90e25ad23ed87bbc3acad8826d95504c5052b3834e87f8fbfee07a807e28ee5a1db4fd3bf01cedfa1bf12a49a81148f5f972802678a2e405c7f92b51276a6aedd62c53a906daae772b7553e429a67fe218d06a6383fc476285f3bebe46cb752203a17397581a5ef0ee335310f43449560ee55e3584145f1b0a46a65c90214a9736ef8c3a878756e160391c436f77e6cfd673449f74e54e9abf480a157dd1e4842247950b498cd3bb5bb6cbc21c170c6e937bd59e75a3e7587ecc924b114dc8a06bd", 0xd3}], 0x1) getpgrp(0x0) r1 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) read(r1, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000000)) r2 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r2, 0x330b) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = perf_event_open(&(0x7f0000001740)={0x2, 0x80, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r4, 0x0) perf_event_open(&(0x7f0000001d80)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r5, 0x0) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000100)={@private0, r7}, 0x14) sendmsg$inet(r2, &(0x7f0000000640)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000200)="526294739b2aefbba030b895c44597c0fbc0bab73a345aa17694f1f5150bbfcac91ad7c9a3298d89ac68bfd9ce2f6ee6e6520043ee9b7caa28a90b1dad5ad6b819d72b0a5c0f089a2d5227fcc5b7be2054d7abbe985f85cc1ca6d9ae8e8a9f9cbbac8987c196295cadff0983334863f31694ec617912c0e42d97902beb1f49bbf7e7dc71e849c9dc984d94d36f82b62580dfa39b7c1982371792715814c12de100822a52b91ad7da08feef0f00789dc183bddfeff9e837998b7a619b454983c64071b897706cfdb44b5345bb54e64972fd160d7654a9e2664ebec3d525f4c657f5cb399654f9a24b", 0xe8}, {&(0x7f0000000300)="9f8a5274fe3e5e", 0x7}, {&(0x7f0000000340)="893951408a3e0a3fb290cf8f2451e70d9a3f2494d09bd738633efe600f662dd2eafcad58ed557d60627f", 0x2a}, {&(0x7f0000000380)="67e399a63f23b841dea1fb810087a3e3d9bc", 0x12}, {&(0x7f00000003c0)="b2841447ea33c5d72b1efacd3a593ecd4cb9235ff92e7a703416d279e17305a20531fd4e1e8531006c4bd40d6bfd8703a51b69f36308046938da53985f59aa11397e77089a42981ac90821fbb990129b3970c9c1098ee23333bce9632f2272ef7818cb430688b8dd22582881849cb5ed1e130505ceb95add6c406dae0cb0c232a9dbf4a2ed8a57897397451ef291931a00b74c594eab6f9cccd3b3345cfeaf6bf94710629434bc411cad1ab441d0a279a2bd", 0xb2}, {&(0x7f0000000480)="b9aeeed58f2c06bbbbb6d18e3e942f", 0xf}], 0x6, &(0x7f0000000540)=[@ip_retopts={{0x74, 0x0, 0x7, {[@ssrr={0x89, 0x27, 0x78, [@loopback, @private=0xa010101, @private=0xa010101, @rand_addr=0x64010100, @multicast1, @broadcast, @initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010102, @private=0xa010102]}, @timestamp_addr={0x44, 0x3c, 0x4f, 0x1, 0x4, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3c5}, {@loopback, 0x3}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0x3}, {@multicast1, 0x3ff}, {@private=0xa010100}, {@dev={0xac, 0x14, 0x14, 0x43}}]}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @initdev={0xac, 0x1e, 0x0, 0x0}, @loopback}}}, @ip_tos_u8={{0x11, 0x0, 0x1, 0x3f}}, @ip_ttl={{0x14, 0x0, 0x2, 0x8000}}], 0xc8}, 0x4004811) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000080)=0x0) waitid(0x0, r8, 0x0, 0x20000000, 0x0) [ 2043.439794] SELinux: duplicate or incompatible mount options [ 2043.453105] SELinux: duplicate or incompatible mount options [ 2056.366434] kmemleak: 37 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:39:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4c100, 0x0) 19:39:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xe0ffff00000000, &(0x7f00000002c0)) 19:39:11 executing program 3: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {0x0}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:39:11 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{0x0}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:39:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4dc00, 0x0) 19:39:11 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:39:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x200000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:39:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x22, r0}}) [ 2063.982469] 9pnet: Insufficient options for proto=fd [ 2064.012407] SELinux: duplicate or incompatible mount options [ 2064.014497] SELinux: duplicate or incompatible mount options 19:39:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x100000000000000, &(0x7f00000002c0)) 19:39:11 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4c100, 0x0) 19:39:11 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x500000000000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:39:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4dd00, 0x0) 19:39:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x25, r0}}) [ 2064.177424] SELinux: duplicate or incompatible mount options [ 2064.185436] SELinux: duplicate or incompatible mount options 19:39:11 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, 0x0, 0x0, 0x0) fork() 19:39:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x200000000000000, &(0x7f00000002c0)) 19:39:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xfffffff6, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:39:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x700000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 2064.243000] 9pnet: Insufficient options for proto=fd 19:39:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x2c, r0}}) 19:39:11 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x600000000000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:39:11 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4de00, 0x0) [ 2064.361778] SELinux: duplicate or incompatible mount options [ 2064.365838] 9pnet: Insufficient options for proto=fd [ 2064.371184] SELinux: duplicate or incompatible mount options [ 2079.878466] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:39:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x22}) 19:39:36 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x700000000000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:39:36 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4c100, 0x0) 19:39:36 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, 0x0, 0x0, 0x0) fork() 19:39:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x300000000000000, &(0x7f00000002c0)) 19:39:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xfffffff6, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:39:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4df00, 0x0) 19:39:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x800000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 2088.694919] SELinux: duplicate or incompatible mount options [ 2088.698923] 9pnet: Insufficient options for proto=fd [ 2088.703567] SELinux: duplicate or incompatible mount options 19:39:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x400000000000000, &(0x7f00000002c0)) 19:39:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4e000, 0x0) [ 2101.783116] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:39:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xfffffff6, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:39:57 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x2000000000000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:39:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4e100, 0x0) 19:39:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x38}) 19:39:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x500000000000000, &(0x7f00000002c0)) 19:39:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x900000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:39:57 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, 0x0, 0x0, 0x0) fork() 19:39:57 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x600, &(0x7f00000002c0)) [ 2110.345029] SELinux: duplicate or incompatible mount options [ 2110.346485] 9pnet: Insufficient options for proto=fd [ 2110.354303] SELinux: duplicate or incompatible mount options 19:39:57 executing program 5: getpgrp(0x0) process_vm_readv(0x0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 2110.366104] 9pnet: Insufficient options for proto=fd 19:39:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x600000000000000, &(0x7f00000002c0)) 19:39:58 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x4, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:39:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4e200, 0x0) 19:39:58 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x2010000000000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 2110.528219] SELinux: duplicate or incompatible mount options 19:39:58 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}], 0x1, 0x0) fork() 19:39:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xa00000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:39:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x700000000000000, &(0x7f00000002c0)) 19:39:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0xa}}) [ 2110.590638] SELinux: duplicate or incompatible mount options [ 2110.600804] SELinux: duplicate or incompatible mount options [ 2110.632850] 9pnet: Insufficient options for proto=fd [ 2124.824258] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 2133.240230] 9pnet: Insufficient options for proto=fd 19:40:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4e300, 0x0) 19:40:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x22}}) 19:40:20 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2000000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:40:20 executing program 3: r0 = getpgrp(0x0) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r3, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r3, 0x330b) pidfd_getfd(r3, r2, 0x0) ptrace$setopts(0x4200, r1, 0x100000000, 0x2) waitid(0x2, r0, 0x0, 0x8, 0x0) 19:40:20 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x290f000000000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:40:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x800000000000000, &(0x7f00000002c0)) 19:40:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xb00000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:40:20 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}], 0x1, 0x0) fork() [ 2133.258234] SELinux: duplicate or incompatible mount options [ 2133.270486] SELinux: duplicate or incompatible mount options 19:40:20 executing program 3: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) fork() 19:40:20 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2000000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:40:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x900000000000000, &(0x7f00000002c0)) 19:40:20 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x8cffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:40:20 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4e400, 0x0) 19:40:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x1000000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 2133.442687] SELinux: duplicate or incompatible mount options [ 2133.450653] SELinux: duplicate or incompatible mount options 19:40:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x25}}) 19:40:21 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}], 0x1, 0x0) fork() 19:40:21 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x2000000000000000, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) [ 2133.519433] 9pnet: Insufficient options for proto=fd [ 2144.927241] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:40:41 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {0x0}], 0x2, 0x0) fork() 19:40:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xa00000000000000, &(0x7f00000002c0)) 19:40:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x2c}}) 19:40:41 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = fork() getpgrp(r2) 19:40:41 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:40:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4e500, 0x0) 19:40:41 executing program 3: getpgrp(0x0) r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4ad, 0xfffff801, 0x172, 0x4, 0x8000, 0xffffffffffffffff}) 19:40:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x2000000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 2154.074435] 9pnet: Insufficient options for proto=fd [ 2154.091449] SELinux: duplicate or incompatible mount options [ 2154.102503] SELinux: duplicate or incompatible mount options 19:40:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xb00000000000000, &(0x7f00000002c0)) 19:40:41 executing program 3: getpgrp(0x0) r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4ad, 0xfffff801, 0x172, 0x4, 0x8000, 0xffffffffffffffff}) 19:40:41 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x2, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:40:41 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4e600, 0x0) 19:40:41 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = fork() getpgrp(r2) [ 2154.267993] SELinux: duplicate or incompatible mount options [ 2154.278498] SELinux: duplicate or incompatible mount options 19:40:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x22}) 19:40:41 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {0x0}], 0x2, 0x0) fork() [ 2154.349124] 9pnet: Insufficient options for proto=fd [ 2166.813467] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 2175.649742] SELinux: duplicate or incompatible mount options 19:41:03 executing program 3: getpgrp(0x0) r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000000)={'\x00', 0x4ad, 0xfffff801, 0x172, 0x4, 0x8000, 0xffffffffffffffff}) 19:41:03 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {0x0}], 0x2, 0x0) fork() 19:41:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x38}) 19:41:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x2010000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:41:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x2000000000000000, &(0x7f00000002c0)) 19:41:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4e700, 0x0) 19:41:03 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:41:03 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = fork() getpgrp(r2) [ 2175.666489] SELinux: duplicate or incompatible mount options 19:41:03 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x4, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:41:03 executing program 3: getpgrp(0x0) r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) 19:41:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x2010000000000000, &(0x7f00000002c0)) 19:41:03 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) fork() 19:41:03 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4e800, 0x0) [ 2175.826124] SELinux: duplicate or incompatible mount options [ 2175.839452] SELinux: duplicate or incompatible mount options 19:41:03 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000400)=""/214, 0xd6}], 0x1, 0x0) fork() 19:41:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:41:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x8cffffff00000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) [ 2175.965956] 9pnet: Insufficient options for proto=fd [ 2189.232130] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:41:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xf6ffffff00000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:41:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x8cffffff00000000, &(0x7f00000002c0)) 19:41:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [], 0x2}}) 19:41:24 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) getpgrp(0x0) fork() [ 2197.277753] 9pnet: Insufficient options for proto=fd 19:41:24 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x5, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:41:24 executing program 3: getpgrp(0x0) waitid(0x2, 0x0, 0x0, 0x2, 0x0) 19:41:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4e900, 0x0) 19:41:24 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000400)=""/214, 0xd6}], 0x1, 0x0) fork() [ 2197.294037] SELinux: duplicate or incompatible mount options 19:41:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xef08000000000000, &(0x7f00000002c0)) [ 2197.315292] SELinux: duplicate or incompatible mount options 19:41:24 executing program 3: getpgrp(0x0) waitid(0x2, 0x0, 0x0, 0x2, 0x0) 19:41:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ea00, 0x0) 19:41:25 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x6, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:41:25 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) waitid(0x2, r0, 0x0, 0x8, 0x0) fork() 19:41:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xf6ffffff00000000, &(0x7f00000002c0)) 19:41:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xffff000000000000, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:41:25 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000400)=""/214, 0xd6}], 0x1, 0x0) fork() [ 2197.499507] SELinux: duplicate or incompatible mount options [ 2197.510460] SELinux: duplicate or incompatible mount options 19:41:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [], 0x3}}) 19:41:25 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x7, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:41:25 executing program 3: getpgrp(0x0) waitid(0x2, 0x0, 0x0, 0x2, 0x0) [ 2197.603058] 9pnet: Insufficient options for proto=fd [ 2197.655241] SELinux: duplicate or incompatible mount options [ 2197.663906] SELinux: duplicate or incompatible mount options [ 2212.323545] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:41:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [], 0x4}}) 19:41:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4eb00, 0x0) 19:41:48 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:41:48 executing program 3: r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) 19:41:48 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x8, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:41:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x22, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:41:48 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:41:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0xa}}) [ 2220.489202] SELinux: duplicate or incompatible mount options [ 2220.498716] SELinux: duplicate or incompatible mount options [ 2220.499297] 9pnet: Insufficient options for proto=fd [ 2220.509790] 9pnet: Insufficient options for proto=fd [ 2220.521439] 9pnet: Insufficient options for proto=fd 19:41:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x22}}) 19:41:48 executing program 3: r0 = gettid() waitid(0x0, r0, 0x0, 0x2, 0x0) 19:41:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) 19:41:48 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x300, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 2220.629987] 9pnet: Insufficient options for proto=fd [ 2220.644976] cgroup: fork rejected by pids controller in /syz0 [ 2220.654246] 9pnet: Insufficient options for proto=fd 19:41:48 executing program 5: getpgrp(0x0) fork() [ 2220.683387] SELinux: duplicate or incompatible mount options [ 2220.693663] SELinux: duplicate or incompatible mount options 19:41:48 executing program 3: r0 = gettid() waitid(0x0, r0, 0x0, 0x2, 0x0) 19:41:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x25}}) 19:41:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [], 0x5}}) [ 2220.826156] 9pnet: Insufficient options for proto=fd [ 2220.829867] 9pnet: Insufficient options for proto=fd [ 2234.477490] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:42:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [], 0x6}}) 19:42:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x2c, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:42:10 executing program 5: getpgrp(0x0) fork() 19:42:10 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x500, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:42:10 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:42:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ed00, 0x0) 19:42:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x2c}}) 19:42:10 executing program 3: r0 = gettid() waitid(0x0, r0, 0x0, 0x2, 0x0) [ 2242.540225] 9pnet: Insufficient options for proto=fd [ 2242.541756] 9pnet: Insufficient options for proto=fd [ 2242.550057] SELinux: duplicate or incompatible mount options [ 2242.558976] SELinux: duplicate or incompatible mount options [ 2242.563934] 9pnet: Insufficient options for proto=fd [ 2257.406490] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:42:35 executing program 3: gettid() waitid(0x2, 0x0, 0x0, 0x2, 0x0) 19:42:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x22}) 19:42:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x22, {'wfdno', 0x3d, r1}}) [ 2267.444567] SELinux: duplicate or incompatible mount options [ 2267.448796] 9pnet: Insufficient options for proto=fd 19:42:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ee00, 0x0) 19:42:35 executing program 5: getpgrp(0x0) fork() 19:42:35 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x600, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:42:35 executing program 7: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:42:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [], 0x7}}) [ 2267.469373] SELinux: duplicate or incompatible mount options [ 2267.476628] 9pnet: Insufficient options for proto=fd [ 2267.478950] 9pnet: Insufficient options for proto=fd 19:42:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x38}) 19:42:35 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x700, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:42:35 executing program 3: gettid() waitid(0x2, 0x0, 0x0, 0x2, 0x0) 19:42:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ef00, 0x0) [ 2267.602707] 9pnet: Insufficient options for proto=fd 19:42:35 executing program 5: process_vm_readv(0x0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 2267.649269] SELinux: duplicate or incompatible mount options [ 2267.670987] SELinux: duplicate or incompatible mount options 19:42:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [], 0x8}}) 19:42:35 executing program 3: gettid() waitid(0x2, 0x0, 0x0, 0x2, 0x0) 19:42:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x22, r1}}) 19:42:35 executing program 7: getpgrp(0x0) fork() 19:42:35 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0xf29, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 2267.772567] 9pnet: Insufficient options for proto=fd 19:42:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4f000, 0x0) [ 2267.792838] 9pnet: Insufficient options for proto=fd 19:42:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0xa}}) [ 2267.832499] SELinux: duplicate or incompatible mount options [ 2267.869316] SELinux: duplicate or incompatible mount options 19:42:35 executing program 5: process_vm_readv(0x0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 2267.913147] 9pnet: Insufficient options for proto=fd 19:42:35 executing program 3: r0 = gettid() waitid(0x2, r0, 0x0, 0x0, 0x0) 19:42:35 executing program 5: process_vm_readv(0x0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:42:35 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x1020, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 2268.095413] SELinux: duplicate or incompatible mount options [ 2268.100373] SELinux: duplicate or incompatible mount options [ 2282.673857] kmemleak: 31 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:42:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4f100, 0x0) 19:42:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x2c, r1}}) 19:42:57 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x2000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:42:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x22}}) [ 2290.071728] SELinux: duplicate or incompatible mount options [ 2290.082228] 9pnet: Insufficient options for proto=fd [ 2290.087483] SELinux: duplicate or incompatible mount options 19:42:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [], 0x9}}) 19:42:57 executing program 5: getpgrp(0x0) process_vm_readv(0x0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:42:57 executing program 3: r0 = gettid() waitid(0x2, r0, 0x0, 0x0, 0x0) 19:42:57 executing program 7: getpgrp(0x0) fork() [ 2290.115410] 9pnet: Insufficient options for proto=fd [ 2290.116659] 9pnet: Insufficient options for proto=fd 19:42:57 executing program 3: r0 = gettid() waitid(0x2, r0, 0x0, 0x0, 0x0) 19:42:57 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x2010, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:42:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4f200, 0x0) 19:42:57 executing program 5: getpgrp(0x0) process_vm_readv(0x0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:42:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x25}}) [ 2290.317250] SELinux: duplicate or incompatible mount options 19:42:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x22}) [ 2290.336280] SELinux: duplicate or incompatible mount options 19:42:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [], 0xa}}) 19:42:57 executing program 3: process_vm_readv(0x0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 2290.409105] 9pnet: Insufficient options for proto=fd [ 2290.434731] 9pnet: Insufficient options for proto=fd [ 2290.445406] 9pnet: Insufficient options for proto=fd [ 2304.334210] kmemleak: 24 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:43:19 executing program 7: getpgrp(0x0) fork() 19:43:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:43:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x2c}}) [ 2312.092229] 9pnet: Insufficient options for proto=fd 19:43:19 executing program 5: getpgrp(0x0) process_vm_readv(0x0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:43:19 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4f300, 0x0) 19:43:19 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x290f, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:43:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [], 0xb}}) 19:43:19 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x38}) [ 2312.119216] SELinux: duplicate or incompatible mount options [ 2312.126638] SELinux: duplicate or incompatible mount options [ 2312.137911] 9pnet: Insufficient options for proto=fd [ 2312.138964] 9pnet: Insufficient options for proto=fd 19:43:19 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0xedc0, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:43:19 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, 0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 2312.295089] SELinux: duplicate or incompatible mount options [ 2312.300655] SELinux: duplicate or incompatible mount options [ 2325.827329] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:43:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x2}}) 19:43:41 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) 19:43:41 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, 0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:43:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {}, 0x22}) 19:43:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4f400, 0x0) 19:43:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [], 0x10}}) 19:43:42 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x2c, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:43:42 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x80000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 2334.465441] SELinux: duplicate or incompatible mount options [ 2334.470547] 9pnet: Insufficient options for proto=fd [ 2334.472167] 9pnet: Insufficient options for proto=fd [ 2334.482133] SELinux: duplicate or incompatible mount options 19:43:42 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, 0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 2334.494152] 9pnet: Insufficient options for proto=fd 19:43:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) 19:43:42 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0xe0ffff, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:43:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4f500, 0x0) 19:43:42 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 2334.595398] cgroup: fork rejected by pids controller in /syz5 [ 2334.641920] SELinux: duplicate or incompatible mount options [ 2334.652010] SELinux: duplicate or incompatible mount options 19:43:42 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {}, 0x38}) [ 2334.695444] 9pnet: Insufficient options for proto=fd 19:43:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) 19:43:42 executing program 2: clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) [ 2334.774113] 9pnet: Insufficient options for proto=fd [ 2350.778314] kmemleak: 27 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:44:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:44:06 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:44:06 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:44:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4f600, 0x0) 19:44:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [], 0x10}}) 19:44:06 executing program 2: ioctl$BTRFS_IOC_BALANCE_PROGRESS(0xffffffffffffffff, 0x84009422, &(0x7f0000000300)={0x0, 0x0, {0x0, @usage, 0x0}, {}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000000)=ANY=[@ANYRES32=r0, @ANYRESHEX=r1, @ANYRES64=r1, @ANYRESHEX, @ANYBLOB="2cac4e32b29dd48344e65eeba1d700", @ANYRESHEX=r2]) 19:44:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) 19:44:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x7}}) [ 2358.678338] 9pnet: Insufficient options for proto=fd [ 2358.681057] SELinux: duplicate or incompatible mount options [ 2358.684054] 9pnet: Insufficient options for proto=fd [ 2358.690146] SELinux: duplicate or incompatible mount options 19:44:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4f700, 0x0) 19:44:06 executing program 7: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x3, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:44:06 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:44:06 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) [ 2358.860593] SELinux: duplicate or incompatible mount options 19:44:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1a010280, 0x0, 0x0, 0x0, {0x2}, 0x0, 0x0, 0x0, 0x0}, 0x58) write$P9_RREADLINK(r0, &(0x7f0000000000)={0x10, 0x17, 0x1, {0x7, './file1'}}, 0x10) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:44:06 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 2358.874634] SELinux: duplicate or incompatible mount options [ 2358.881459] SELinux: duplicate or incompatible mount options 19:44:06 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [], 0x2}}) 19:44:06 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) 19:44:06 executing program 7: getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) setresuid(0xffffffffffffffff, r0, 0x0) getpgrp(0x0) r1 = syz_open_dev$evdev(&(0x7f00000007c0), 0x0, 0x0) ioctl$EVIOCGABS2F(r1, 0x8018456f, 0x0) fork() r2 = getpgrp(0x0) pidfd_open(r2, 0x0) waitid(0x1, r2, 0x0, 0x2, 0x0) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x2040, 0x0) r4 = eventfd2(0x0, 0x80000) dup2(r3, r4) 19:44:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4f800, 0x0) 19:44:06 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 2358.965574] 9pnet: Insufficient options for proto=fd [ 2358.977203] 9pnet: Insufficient options for proto=fd [ 2359.014938] SELinux: duplicate or incompatible mount options [ 2359.024577] SELinux: duplicate or incompatible mount options 19:44:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4f900, 0x0) 19:44:06 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:44:06 executing program 3: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) [ 2359.189841] SELinux: duplicate or incompatible mount options [ 2359.196628] SELinux: duplicate or incompatible mount options [ 2374.687830] kmemleak: 23 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:44:30 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) 19:44:30 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:44:30 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [], 0x3}}) 19:44:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x8}}) 19:44:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4fa00, 0x0) 19:44:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x6a02, 0x60) r1 = signalfd(r0, &(0x7f0000000040)={[0x8]}, 0x8) ioctl$AUTOFS_DEV_IOCTL_VERSION(r0, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000180)={&(0x7f0000002240)={0x18d8, 0x3a, 0x400, 0x70bd25, 0x25dfdbff, {0xd}, [@nested={0x12c8, 0x3d, 0x0, 0x1, [@generic="a416ca07e8ce8593000d30236cae693cfeaf2ae1040d5338bd59dbd6a9f949f0879e103dd57f2418b6de5a201d92a6ebe40c7d851e66542cfa650f5b1e2a6bfcf980b64c825bf7d53d51623313a8e4887f167f707143657a92cad342815c0279e753ba4f8ed6a02eb10cdd40feb1e3d9637456b75d30c9ddcccd4a33d8c5ef36a005dbbdf9d8fde28eba04eafd11b49430d44661c8f990e80024b853dd0cfc67c6f7df6feaaec49e33eea0ab163200b5d0828ea7e92332c17c51f17f1d36aa3fe81afaafb5acc2e047c430ac348d257e97e14cbee71dabdc0e3c052b03edeabc61b01193319611e12432", @typed={0x14, 0x56, 0x0, 0x0, @ipv6=@ipv4={'\x00', '\xff\xff', @private=0xa010100}}, @typed={0xc, 0x38, 0x0, 0x0, @u64=0x100000000}, @generic="2f2bbb7446f50dfc41521783db6c18fd8fe208236461c763a4a1554c94de679a4a042a140c5d754b817e828dde3d2030c585913bb00e0727288273c6762615987dc72b40de4fcdb25bcf0f5996c4fbd3358c7829ff67e72e2baaab29661c096d23d63199d62dde5cd7a919a06d7e9fa56dcca3daceffcbdcb0995025ab6899abdd409d0238c8a507adbbf91bce8ae6cc9b3d1cbf76c69ccaf11f68fe404fe22cf782f6fa73089d74bff5a47a1902fa5fb1ef096e976158797293e7f5077502b50d8ac081d89e0e3f33dd15d5064fe8b09401d6e3f8205e1759a29fa627e4b04e10180808fa3057cbb5eb8c7c9ea6c0951ab545cc9ebbfc31502e5df39ad326b29ecad1d5aa5110c2763697ec56c61b046ee3b532d4039181d01340b2cd509d7d8f7d61088c74ffc39ea61f01b0780aa54784af72ff210d987963c8ff349fad88490590c3622d9da71c132689907e0ee41e10c8397001bb7c1c97cdbf8477c908276d4ad105d611e1771b314939a4f188913b8d10f4f64a7002c28e261ef39d05fa99c608ea291df648ad92d0dcf7ebf4a3b27def646cdc4deb353b0f9b3efc293116d0e693b948f8cc6b07bcb890ddb8cd263402d7b3064e57995818d0d1602a288fbcd6b9ca391e69a934edd0c46edbb3f0197a86c29c20f4c80de91b6717e2407c02fb9b4bfe6b14c169968696cf5e12ae4bf6a8a64789cc6abc0f0a458fe4c8dc3196bd1dd833db8f1778ee4a88d2757e12960556869de8f5cd783914ae39b04bf1f238ff067f6b8d75f0c46182348e70a194a5cb07e1a537933d84733771db78f0bae50f1cc08ae34f1959807de3937c7ec01a4e5c9d99c698624113de3d10d9850f2e7efefdce331aa92b9c7458ea2f90ae33cc39b583cd68c528a13e3c8dbc50996e6941ccef85506c633e23638a8bd57716f1514578bb7309f7f19068bccff35c3e311f371dfa8fd1d3961231b6a93fcf4e7be773a378946dd8c2fe008fffc00a2fb50fddf87039c5976f76cef6cc698ad585a6eab8b9cedf5569704b1c51f251432bc94adcede3dc740234b31f5c3c78c13816f08b7dbfaae668c3c7e108a9beff451a067e71e5d61205a441d4d14ac8f816974bc6c3841eedf1ff965d3600ea341496b97afdcad3c821c5433a862eea1397175f220b339cd574af934c97789cc4fd96bdcd32b431e44409512721448e75e1406ceee7d6e9ec7f331bae655228122a11d2d430b3ef295d174d21c60c5912c0ffcf110ee6e8fac91904d54c371d22328fd85ca2ce183e324686c03c2e4fbb7c02bb2fb784840c10c66d681b4e38a4b4996d589f45038806d6af798408645efaae3bcfebb913489c9f399e017b44a5605c5f8fd4c1cd12ca4a8f3c1c10b4007a2612a0869658b935757067bdd554b3f37bef974a8aaad7405e14fe9a4057bd1f78b48018fc7f1a702c66c9ef43d0310931e25b9239783ac32191ee150b80720594719fd689b5a7732fcdd090a80492313500f4fab055e35cccb38676b086acd1358a8188e7e63bdf0305c03c81ca3611022c208ba2b933a5d3c241988d21420b8663278941bf777329d12d58b802ac4e151cfc0560c4337552a99ac0fb587f98c8f9c7a1a9ec04d896c79813b8445819406b5c86ffaa4a7cfea87577e0dde82914340fefe0528c75a422feb0f6145fd73c8c9e7ed0de048af35aeae7dc698601523234f10187166744e789fe9437e25cf87c6fea94e5b0bdf58a692fafaf11df15df2cf79aea6e5106d74c8db67e1e42471598f0f3f996dc98fffb3d34ec460439f4aa0a54819c67a91ae3f1f67f89dd5696ae0fe9d0152da2e31009bf924b187dd45bef00123a39c4b091ae203b3682e38ce2d99c21251e4126993a1b7d89391cedbac3da06be54a7e80479c7f3b1751b117765645ce870922362fcb442024c018da9e0358822f76cb4caeb578c675d1205d40c5f54c41bb4fda37820b018439adce081244db5330bafdf9baa306d155242f79275710ec91bd14ec7fdcbdb707962769023d41ef90f4a3fed14a5db7fe6e166c320c49695c7cb44433e6cf69f442b747468bd5d37a5a1bf3d0fee9497d32663e7e02be42eb465ad9557a6f7e22b098a55d38eaec9c1cbd7a04cd1e2a0b77182fa10d91cb5d7c6147adc71fb20fd76cd1d74ff095d4a011b4a75d9a0df729293ef0edd887316239fec55557a371825816823326db56740e48b4e65f2a7770ca91cbd12dc85c901cda16320b65c948312783155569a8fa8e46e8ecf710428b338456db1471c68a68244d085122a2a9b2974e47fcd14d65c13a6cde54c332f5c1fe359704c43895acad66cca92fcceb2db5ec207c7f4e9858e4b7cb3e24e438ed691d608aa82e791258f215602a29fd3cadf78b15012cedb0ecf9133dcde9c99ed194a5779f1bb51e3cd0f56b061e20e6aa8839738c067f423fc45ebbb0bbc4031d4399c32afe14061bb958e865c919bc70cd4e4047bf64d7866dab0bf374d88908aff1d0bac723643b87e34fbf6d5c761624c9d4ec0d8d6770a8e3c4938ad9bf59efb7989fcb734e8f7b4fcdaf312a68395772544cc5a9f22332337b172b38710164dd3ef6240d070933b5f440887a30444072c63e25c158e83208263fd722d740572c832ef9a8be6195ad4d3aaf8d3be8cc70a19f1374c9779c3596369c0d9ab1344faac6ff7e665d23818fec9088a4b1ff594a910f31a09ea12a24c7588b18b787fe726081a83bfa9c905ecfe3bfe51b197955c516aeb0aed83d3cc1db417392e3b6021e33531d8c212947fdd6b467a23a16c4ee6a6863c3a5a77b3c367b61bcafd47b3edbd0a6d44ad5e2e55e79cc15522eed03d5ec0db0bec02a4d89e882d3d7ee2ad1f4c44147531b620389ac419b35e1e171bf7b124575d59b3e2d73c8b8126e333158b1d19b57784dc8d6321105d5b58b12f9e7771f7e54893ae1a758e64c05b54f83108357ad91b1add7c3edde3a5fb9db02d1771bc651d00fc7a0a9d151d23e13ba8718f6bf51ca26073404ae8057c257cf0b5d55bf3fbb3453c8bc3cc694f7d2f14d638edce3e907b8f4141cf45b1b013b0db72b3372bc075d6b1a70932d2197212c0bc6d0bc8ffe1f99b2abdcdd682b5b1fef24e783a0a14b27343bf62dfb2c5f8ec2fda7396fdf7b9de8b1eae0874f73f49d7a5a85fc7ae3a8b29d494edafd740715da805ec7382754314ded2c43b9c724b55eaf790ac72e3be2d975dcc70b7ce8450fc62eea444ac6968a5eecff57cfb5a14a5a80e94bdd288dd630ad710d26ddb7e33ad0ebb96f042e40e195ea39a0aaf195fa1328f98cd94f549fa8d08926fff3307866ca52449e1826248c4d64a46a96e0f2a995367650cc8dd00b0a80fe771cfeff16014d5c3db6ce9b26ce4ba111f7b1ea73e544ffc68de46628f78ddb1d8ad8a57cdefc6ecbf203af2ae1bd8cf37095c257fb043039f578fa23514f0e3206ead127c334718dbf6ae3595b47687a044ddef6ec5720e6da19c8600c51c4097184c224ce403e870000ac97bd0e9128f66f333d600bed065f1cf195a776bdea41b10bea628d03986ab1f683efea3f24a5c6f4b5162fb3401bb94c5f8cd562031f51ef0e38ee870356fc52cba1edba2d972d3d02f0b595be697a3050fb22badd41d263928ecff034dab7ed059beb759a915d8aa61d1224c0c0de156cd4b61a578f3c7bdcf8877358fea1738cbca67524a0b1f092b4543ad771f0145f6e4238f5a1fa0c64bd2ed2b7ec026fb17cca0c10bc82d48a542eb124e5d93cce6816fd72bd5f3a283cbb8710dc6399f13be175523d093d2eb7c093b7a24e19646a64ce105b1e3773f5d2c82e182fd8b40e5420854dcd4cb1378ae51b6f013d217d15de7170c39f992cf39b25956a618ab7db5d116f30b48d692208fab3c6a5947abe5bf4a7c3431c3528f0012343781c96e28475058533c7e1cff81e08fddf182b01064aeb768374b325c975ebf896a48ad7f55127f6e59faf8405bb4f5d1a5df7f16c8d2b3e66ace27c537e70545ac7a07f274857ac68501d6268b2c21406c7f31fe28b7521bc51ee4476561eadfa6916abeacfb62ea576a416c35632648e3a98299eba2476e0dae6ff2ac151c0dd03a73e07ea300c7af5a08a57509e2cbfe0bea397b3f3f763c043b332ef65d77f270808c1ff18a7626321c984d6656c1c6a7a62e17882a56ff7710c6ebbedd6ca66c90edf65015dc7ccba6c3394abe82ad3350cdb3d844ce34dfe93c89be9fa37fb6d1e37d6335b3774ee1cca2909fb93591892e8d7fa04bd9379c7ee0b0e52f1875207b1dc9a7a2b4e207562e58a1d76c95b95248b6fe6bcf70c635da788fc473a5f838b1a88ca6d7fdbd41c938fb45892f64ee176d5fa2ba3dfee0b05cbfbf4d76c891a52ec6e7bd6a8df82b28b61ea024e6e6978f96386daed110ac364c897e6b23234985269e6c2819184821f5b0d774e88aefa21a52cee652b2a2a4285302028525725e76189e1907cad844b9221d836621b49cca3af09b590cf32187b225bdc344e39118ead70e2788403bd8b3443dd1260412b94846aea95127377e8f8c910ef97922a8348245bbbe3d0abf22638a90204715f1db284fb8d242f971b99a7ad311d87b058d7377cbfb8be6516c890126a90e5357d837420652d969ca3eccf4a9de515d1272365540d8f904917b75bfc20180ceac1fe1110f8937b1552c1752d7c2a7258ac97e481e18ebcb8b61db4403e050bde28638a636709b20df13f107e436040a78a7794d5e8d8cedc61906f85c88dc2262f8ab0ff98d0b5f5f38e70e4c2d36efe2d2b78aae53f13b133d0c2f7c87d200ed5ee99f84b07607ab5ff885f33d9c6f10734dc626ae679776ce3282184df82644e0e6c6df3eb2dd8a669c2475daa62e63503cc7c1e4391461f43256bbebfb36acde08bc558de92b1a7f45aefc7e2167fd10b2881bdfb44e8062390e2afa9bc091b6e2f13768d359178f5dd66a0fc448dda03531f52edb24c570c584b34e5017f14291afabf9f2e85d43dd0a8d459b99ca7d0b53db53b9302a90e67322c0677cb412ea471b2b97d67138e806acb85296ab29ea87d548d4f5340360681f8b9aebf3bfa96784a7d68b6e0b17ac278043857159d41a73d9003ad914a57a3572b5a55651df16cc3e3d721cdf8e2774795184c517dab26628e5ac36cbcea16194e3355bb2427dbf88cb80ff87e304682d2f5fa7c45ba7e04ee9714c358e5c730aabfc12cbb04ca7d70a2656c344fb14be7cbe0d014a73be0a6769fc2a8b820a0d6a3c67d1fe0ed76e1b859ee05f557a057021d4180622d49eaedfdbf2f32d39ec203cb9cbf6053abd83dda28364be349c5912d930d0eabc10ac8d7c3413c3f71fac8e82cd3b8f3de85063d7ea2d88c897df6902c950b837eb35ca9ca281ae30925854e1102cb5a5038a37c0b622f46c9be210b03657a605583656f9d4c27926f4ce4371d378a35a174245aece7d3379f706a079673674620f8e28f8f80d3d5636d39a5ea89cda6d4d42ca79a6094e5987cfc7188da720efc543cfee929e5029f448fea3a628e93c9dda3bd94e1da56308ba6dffd9fa6095aa5457e1dacce6e4b8eb11e5e06b92177b6ec8853d3c7393781524a38c180ed933c5d13f5dbca083f1e1dfb7b8114401c96ac7a1e339d7b041fc4c0e1e5bac61c8aa2fc3aa0fdbdd4d055e80beb78ad34ba5593fd477e66bd65b30af07921db3a154faabd5057c0c2cc29df2c0f6b0296eee37f41959889e9e4d0fdebf94fd7476fcb1580a40e974c3ce8b470a85a6462117504ae1517d2c52f956", @typed={0x50, 0x1c, 0x0, 0x0, @binary="eff35b74c692288e0ed9b24ee657aa2d89ea3cace4a7056ed2363c07b674523182ca0ff8e20a16e26e54f8ec6bd5029a83f2cf9d1869fc78ad277d6c5b5f192c0ec00384da02d4c24c869bb4"}, @typed={0x14, 0x80, 0x0, 0x0, @ipv6=@dev={0xfe, 0x80, '\x00', 0x34}}, @generic="36c262f987f466283e5c6bb9fade6c17b648dd2bb871e5481d6b7683a2e44d17a5e2b0ce843019d575a6f6916a786de776a1936f859a6c937757ff509b1b352d48a9b6a6af77090cacad22db6598d8bcbdf28fcd31ebf116d26efc60533af5bdc7aabdf0d01a3a88ebd09f3d", @typed={0x7e, 0x3f, 0x0, 0x0, @binary="3ea53d40b8e6a2c4a30f91399b7555aa591ca6d0d3e87faa0d16ed984a67fcd28e1f8a8c0d9f3c1d0255d67048f78a77a59ae013fd7aabf3d50c1116acc997a12347f4f9fd7ca7d32334fd13fb810fde1fc5c663637f55935e2f9c47c4928e7a4bfdeb28ae02442f41a9ebc090760a9c122d83d1cc24c3d832fa"}, @generic="7eee2e0664ee93c7ffdc298d005ae03480639335c637e5d2b2c57bd95b96be496dad917499053f89082c3565745fb5291c67b92ddc0e1dce61268b93cc8e573b6ad5e14eaaed0fbba0e239efb349c3aa864598db3f379c9bca51c279a3a5453a9939d66c63c6bd548dd8"]}, @generic="064d842cb50d243b7438086e11863a7f463f3921c8fe4004a9524b13e00dc96a61d82bf1b4fc0ff180b01ea4783ea78980c5285d2d23ed23f24d20b98693fd2ddef78cd7b6a61a4feb8ec0447d60556f7d8e4cccba29eeba306df92e5d4a25f589aa2ececad94839d9cc401c03339c31221627e4b315967be5a5351724ab0fe529f9d9885ff438aa186bde04a40e23160e691f4f20aace7367", @generic="8ac475daf2f7bd27d081e6a44b0da0e943075e2c675fd2abe0c6d448fde80471602354029a2d7448b71ce192e4e4df6c1815ddd97e9db50f67c788768de215557756b212be1b08ef86ab802b46cc9a3c6bc8ddc188a1a2530bb8357bf8565e25506d1cdd91b87b1297ffef40d2c37e37e5f49a7c262b4f7b7931f3d565930f64b5c0f2e641880ff6427a", @typed={0xc, 0x8b, 0x0, 0x0, @u64=0x3}, @typed={0x8, 0x6d, 0x0, 0x0, @pid=r3}, @nested={0x1af, 0x7e, 0x0, 0x1, [@generic="a483df1cd68d2a37967f02a60cf2bc0479887289c6f29acfac4ef3a9e97a5ee6c8548e8bdef4953fe3611fcc1885aceeedbbb31132872a7cc36ecece633bc002fddb8e4c57561120ad83c431331fa02b76de3bf1cb897935d1f283a82e203d1eab6080ececea886b7040ddd75803c2d8e77ffa4fec9ef782a04008432f0b6b1de5c6d75d34dda95ef3f16c2e2fbf6a39c095d42d28a4bbc6547e90ddff10167f1754af0e3145c09429e5afc9390c60f87fcf98c2ad04aa3a0d3c5fddd47a55a7ad3e0822b9284601d703464e08e6ac2bb91816c0dd2646c21e8d27b90824a1341f8ec51e66562ef0", @typed={0x8, 0x7b, 0x0, 0x0, @ipv4=@private=0xa010100}, @typed={0xc, 0x4f, 0x0, 0x0, @binary="8f5ac30189be5e2f"}, @generic="71b1c94a164a1654c081df53579ab699144bbba8a6cc1cd725d69ece0d7a995763175b88f635cafe2b1a8524cbcb5e6935ed60455fc566141476dbc32b0d3c3f92956725e9e4fd8b4bcc7b59a8a8fe1b657f1a2cf959fc0c8953d4cf6fa676f7cb06f6c0ae76620e3fcb6efbd8662cf31eb91abf38201ebc84ec1f5a4442b102dc40f022a3050200f9c901b81f6db37298ea0ce02fdf7408a08e0e63abbe94367e9100", @generic="4f45c316d09801e3541270a0"]}, @nested={0x1d1, 0x40, 0x0, 0x1, [@generic="e27d3b963ac7fc6c8745f757a0d9867591e48aadbdc3af2d01a48558a8843fcdcbf776bd484f874f7b710033fed9ce5af3956b4e2ff9d078604caf8d82d37eef509927b2d0afbe78ded1aea0b34bacc2a8c123214140d713a7377f98b3b9ed3e54060ac224ecc55c8e2f92a5374ffa78ba6d6bea60ba0da07c2f8cfcf3ad3828657a1ace9bcbacd0911b5b6823925d8063ff3157bf385d213071a4", @generic="fca6a8efb573ce33b537fb0482aafb8c0092d782db57501ae9c522e0055041443bfb8eed8ae827df5c421e404f349601425089c6312ce9a1e3964cee646474861600d2f8b1cfaf4b82571e14226a7b8922b8cbc3a7b5d79e5774d0cbce72cf2e3f9c96189700a9e82fdd6ebd1d613b3a634b8c4eac6b56a500bd025b7220fc5ba0daf422c18abdd442c682b1b2b69e691868b37bc1b0caa847071e1334ad37a913db97537340c984a17db6696f68b6c8d555f397e8", @generic="da7790f4928cc7fa0dcb4fd07b2c45e374f6a26c56e5efe2aac5f0ac489f270ef6678c06e56bc5dc5732d200417b80165f9f4afd371b57b7aec1e6c4aaafd8cc000c7302cd24b339dc73d4248011ab16d314ba45bd60d51881187dcdc65441dcad4f8f5f1bde32f1c1ca90039c607c1ce6482f57cd6696a109a20fa364"]}, @generic="b1d5b75a80e63fdcd492ad869149e2b1b16d7f906edf130d5b4c859e1ef2f84eea1b192b29ff85c70b8f15b0af048468ee84e831074f5d581b05b65aed2be1df4afd0d83de3f654b8618ad237612b32f9a467e002b3b15e395b0d0ee6992d6fc0142b36ee6f4ff390f4e9d3057f91786a3456b6a33ff232f69f0f153c12c863de4", @generic="0d64b7d32e2e22f796ea61bd874c32664d6f9fafda7d39eff410769b27c4ff6a2fb075bc676a90eeaf5d71d88d39e44493374bc83d4e71755142a9ecf98bb9efd5dfeb391d777b5e9644dfde21a3817060fc8535f846c151822a7a4c3ade0100c256d51e8890ea4107383b7f", @generic="2d2c6a7c38fcedfc1b8abc6377bb53c113cfc96f1d2972ff3257237eb4dc19f849b7004a3f0d2b52e6e4b27a5456dedf348c148702c2ce1ab85456eefdd09416a52cbcd707a263df309a7526656d3fc62d6d03"]}, 0x18d8}, 0x1, 0x0, 0x0, 0x40801}, 0x24008050) clone3(&(0x7f00000008c0)={0xa1040080, 0x0, 0x0, 0x0, {0x40}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) r4 = syz_io_uring_complete(0x0) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r6, r5) ioctl$INCFS_IOC_FILL_BLOCKS(r4, 0x80106720, &(0x7f0000000280)={0x0, &(0x7f0000000580)}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000600), r0) ioctl$FS_IOC_SETVERSION(r5, 0x40087602, &(0x7f0000000240)=0x9) write$P9_RREADLINK(r4, &(0x7f0000000640)=ANY=[@ANYBLOB="10f7ffff16020007002e2f66697b306c653134f0f0e6bb025ce4e033f4f3bc8d495b3d65e42ea4366d"], 0x10) 19:44:30 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:44:30 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x8, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 2382.460985] SELinux: duplicate or incompatible mount options [ 2382.463472] 9pnet: Insufficient options for proto=fd [ 2382.479649] SELinux: duplicate or incompatible mount options [ 2382.486405] 9pnet: Insufficient options for proto=fd 19:44:30 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:44:30 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) [ 2382.657553] SELinux: duplicate or incompatible mount options [ 2382.666414] SELinux: duplicate or incompatible mount options [ 2399.389988] kmemleak: 11 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:44:57 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x8, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:44:57 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {0x0}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:44:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x9}}) 19:44:57 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 2409.754001] 9pnet: Insufficient options for proto=fd 19:44:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [], 0x4}}) 19:44:57 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) 19:44:57 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000001340), 0xffffffffffffffff) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000240)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r6) ioctl$sock_SIOCGIFINDEX_802154(r5, 0x8933, &(0x7f0000000240)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x24, r8, 0x501, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_ENABLED={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r9}]}, 0x24}}, 0x0) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x3c, r2, 0x300, 0x70bd26, 0x25dfdbfe, {}, [@NL802154_ATTR_CCA_ED_LEVEL={0x8, 0xe, 0xb}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_CCA_ED_LEVEL={0x8, 0xe, 0xe}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r9}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8000}, 0x20000041) r10 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r10}}) 19:44:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4fb00, 0x0) [ 2409.773334] SELinux: duplicate or incompatible mount options [ 2409.775557] SELinux: duplicate or incompatible mount options [ 2409.778874] 9pnet: Insufficient options for proto=fd [ 2409.804350] 9pnet: Insufficient options for proto=fd 19:44:57 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x8, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:44:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) 19:44:57 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:44:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4fc00, 0x0) 19:44:57 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {0x0}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 2409.934422] SELinux: duplicate or incompatible mount options [ 2409.946544] SELinux: duplicate or incompatible mount options 19:44:57 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [], 0x5}}) [ 2409.958784] 9pnet: Insufficient options for proto=fd 19:44:57 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) 19:44:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000180)=""/17) execveat(r1, &(0x7f0000000000)='./file1\x00', &(0x7f0000000180)=[&(0x7f0000000040)='wfdno', &(0x7f0000000080)='\xb5\x13)\x00', &(0x7f0000000140)='\x00'], &(0x7f0000000340)=[&(0x7f0000000200)='[.-}O\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='wfdno'], 0x1000) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:44:57 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4fd00, 0x0) [ 2410.041360] 9pnet: Insufficient options for proto=fd 19:44:57 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 2410.112202] 9pnet: Insufficient options for proto=fd [ 2410.113257] SELinux: duplicate or incompatible mount options [ 2410.124898] SELinux: duplicate or incompatible mount options [ 2423.882166] kmemleak: 25 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:45:21 executing program 7: connect(0xffffffffffffffff, &(0x7f0000000000)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x80) r0 = getpgrp(0x0) r1 = socket$unix(0x1, 0x2, 0x0) fallocate(r1, 0x10, 0x8, 0xfffffffffffff001) bind(r1, &(0x7f0000000080)=@x25, 0x80) pidfd_open(r0, 0x0) r2 = fork() r3 = getpgrp(r2) waitid(0x2, r3, 0x0, 0x4, 0x0) recvmmsg$unix(r1, &(0x7f0000005f00)=[{{&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000200)=""/110, 0x6e}, {&(0x7f0000000280)=""/188, 0xbc}, {&(0x7f0000000340)=""/190, 0xbe}], 0x3, &(0x7f0000000440)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}}, {{&(0x7f0000000580), 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000600)=""/189, 0xbd}], 0x1, &(0x7f0000000700)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}}, {{&(0x7f0000000780), 0x6e, &(0x7f0000001980)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/220, 0xdc}, {&(0x7f0000001900)=""/126, 0x7e}], 0x3, &(0x7f00000019c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}}, {{&(0x7f0000001ac0)=@abs, 0x6e, &(0x7f0000001f00)=[{&(0x7f0000001b40)=""/64, 0x40}, {&(0x7f0000001b80)=""/138, 0x8a}, {&(0x7f0000001c40)=""/149, 0x95}, {&(0x7f0000001d00)=""/5, 0x5}, {&(0x7f0000001d40)=""/87, 0x57}, {&(0x7f0000001dc0)=""/118, 0x76}, {&(0x7f0000001e40)=""/38, 0x26}, {&(0x7f0000001e80)=""/20, 0x14}, {&(0x7f0000001ec0)=""/59, 0x3b}], 0x9, &(0x7f0000001fc0)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x128}}, {{&(0x7f0000002100)=@abs, 0x6e, &(0x7f0000002280)=[{&(0x7f0000002180)=""/17, 0x11}, {&(0x7f00000021c0)}, {&(0x7f0000002200)=""/122, 0x7a}], 0x3, &(0x7f00000022c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}}, {{&(0x7f0000002300), 0x6e, &(0x7f0000003540)=[{&(0x7f0000002380)=""/118, 0x76}, {&(0x7f0000002400)=""/61, 0x3d}, {&(0x7f0000002440)=""/33, 0x21}, {&(0x7f0000002480)=""/182, 0xb6}, {&(0x7f0000002540)=""/4096, 0x1000}], 0x5, &(0x7f00000035c0)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000003600)=@abs, 0x6e, &(0x7f0000003c80)=[{&(0x7f0000003680)=""/56, 0x38}, {&(0x7f00000036c0)=""/254, 0xfe}, {&(0x7f00000037c0)=""/147, 0x93}, {&(0x7f0000003880)=""/253, 0xfd}, {&(0x7f0000003980)=""/152, 0x98}, {&(0x7f0000003a40)=""/186, 0xba}, {&(0x7f0000003b00)=""/159, 0x9f}, {&(0x7f0000003bc0)=""/124, 0x7c}, {&(0x7f0000003c40)=""/30, 0x1e}], 0x9, &(0x7f0000003d40)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}}, {{&(0x7f0000003e00)=@abs, 0x6e, &(0x7f00000054c0)=[{&(0x7f0000003e80)=""/28, 0x1c}, {&(0x7f0000003ec0)=""/96, 0x60}, {&(0x7f0000003f40)=""/186, 0xba}, {&(0x7f0000004000)=""/197, 0xc5}, {&(0x7f0000004100)=""/172, 0xac}, {&(0x7f00000041c0)=""/166, 0xa6}, {&(0x7f0000004280)=""/254, 0xfe}, {&(0x7f0000004380)=""/112, 0x70}, {&(0x7f0000004400)=""/190, 0xbe}, {&(0x7f00000044c0)=""/4096, 0x1000}], 0xa}}, {{&(0x7f0000005580)=@abs, 0x6e, &(0x7f0000005b80)=[{&(0x7f0000005600)=""/113, 0x71}, {&(0x7f0000005680)=""/192, 0xc0}, {&(0x7f0000005740)=""/255, 0xff}, {&(0x7f0000005840)=""/16, 0x10}, {&(0x7f0000005880)=""/131, 0x83}, {&(0x7f0000005940)=""/254, 0xfe}, {&(0x7f0000005a40)=""/43, 0x2b}, {&(0x7f0000005a80)=""/164, 0xa4}, {&(0x7f0000005b40)=""/17, 0x11}], 0x9}}, {{&(0x7f0000005c40), 0x6e, &(0x7f0000005d80)=[{&(0x7f0000005cc0)=""/160, 0xa0}], 0x1, &(0x7f0000005dc0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x120}}], 0xa, 0x10000, &(0x7f0000006180)) r5 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r5, 0x8018456f, &(0x7f0000000180)=""/17) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x7f, 0x6, 0x7, 0x3, 0x0, 0x6, 0x40000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xffffffffffffffff}, 0x2, 0xc9df, 0x6, 0x0, 0x4ab1, 0xfffffffa, 0x7fff, 0x0, 0x8, 0x0, 0x6000000000000000}, r4, 0x10, r5, 0x1) getpgrp(r3) 19:45:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4fe00, 0x0) 19:45:21 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {0x0}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:45:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) 19:45:21 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x290f0000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:45:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0xa}}) [ 2433.948148] SELinux: duplicate or incompatible mount options [ 2433.960473] SELinux: duplicate or incompatible mount options 19:45:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESOCT=r0, @ANYBLOB="2c77664a6e6f3c04270c0ef8ac00beac0466407ce377c41b9ff1e3a5e9432ea1df71f34629486be3e2f8f8e9d6a89a7a728cac29cdc4c104b1fb757f9ba84393be89fdc6949a69fb546b87ec8adf4aa0d9eef80a80f6f5363aebef4c0af59d08f1976fc63c1ba73e829de0e9f4ec2d5ed2fbc04b4f930f1976ed41f16e53956a42f2022a1f4b7b", @ANYRESHEX, @ANYBLOB=',\x00']) 19:45:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [], 0x6}}) [ 2433.991204] 9pnet: Insufficient options for proto=fd [ 2434.005563] 9pnet: Insufficient options for proto=fd 19:45:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) 19:45:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ff00, 0x0) 19:45:21 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 2434.132121] SELinux: duplicate or incompatible mount options [ 2434.144980] SELinux: duplicate or incompatible mount options 19:45:21 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) 19:45:21 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:45:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [], 0x7}}) 19:45:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x2) 19:45:21 executing program 7: connect(0xffffffffffffffff, &(0x7f0000000000)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x80) r0 = getpgrp(0x0) r1 = socket$unix(0x1, 0x2, 0x0) fallocate(r1, 0x10, 0x8, 0xfffffffffffff001) bind(r1, &(0x7f0000000080)=@x25, 0x80) pidfd_open(r0, 0x0) r2 = fork() r3 = getpgrp(r2) waitid(0x2, r3, 0x0, 0x4, 0x0) recvmmsg$unix(r1, &(0x7f0000005f00)=[{{&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000200)=""/110, 0x6e}, {&(0x7f0000000280)=""/188, 0xbc}, {&(0x7f0000000340)=""/190, 0xbe}], 0x3, &(0x7f0000000440)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}}, {{&(0x7f0000000580), 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000600)=""/189, 0xbd}], 0x1, &(0x7f0000000700)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}}, {{&(0x7f0000000780), 0x6e, &(0x7f0000001980)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/220, 0xdc}, {&(0x7f0000001900)=""/126, 0x7e}], 0x3, &(0x7f00000019c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}}, {{&(0x7f0000001ac0)=@abs, 0x6e, &(0x7f0000001f00)=[{&(0x7f0000001b40)=""/64, 0x40}, {&(0x7f0000001b80)=""/138, 0x8a}, {&(0x7f0000001c40)=""/149, 0x95}, {&(0x7f0000001d00)=""/5, 0x5}, {&(0x7f0000001d40)=""/87, 0x57}, {&(0x7f0000001dc0)=""/118, 0x76}, {&(0x7f0000001e40)=""/38, 0x26}, {&(0x7f0000001e80)=""/20, 0x14}, {&(0x7f0000001ec0)=""/59, 0x3b}], 0x9, &(0x7f0000001fc0)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x128}}, {{&(0x7f0000002100)=@abs, 0x6e, &(0x7f0000002280)=[{&(0x7f0000002180)=""/17, 0x11}, {&(0x7f00000021c0)}, {&(0x7f0000002200)=""/122, 0x7a}], 0x3, &(0x7f00000022c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}}, {{&(0x7f0000002300), 0x6e, &(0x7f0000003540)=[{&(0x7f0000002380)=""/118, 0x76}, {&(0x7f0000002400)=""/61, 0x3d}, {&(0x7f0000002440)=""/33, 0x21}, {&(0x7f0000002480)=""/182, 0xb6}, {&(0x7f0000002540)=""/4096, 0x1000}], 0x5, &(0x7f00000035c0)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000003600)=@abs, 0x6e, &(0x7f0000003c80)=[{&(0x7f0000003680)=""/56, 0x38}, {&(0x7f00000036c0)=""/254, 0xfe}, {&(0x7f00000037c0)=""/147, 0x93}, {&(0x7f0000003880)=""/253, 0xfd}, {&(0x7f0000003980)=""/152, 0x98}, {&(0x7f0000003a40)=""/186, 0xba}, {&(0x7f0000003b00)=""/159, 0x9f}, {&(0x7f0000003bc0)=""/124, 0x7c}, {&(0x7f0000003c40)=""/30, 0x1e}], 0x9, &(0x7f0000003d40)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}}, {{&(0x7f0000003e00)=@abs, 0x6e, &(0x7f00000054c0)=[{&(0x7f0000003e80)=""/28, 0x1c}, {&(0x7f0000003ec0)=""/96, 0x60}, {&(0x7f0000003f40)=""/186, 0xba}, {&(0x7f0000004000)=""/197, 0xc5}, {&(0x7f0000004100)=""/172, 0xac}, {&(0x7f00000041c0)=""/166, 0xa6}, {&(0x7f0000004280)=""/254, 0xfe}, {&(0x7f0000004380)=""/112, 0x70}, {&(0x7f0000004400)=""/190, 0xbe}, {&(0x7f00000044c0)=""/4096, 0x1000}], 0xa}}, {{&(0x7f0000005580)=@abs, 0x6e, &(0x7f0000005b80)=[{&(0x7f0000005600)=""/113, 0x71}, {&(0x7f0000005680)=""/192, 0xc0}, {&(0x7f0000005740)=""/255, 0xff}, {&(0x7f0000005840)=""/16, 0x10}, {&(0x7f0000005880)=""/131, 0x83}, {&(0x7f0000005940)=""/254, 0xfe}, {&(0x7f0000005a40)=""/43, 0x2b}, {&(0x7f0000005a80)=""/164, 0xa4}, {&(0x7f0000005b40)=""/17, 0x11}], 0x9}}, {{&(0x7f0000005c40), 0x6e, &(0x7f0000005d80)=[{&(0x7f0000005cc0)=""/160, 0xa0}], 0x1, &(0x7f0000005dc0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x120}}], 0xa, 0x10000, &(0x7f0000006180)) r5 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r5, 0x8018456f, &(0x7f0000000180)=""/17) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x7f, 0x6, 0x7, 0x3, 0x0, 0x6, 0x40000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xffffffffffffffff}, 0x2, 0xc9df, 0x6, 0x0, 0x4ab1, 0xfffffffa, 0x7fff, 0x0, 0x8, 0x0, 0x6000000000000000}, r4, 0x10, r5, 0x1) getpgrp(r3) 19:45:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x40200, 0x0) r3 = gettid() r4 = getpgrp(0x0) pidfd_open(r4, 0x0) r5 = getpgrp(0x0) pidfd_open(r5, 0x0) r6 = gettid() r7 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r7, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r7, 0x330b) clone3(&(0x7f00000006c0)={0x4800000, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), {0xc}, &(0x7f0000000580)=""/168, 0xa8, &(0x7f0000000640), &(0x7f0000000680)=[r3, r4, r5, r6, r1], 0x5, {r7}}, 0x58) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000300)={{{@in=@initdev, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in6=@mcast2}}, &(0x7f0000000080)=0xe8) sendmsg$nl_generic(r2, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0x160, 0x12, 0x1, 0x70bd2c, 0x25dfdbfb, {0x5}, [@nested={0x84, 0x17, 0x0, 0x1, [@typed={0x45, 0x83, 0x0, 0x0, @binary="82468a372afc68d51d00f455e17194177bf4f3a13d974b760d92d6e57dead672fd691ff68bf9baa60027551c950554d1eb151f85738e42be41de7e8aa3565905b0"}, @generic="5e3c857ac81dd2f0f1a45288a17e090a3b2b40e269a4749b99c865e462491bbe1d853dd0061fd6e6572b8c0f2e593c11", @typed={0x8, 0x15, 0x0, 0x0, @uid=r8}]}, @generic="ccf1edf9ef2a5c2f6b32d1cf2b90c3adfb9281a5d4f51b110398843a6d456ce78caa6fcbe1381a15c16c5f5a9f0801203113f5eb625231c39b85a0692f7e30e5b6b4827b6182f77282bbc633cc189b00268a9048d1380ca44168656b29bf64a3301cf982a9f7f35a9c839d80024a11268e0c60702e159ae7e237f279f0967034ad686d52304daa6d4b5006fabdf876792d19139e410b9ddd779ea49532a6cd460ac76d5b873abcce6fc9d1f7cd62adcd6967212c5e5189418db4734c1ca5e64ae6adf1dd28"]}, 0x160}, 0x1, 0x0, 0x0, 0x4000}, 0x41) 19:45:21 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 2434.267584] 9pnet: Insufficient options for proto=fd [ 2434.285314] 9pnet: Insufficient options for proto=fd [ 2434.304289] SELinux: duplicate or incompatible mount options [ 2434.314361] SELinux: duplicate or incompatible mount options [ 2451.321112] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:45:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0xb}}) 19:45:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="b09c7c1a10d5042274642c7266646e6f3d", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) fork() r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000200)) r3 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) readv(r0, &(0x7f0000000580)=[{&(0x7f00000002c0)=""/40, 0x28}, {&(0x7f0000000480)=""/210, 0xd2}], 0x2) ioctl$SG_SET_TIMEOUT(r3, 0x5392, &(0x7f0000000040)) write$binfmt_script(r2, &(0x7f00000005c0)={'#! ', './file1', [{0x20, '+'}, {0x20, '9p\x00'}, {0x20, '9p\x00'}, {0x20, '9p\x00'}, {0x20, '9p\x00'}, {0x20, '9p\x00'}], 0xa, "3f58b550eacd45294103d79c69598a9effec0516925ef8edbe9f3bb28c766e29dc9ded263324683290121a176507e1e9f352135ce93849adba466472690a9592de16d720d3df88abeeffc9ab185eb8d838ab3c3cc8a0ead92b9f6555884e6cbcccfa22875344db87e8ccb890d243f07cd68bee43d49d84e31811e4bb738099fa7eccd718546959bf6450869e8329af7437a4c2823fbfb7478b896fb020d264c7849d6f1abca3c42f486ba81dc2ed12e1a0a4bbd9267ee86a28b1270fa976e34d1dbe71c0c4cb970dd7c8d04e75614dc314692fbe2cd303f2f431b2e7815644a70a"}, 0x102) ioctl$SNAPSHOT_S2RAM(r3, 0x330b) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000240)) r4 = getpgrp(0x0) pidfd_open(r4, 0x0) clone3(&(0x7f0000000400)={0x2000000, &(0x7f0000000000), &(0x7f0000000140), &(0x7f0000000080), {0x28}, &(0x7f0000000300)=""/235, 0xeb, &(0x7f0000000700)=""/96, &(0x7f0000000780), 0x0, {r3}}, 0x58) 19:45:47 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:45:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x3) 19:45:47 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:45:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [], 0x8}}) 19:45:47 executing program 7: connect(0xffffffffffffffff, &(0x7f0000000000)=@x25={0x9, @remote={'\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc\xcc', 0x1}}, 0x80) r0 = getpgrp(0x0) r1 = socket$unix(0x1, 0x2, 0x0) fallocate(r1, 0x10, 0x8, 0xfffffffffffff001) bind(r1, &(0x7f0000000080)=@x25, 0x80) pidfd_open(r0, 0x0) r2 = fork() r3 = getpgrp(r2) waitid(0x2, r3, 0x0, 0x4, 0x0) recvmmsg$unix(r1, &(0x7f0000005f00)=[{{&(0x7f0000000180)=@abs, 0x6e, &(0x7f0000000400)=[{&(0x7f0000000200)=""/110, 0x6e}, {&(0x7f0000000280)=""/188, 0xbc}, {&(0x7f0000000340)=""/190, 0xbe}], 0x3, &(0x7f0000000440)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}}, {{&(0x7f0000000580), 0x6e, &(0x7f00000006c0)=[{&(0x7f0000000600)=""/189, 0xbd}], 0x1, &(0x7f0000000700)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x50}}, {{&(0x7f0000000780), 0x6e, &(0x7f0000001980)=[{&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/220, 0xdc}, {&(0x7f0000001900)=""/126, 0x7e}], 0x3, &(0x7f00000019c0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf8}}, {{&(0x7f0000001ac0)=@abs, 0x6e, &(0x7f0000001f00)=[{&(0x7f0000001b40)=""/64, 0x40}, {&(0x7f0000001b80)=""/138, 0x8a}, {&(0x7f0000001c40)=""/149, 0x95}, {&(0x7f0000001d00)=""/5, 0x5}, {&(0x7f0000001d40)=""/87, 0x57}, {&(0x7f0000001dc0)=""/118, 0x76}, {&(0x7f0000001e40)=""/38, 0x26}, {&(0x7f0000001e80)=""/20, 0x14}, {&(0x7f0000001ec0)=""/59, 0x3b}], 0x9, &(0x7f0000001fc0)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x128}}, {{&(0x7f0000002100)=@abs, 0x6e, &(0x7f0000002280)=[{&(0x7f0000002180)=""/17, 0x11}, {&(0x7f00000021c0)}, {&(0x7f0000002200)=""/122, 0x7a}], 0x3, &(0x7f00000022c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x38}}, {{&(0x7f0000002300), 0x6e, &(0x7f0000003540)=[{&(0x7f0000002380)=""/118, 0x76}, {&(0x7f0000002400)=""/61, 0x3d}, {&(0x7f0000002440)=""/33, 0x21}, {&(0x7f0000002480)=""/182, 0xb6}, {&(0x7f0000002540)=""/4096, 0x1000}], 0x5, &(0x7f00000035c0)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000003600)=@abs, 0x6e, &(0x7f0000003c80)=[{&(0x7f0000003680)=""/56, 0x38}, {&(0x7f00000036c0)=""/254, 0xfe}, {&(0x7f00000037c0)=""/147, 0x93}, {&(0x7f0000003880)=""/253, 0xfd}, {&(0x7f0000003980)=""/152, 0x98}, {&(0x7f0000003a40)=""/186, 0xba}, {&(0x7f0000003b00)=""/159, 0x9f}, {&(0x7f0000003bc0)=""/124, 0x7c}, {&(0x7f0000003c40)=""/30, 0x1e}], 0x9, &(0x7f0000003d40)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xc0}}, {{&(0x7f0000003e00)=@abs, 0x6e, &(0x7f00000054c0)=[{&(0x7f0000003e80)=""/28, 0x1c}, {&(0x7f0000003ec0)=""/96, 0x60}, {&(0x7f0000003f40)=""/186, 0xba}, {&(0x7f0000004000)=""/197, 0xc5}, {&(0x7f0000004100)=""/172, 0xac}, {&(0x7f00000041c0)=""/166, 0xa6}, {&(0x7f0000004280)=""/254, 0xfe}, {&(0x7f0000004380)=""/112, 0x70}, {&(0x7f0000004400)=""/190, 0xbe}, {&(0x7f00000044c0)=""/4096, 0x1000}], 0xa}}, {{&(0x7f0000005580)=@abs, 0x6e, &(0x7f0000005b80)=[{&(0x7f0000005600)=""/113, 0x71}, {&(0x7f0000005680)=""/192, 0xc0}, {&(0x7f0000005740)=""/255, 0xff}, {&(0x7f0000005840)=""/16, 0x10}, {&(0x7f0000005880)=""/131, 0x83}, {&(0x7f0000005940)=""/254, 0xfe}, {&(0x7f0000005a40)=""/43, 0x2b}, {&(0x7f0000005a80)=""/164, 0xa4}, {&(0x7f0000005b40)=""/17, 0x11}], 0x9}}, {{&(0x7f0000005c40), 0x6e, &(0x7f0000005d80)=[{&(0x7f0000005cc0)=""/160, 0xa0}], 0x1, &(0x7f0000005dc0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x120}}], 0xa, 0x10000, &(0x7f0000006180)) r5 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r5, 0x8018456f, &(0x7f0000000180)=""/17) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x7f, 0x6, 0x7, 0x3, 0x0, 0x6, 0x40000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xffffffffffffffff}, 0x2, 0xc9df, 0x6, 0x0, 0x4ab1, 0xfffffffa, 0x7fff, 0x0, 0x8, 0x0, 0x6000000000000000}, r4, 0x10, r5, 0x1) getpgrp(r3) 19:45:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) [ 2460.029597] 9pnet: Insufficient options for proto=fd [ 2460.033967] SELinux: duplicate or incompatible mount options [ 2460.036176] SELinux: duplicate or incompatible mount options 19:45:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x4ec00, 0x0) 19:45:47 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0xffffe000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:45:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x4) 19:45:47 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:45:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [], 0x9}}) [ 2460.201557] SELinux: duplicate or incompatible mount options [ 2460.211918] SELinux: duplicate or incompatible mount options 19:45:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x4ec00, 0x0) [ 2460.287391] 9pnet: Insufficient options for proto=fd [ 2477.641519] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:46:13 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:46:13 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:46:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [], 0x10}}) 19:46:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [], 0xa}}) 19:46:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x5) 19:46:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x4ec00, 0x0) 19:46:13 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {0x0}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:46:13 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x1, &(0x7f0000002500)=[{0x0}], 0x0, &(0x7f0000002680)=ANY=[]) syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='mnt/encrypted_dir\x00', 0x7fff, 0x2, &(0x7f0000000140)=[{&(0x7f0000000080), 0x0, 0x800}, {&(0x7f0000000200)="ebdcf053f15ea66a2e7b2b9c94663310bc7eb2cd5fab3715d736b28a57257947b2c6c814ce79494aa1fae66cb3f4a87d0bf7f8608f00ea747345ee665f29b55a8034fec83b4c035cffe2db07bc480d78f9fe07017f22e2a57a1dbf144587c69af54aaaacc5b0323f9a148d52d46563a624a13a5131d67467cc4d2e7f3bddada2a804b168f4f6db0e8b7de682a752b01e923a9f5e213e1f14100b4679ae1f62eb689857ba9821d1b0889d0bb7b63382c44857f569c19fad013d2912ea25fbfc362f104ef796217a1084b7397701c7f91fef79b8ebb205d741883f3d", 0xdb, 0x9}], 0x1010000, &(0x7f0000000300)={[{'-%{,'}, {'['}, {'\'}+-*'}, {'^.['}], [{@measure}]}) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0) write(0xffffffffffffffff, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) rename(&(0x7f0000000180)='mnt/encrypted_dir\x00', &(0x7f00000001c0)='./file0\x00') [ 2486.196952] 9pnet: Insufficient options for proto=fd [ 2486.203434] SELinux: duplicate or incompatible mount options [ 2486.212851] SELinux: duplicate or incompatible mount options 19:46:13 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x6) 19:46:13 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:46:13 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 19:46:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = io_uring_setup(0x1523, &(0x7f0000000000)={0x0, 0x7319, 0x20, 0x1, 0x212, 0x0, r0}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r3, r2) r4 = open_tree(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x88000) ppoll(&(0x7f0000000140)=[{r0, 0x30}, {r0, 0x807d}, {r1, 0x200a}, {r3, 0x1040}, {r0, 0x1004}, {r0}, {r0, 0x2008}, {r4, 0x1}], 0x8, &(0x7f0000000180), &(0x7f0000000200)={[0x100000000]}, 0x8) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 2486.380801] SELinux: duplicate or incompatible mount options [ 2486.387783] SELinux: duplicate or incompatible mount options 19:46:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [], 0xb}}) 19:46:14 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {0x0}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:46:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x7) [ 2486.449533] 9pnet: Insufficient options for proto=fd 19:46:14 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:46:14 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) [ 2486.495326] 9pnet: Insufficient options for proto=fd [ 2486.571065] SELinux: duplicate or incompatible mount options [ 2486.584007] SELinux: duplicate or incompatible mount options 19:46:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x8) [ 2503.031785] kmemleak: 34 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 2511.804731] SELinux: duplicate or incompatible mount options 19:46:39 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x8000000000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:46:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r1, 0x330b) ioctl$FICLONERANGE(r0, 0x4020940d, &(0x7f0000000000)={{r1}, 0xb356, 0x1000, 0x1}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:46:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 19:46:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x40}}, './file1\x00'}) ioctl$SNAPSHOT_ATOMIC_RESTORE(r4, 0x3304) dup2(r3, r2) sendmsg$nl_generic(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x14, 0x3b, 0x200, 0x70bd2a, 0x25dfdbfc, {0x7}}, 0x14}, 0x1, 0x0, 0x0, 0x4041}, 0x4) 19:46:39 executing program 7: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 19:46:39 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {0x0}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:46:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) sendmsg$unix(r0, &(0x7f00000006c0)={&(0x7f0000000000)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f0000000640)=[{&(0x7f0000000940)="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", 0x1000}, {&(0x7f0000000200)="8e5d43973c8af53c5900ac16f4a7007df29f89331b4f62179aefeb507b3258e90bc4ce8af31c40706823fe9d3e01451886509fd86dc5b85263f06b5870da8efaa581ab903d34d240662af14a50d06e77c4bbb637c961d4cd89ade69f0b8d17e3fb44c72577bf35bbfd5f13b1e97bab503478b865b7ddbb04c8cbca6b885cfacebf0c96b7177019e7f90ab340f31a80e51ff8559f9b178e6df4836ecd4cb152b92682f797d414ef9a88a8a276bc5b", 0xae}, {&(0x7f0000000300)="1929f840cc00eb4f9f775973ad25c58842527f64cff1c4b6e1f6991390a9bb26e3701f8967669d3b7bd252b752241cb6890627b45cb5e7cb16d71b841532655de54359f945a09bdba5c25af6ff10b49658c85759f07427c38b165897c31ecabbb0f54d9c27dcab481d7ac2bcbd3881e9187b60347ea685551550ff157465b988e7150d3d4722e5c444ce160ce5dac7cd1d49e12b9a5fcb8aa0cc1ff729874ca923d48495fa074cff61130c5c5b2b034080228cf9", 0xb4}, {&(0x7f00000003c0)="a8415b280a9558058e21e75d83a5abb5cc7e3e718a8eaebcba8c46e3e6d55475da0e9c1e303689a1ae8ecd4cc0d9554688c0c85a391fc83b5d9ce1d2a800f46738d8115a7db042141731a147daeea5662a9182f96a2dde75a54b023b9b4f603fc02754eeb460feea543c08cade5f8226a440f84a32cf05403fbcb8e2e292c479596772bb77378123d4c7f2e07215d86315a926d130b59cd94d49a60e4bb230e584ac88b603d584ca82dadc4f43af7fe7f0a14d5a17a61dfcc030d6d662f9809e9d4b53a1da2bfd6e14f5bb5cbfb5e3ac215a2e7983e9be", 0xd7}, {&(0x7f0000000140)="4208fe2dc2f82c9ff57180cf7a59f76fa84553b0c0d68f64cb6b617cd816aaecba100f8a37604cac7807b35cd81da2cab33edb5b3935c69491d65b637e63ca5cabdb79c41513d9cb1c7c72d0a6340c5965b4a99f28b76545670cf8be302f22591f0b80931abc71790a", 0x69}, {&(0x7f00000004c0)="968cf713d4ab347dcd7d141e771de895933d59df5619070fa9a3c53d426b75157d13ed5eb0b9185654290a8a93dc4baf2fbdf7ebf31f3af7467c315781eb64b3b42439955c53fa7100b9fdc734be6dcaf1a8a6cc5fc6f562af600bb71fe22dba6551f27641e6db4b9e8085fc06fb64289b0d0dd559411e357335c8e63a61eac16144df3150603ec997bb196f9d0af3ff47b3f81b1c70b8759dafc3f976b38fb54e1b9806c23b4e9e", 0xa8}, {&(0x7f0000000580)="eff9ec70908410b2bfc70136c7d78361a5bc622f7f4794c69f395638ec357f7ec66f34c5ecdec2361d2ae8bc82e18e4b1793a64bc01d064adf6ae9229ca9da58a7e128614c987452563b904e086ab25832655e36800bda52f7deb40587df191d8486667357abd70d1aa0cdcdcf5476bf704782b2409b225f403cdabfb2c5762204aecdf923d1389f3341978f6dcc2e37a6a9c413d550de4cc437b4f990", 0x9d}, {&(0x7f0000000080)="f9b2bb0a2def12c01b680453eed838920f22b26fafde09d9481439b49ac8d9f18eb1890f0c300a9df4b1dd363b8b5ea8d9eaba5b6212ef49159f37a1", 0x3c}], 0x8, 0x0, 0x0, 0x50}, 0x4000) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x5392, &(0x7f0000000040)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r4, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) poll(&(0x7f0000000780)=[{r4, 0x400}, {r3, 0x10c5}, {r2, 0x1}], 0x3, 0xa3db) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r5, r3) poll(&(0x7f0000000700)=[{r0, 0x8000}, {r2, 0x4021}, {r3, 0x40}], 0x3, 0x2) ioctl$SNAPSHOT_S2RAM(r1, 0x330b) ioctl$BTRFS_IOC_BALANCE_CTL(r1, 0x40049421, 0x3) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, &(0x7f0000000740)) 19:46:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x9) [ 2511.821529] SELinux: duplicate or incompatible mount options [ 2511.831728] 9pnet: Insufficient options for proto=fd 19:46:39 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x7, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:46:39 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0xe0ffff00000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:46:39 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x10) 19:46:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) (fail_nth: 1) [ 2511.998257] FAULT_INJECTION: forcing a failure. [ 2511.998257] name failslab, interval 1, probability 0, space 0, times 0 [ 2512.000747] CPU: 1 PID: 24078 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 2512.002131] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2512.003821] Call Trace: [ 2512.004356] dump_stack+0x107/0x167 [ 2512.005098] should_fail.cold+0x5/0xa [ 2512.005866] ? getname_flags.part.0+0x50/0x4f0 [ 2512.006261] 9pnet: Insufficient options for proto=fd [ 2512.006778] should_failslab+0x5/0x20 [ 2512.006797] kmem_cache_alloc+0x5b/0x360 [ 2512.006829] getname_flags.part.0+0x50/0x4f0 [ 2512.008996] SELinux: duplicate or incompatible mount options [ 2512.009646] getname+0x8e/0xd0 [ 2512.009667] do_sys_openat2+0xf9/0x420 [ 2512.009687] ? build_open_flags+0x690/0x690 [ 2512.009710] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2512.015152] ? wait_for_completion+0x270/0x270 [ 2512.016080] __x64_sys_openat+0x13f/0x1f0 [ 2512.016910] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 2512.017869] ? ksys_write+0x1a9/0x260 [ 2512.018638] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2512.019687] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2512.020770] do_syscall_64+0x33/0x40 [ 2512.021522] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2512.022120] SELinux: duplicate or incompatible mount options [ 2512.022575] RIP: 0033:0x7f4b8590ab19 [ 2512.022603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2512.028364] RSP: 002b:00007f4b82e80188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2512.029930] RAX: ffffffffffffffda RBX: 00007f4b85a1df60 RCX: 00007f4b8590ab19 [ 2512.031391] RDX: 000000000004ec00 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 2512.032872] RBP: 00007f4b82e801d0 R08: 0000000000000000 R09: 0000000000000000 [ 2512.034347] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2512.035831] R13: 00007ffdbd7b6def R14: 00007f4b82e80300 R15: 0000000000022000 19:46:39 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:46:39 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:46:39 executing program 7: r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) (fail_nth: 1) [ 2512.181668] FAULT_INJECTION: forcing a failure. [ 2512.181668] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2512.184350] CPU: 0 PID: 24140 Comm: syz-executor.7 Not tainted 5.10.153 #1 [ 2512.185810] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2512.187565] Call Trace: [ 2512.188146] dump_stack+0x107/0x167 [ 2512.188922] should_fail.cold+0x5/0xa [ 2512.189739] _copy_to_user+0x2e/0x180 [ 2512.190577] simple_read_from_buffer+0xcc/0x160 [ 2512.191570] proc_fail_nth_read+0x198/0x230 [ 2512.192511] ? proc_sessionid_read+0x230/0x230 [ 2512.193480] ? security_file_permission+0x24e/0x570 [ 2512.194538] ? perf_trace_initcall_start+0x101/0x380 [ 2512.195624] ? proc_sessionid_read+0x230/0x230 [ 2512.196602] vfs_read+0x228/0x580 [ 2512.197339] ksys_read+0x12d/0x260 [ 2512.198088] ? __ia32_sys_pwrite64+0x230/0x230 [ 2512.199056] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2512.200166] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2512.201263] do_syscall_64+0x33/0x40 [ 2512.202049] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2512.203144] RIP: 0033:0x7fe7bccc369c [ 2512.203954] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2512.207875] RSP: 002b:00007fe7ba286170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2512.209487] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fe7bccc369c [ 2512.210996] RDX: 000000000000000f RSI: 00007fe7ba2861e0 RDI: 0000000000000003 [ 2512.212518] RBP: 00007fe7ba2861d0 R08: 0000000000000000 R09: 0000000000000000 [ 2512.214027] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 2512.215533] R13: 00007ffdd0ae39cf R14: 00007fe7ba286300 R15: 0000000000022000 [ 2526.185488] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:47:02 executing program 7: r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) 19:47:02 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:47:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) fcntl$getownex(r0, 0x10, &(0x7f0000000200)={0x0, 0x0}) clone3(&(0x7f0000000300)={0x200002200, &(0x7f0000000000)=0xffffffffffffffff, &(0x7f0000000040)=0x0, &(0x7f0000000080)=0x0, {0x14}, &(0x7f0000000140)=""/104, 0x68, &(0x7f0000000940)=""/4096, &(0x7f0000000240)=[r2], 0x1, {r0}}, 0x58) clone3(&(0x7f00000006c0)={0x4000, &(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)=0x0, {0x37}, &(0x7f0000001940)=""/4096, 0x1000, &(0x7f0000000580)=""/226, &(0x7f0000000680)=[r4, r1], 0x2, {r0}}, 0x58) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r0, 0xc018937d, &(0x7f0000000880)=ANY=[@ANYBLOB="0100000001001b0018000000", @ANYRES32=r3, @ANYBLOB="3f00000000ff0700002f66696c653110"]) ioctl$TIOCL_PASTESEL(r7, 0x541c, &(0x7f0000002940)) r8 = getpgrp(0x0) pidfd_open(r8, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000000740)={0x0, 0x0}) clone3(&(0x7f0000000800)={0x100021400, &(0x7f0000000280), &(0x7f0000000380), &(0x7f00000003c0), {0x11}, &(0x7f0000000400)=""/30, 0x1e, &(0x7f0000000440)=""/109, &(0x7f00000007c0)=[r5, r6, r2, r8, r1, r9, r2], 0x7, {r0}}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) pidfd_open(r2, 0x0) 19:47:02 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB='\x00\x00']) [ 2534.909548] SELinux: duplicate or incompatible mount options 19:47:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0xffffffffffffff75, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) ftruncate(r2, 0x10000) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r3 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f0000000180)=""/17) setsockopt$IP_VS_SO_SET_ADD(r3, 0x0, 0x482, &(0x7f0000000080)={0x84, @initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e22, 0x4, 'lc\x00', 0x4, 0xcbbf5465, 0xa}, 0x2c) 19:47:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x18) 19:47:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) (fail_nth: 2) 19:47:02 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 2534.915750] 9pnet: Insufficient options for proto=fd [ 2534.942936] SELinux: duplicate or incompatible mount options [ 2534.945099] FAULT_INJECTION: forcing a failure. [ 2534.945099] name failslab, interval 1, probability 0, space 0, times 0 [ 2534.947618] CPU: 0 PID: 24184 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 2534.949086] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2534.950825] Call Trace: [ 2534.951390] dump_stack+0x107/0x167 [ 2534.952195] should_fail.cold+0x5/0xa [ 2534.953006] ? create_object.isra.0+0x3a/0xa20 [ 2534.953970] should_failslab+0x5/0x20 [ 2534.954773] kmem_cache_alloc+0x5b/0x360 [ 2534.955645] create_object.isra.0+0x3a/0xa20 [ 2534.956606] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2534.957677] kmem_cache_alloc+0x159/0x360 [ 2534.958539] getname_flags.part.0+0x50/0x4f0 [ 2534.959486] getname+0x8e/0xd0 [ 2534.959511] do_sys_openat2+0xf9/0x420 [ 2534.959544] ? build_open_flags+0x690/0x690 [ 2534.961895] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2534.962924] ? wait_for_completion+0x270/0x270 [ 2534.963910] __x64_sys_openat+0x13f/0x1f0 [ 2534.964799] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 2534.965808] ? ksys_write+0x1a9/0x260 [ 2534.966633] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2534.967751] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2534.968863] do_syscall_64+0x33/0x40 [ 2534.969656] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2534.969671] RIP: 0033:0x7f4b8590ab19 [ 2534.969693] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2534.969712] RSP: 002b:00007f4b82e80188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2534.976998] RAX: ffffffffffffffda RBX: 00007f4b85a1df60 RCX: 00007f4b8590ab19 [ 2534.978516] RDX: 000000000004ec00 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 2534.980012] RBP: 00007f4b82e801d0 R08: 0000000000000000 R09: 0000000000000000 [ 2534.981520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2534.983016] R13: 00007ffdbd7b6def R14: 00007f4b82e80300 R15: 0000000000022000 19:47:02 executing program 7: r0 = gettid() waitid(0x3, r0, 0x0, 0x2, 0x0) 19:47:02 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:47:02 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x50) 19:47:02 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000040)={&(0x7f0000000300)={0x200, 0x2b, 0x800, 0x70bd25, 0x25dfdbff, {0x1a}, [@nested={0x1a2, 0x30e7, 0x0, 0x1, [@typed={0x14, 0x1f, 0x0, 0x0, @ipv6=@private1}, @generic="9b9086e5145bd84aa593c5dbe5201b94b3b1393e19d2f93bde94cec8d3b71014be8f1f2cfcfafc183accad5799da9d7aef7dded0f11e07ea48b3e9136ff87d06a7e03c37cab9123b4e88d2fdc753b941f90ba23d20146289870ff47ea54797daf8a94ceba628b6591019c8d7ca91a54e67b3c7cda3af64d3a15d30954c2a1420bb453ff6c5f3ad8b08d6a7df3aab98ab4682e64bcdaa4183866bb30c99e4c5c5e4c4194bbcb24fc17e957252d8d00ee357cfc7b564ef2ced2221439614f00fad3187a207344ee8602abb6ca2116b2656bdaad86378bf5603a91e1f2134f74a8b220b41049a1e7b25afadd1cab1", @generic="a9833aba91770370b0faa54fc09237b08fbfc5bfa6b444db52419d0ccdf764abcdb44785ee5e91dba2dda31c56e2c0a3c816d6d2be15fb18736a24dfd3126dc08a1e11d3456f27093a52f85451707818f5565e16f8a14185c3100cf223cb1eb66a2baed4ea05d59354f01d14e23da6e7938b9763bc127a311ba5c23594178cbbf64ff86fb8cac848a3ca8d457f83f0332e843e4ed802770fe68d8da37c"]}, @generic="f55e91c9ba1f1de572099b579267413ab770060e5bf6bf1a868e4a0710d24540afc0e710123f53f65064c12d0809afe8172d", @nested={0x12, 0x7d, 0x0, 0x1, [@generic="556cba054b8ab5d98b062251456f"]}]}, 0x200}, 0x1, 0x0, 0x0, 0x20000010}, 0x844) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:47:02 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 2535.127442] SELinux: duplicate or incompatible mount options [ 2535.132181] SELinux: duplicate or incompatible mount options [ 2535.132856] 9pnet: Insufficient options for proto=fd 19:47:02 executing program 7: r0 = gettid() waitid(0x2, r0, 0x0, 0x3, 0x0) 19:47:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x28c580, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:47:02 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:47:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(r0, &(0x7f0000000000)='./file1\x00', 0x4046c0, 0x192) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="5271e6dc29c02d19346146ca0400000000"]) 19:47:02 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) (fail_nth: 3) 19:47:02 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 2535.273282] 9pnet: Insufficient options for proto=fd [ 2535.274565] FAULT_INJECTION: forcing a failure. [ 2535.274565] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2535.277213] CPU: 0 PID: 24592 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 2535.278661] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2535.280393] Call Trace: [ 2535.280955] dump_stack+0x107/0x167 [ 2535.281738] should_fail.cold+0x5/0xa [ 2535.282553] strncpy_from_user+0x34/0x470 [ 2535.283458] getname_flags.part.0+0x95/0x4f0 [ 2535.284436] getname+0x8e/0xd0 [ 2535.285135] do_sys_openat2+0xf9/0x420 [ 2535.285979] ? build_open_flags+0x690/0x690 [ 2535.286883] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2535.287905] ? wait_for_completion+0x270/0x270 [ 2535.288898] __x64_sys_openat+0x13f/0x1f0 [ 2535.289770] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 2535.290773] ? ksys_write+0x1a9/0x260 [ 2535.291589] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2535.292720] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2535.293827] do_syscall_64+0x33/0x40 [ 2535.294614] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2535.295708] RIP: 0033:0x7f4b8590ab19 [ 2535.296503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2535.300422] RSP: 002b:00007f4b82e80188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2535.302010] RAX: ffffffffffffffda RBX: 00007f4b85a1df60 RCX: 00007f4b8590ab19 [ 2535.303497] RDX: 000000000004ec00 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 2535.304997] RBP: 00007f4b82e801d0 R08: 0000000000000000 R09: 0000000000000000 [ 2535.306479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2535.307968] R13: 00007ffdbd7b6def R14: 00007f4b82e80300 R15: 0000000000022000 [ 2535.322350] SELinux: duplicate or incompatible mount options [ 2535.326586] SELinux: duplicate or incompatible mount options [ 2535.332946] 9pnet: Insufficient options for proto=fd [ 2549.291095] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:47:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) socket$netlink(0x10, 0x3, 0x19) 19:47:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x300) 19:47:24 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {0x0}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:47:24 executing program 2: fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000200)={0x0, 0xfb, 0xa2, 0x4, 0xff, "2c5231d088109fc85c9310a67d2921ec", "22bbe7e3b21cb4c0490872c204eb3e637a34716eea8abf6752085341b84b8233a517776680e7a479af5f5b076b26e3a51f2d7dbb62698ebea602df177ff9e88704745a23d94e20d027de9b0d1e434813c6fd4dc9f8e40c42d7954815ba27bdcf2abe498e2c4f33a65335ba1e47a79e5a0223cde33e44366c058e86cb787843237b919537ad954e4521d115ffde"}, 0xa2, 0x1) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000580)=0x0) tkill(r1, 0x2f) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) execveat(r0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000300)=[&(0x7f0000000080)='[\\%\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='trusted.overlay.upper\x00'], &(0x7f0000000540)=[&(0x7f0000000340)='trans=fd,', &(0x7f0000000380)='9p\x00', &(0x7f00000003c0)='+\x00', &(0x7f0000000400)='\x00', &(0x7f0000000440)='rfdno', &(0x7f0000000480)='[:\x00', &(0x7f00000004c0)='}[{\x9a^@,@&\x00', &(0x7f0000000500)='trans=fd,'], 0x1000) 19:47:24 executing program 7: r0 = gettid() r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r1, 0x330b) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x1, 0x9, 0xa5, 0x1, 0x0, 0x6, 0x2, 0xe, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xac, 0x0, @perf_config_ext={0xffffffff, 0x9}, 0x400, 0x3, 0x7fffffff, 0x8c19482cf822ef77, 0x9, 0x7, 0x6, 0x0, 0x80000000}, 0x0, 0x7, r1, 0x1) waitid(0x2, r0, 0x0, 0x2, 0x0) r2 = syz_io_uring_complete(0x0) r3 = socket$inet_icmp(0x2, 0x2, 0x1) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r2, 0xc0189374, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {0x6}}, './file1\x00'}) 19:47:24 executing program 0: lchown(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0xee00) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) dup2(0xffffffffffffffff, r0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000180)=""/17) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="7472616e733d66642c810307f475f5e9646e6f3dc6cc482b017794bac6fc9544ebe55224dd6c2407687cea7321bff4971311", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 19:47:24 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:47:24 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) (fail_nth: 4) [ 2557.262411] FAULT_INJECTION: forcing a failure. [ 2557.262411] name failslab, interval 1, probability 0, space 0, times 0 [ 2557.264920] CPU: 0 PID: 24916 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 2557.266371] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2557.268105] Call Trace: [ 2557.268691] dump_stack+0x107/0x167 [ 2557.269463] should_fail.cold+0x5/0xa [ 2557.270268] ? __alloc_file+0x21/0x320 [ 2557.270295] should_failslab+0x5/0x20 [ 2557.270320] kmem_cache_alloc+0x5b/0x360 [ 2557.271910] __alloc_file+0x21/0x320 [ 2557.271942] alloc_empty_file+0x6d/0x170 [ 2557.273543] path_openat+0xde/0x26d0 [ 2557.275124] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 2557.275152] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 2557.277231] ? path_lookupat+0x860/0x860 [ 2557.278069] ? perf_trace_lock+0x2bd/0x490 [ 2557.278550] 9pnet: Insufficient options for proto=fd [ 2557.278959] ? __lockdep_reset_lock+0x180/0x180 [ 2557.278980] ? lock_acquire+0x197/0x490 [ 2557.279009] ? __lockdep_reset_lock+0x180/0x180 [ 2557.282797] do_filp_open+0x17e/0x3d0 [ 2557.283601] ? may_open_dev+0xf0/0xf0 [ 2557.284429] ? __alloc_fd+0x2a5/0x620 [ 2557.285231] ? lock_downgrade+0x6d0/0x6d0 [ 2557.286109] ? rwlock_bug.part.0+0x90/0x90 [ 2557.287022] ? _raw_spin_unlock+0x1a/0x30 [ 2557.287894] ? __alloc_fd+0x2a5/0x620 [ 2557.288737] do_sys_openat2+0x171/0x420 [ 2557.289585] ? build_open_flags+0x690/0x690 [ 2557.290489] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2557.291512] ? wait_for_completion+0x270/0x270 [ 2557.292510] __x64_sys_openat+0x13f/0x1f0 [ 2557.293379] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 2557.294382] ? ksys_write+0x1a9/0x260 [ 2557.295201] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2557.295224] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2557.295257] do_syscall_64+0x33/0x40 [ 2557.295282] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2557.297446] RIP: 0033:0x7f4b8590ab19 [ 2557.297467] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2557.297484] RSP: 002b:00007f4b82e80188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2557.305370] RAX: ffffffffffffffda RBX: 00007f4b85a1df60 RCX: 00007f4b8590ab19 [ 2557.306869] RDX: 000000000004ec00 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 2557.308381] RBP: 00007f4b82e801d0 R08: 0000000000000000 R09: 0000000000000000 [ 2557.309866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2557.311366] R13: 00007ffdbd7b6def R14: 00007f4b82e80300 R15: 0000000000022000 [ 2557.324892] SELinux: duplicate or incompatible mount options [ 2557.330741] 9pnet: Insufficient options for proto=fd [ 2557.340849] SELinux: duplicate or incompatible mount options 19:47:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x500) 19:47:25 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:47:25 executing program 7: r0 = gettid() perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x80, 0x2, 0x22, 0x2, 0x0, 0x9, 0x61900, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x28533b18, 0x1}, 0x100, 0xfffffffffffffffc, 0x1, 0x3, 0x0, 0xffff, 0x3, 0x0, 0x8, 0x0, 0xe45}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0x1) waitid(0x2, r0, 0x0, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r1, 0x330b) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000080)='!\'\'/\x00') 19:47:25 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {0x0}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:47:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000380)={0x1, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @broadcast}}}, 0x108) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @local}}}, 0x108) setsockopt$inet_group_source_req(r1, 0x0, 0x2f, &(0x7f0000000380)={0x1, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @loopback}}}, 0x108) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) ioctl$RTC_WIE_OFF(r0, 0x7010) 19:47:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x341440, 0x115) open(&(0x7f0000000000)='./file1\x00', 0x103000, 0xa) creat(&(0x7f0000000040)='./file0\x00', 0x8) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="1237550f4b22f03f10c7802c791f68e4a2d6da8077692a5c19c616a6742c1be0c246751e15fcb0591f5887dedda5dee0152085309fc35b08024822d27feb7ac128096451ff43ae0ebf53ce322ab2cdccb2f6d037aa1fc1365ea628", @ANYRESHEX, @ANYBLOB=',\x00']) [ 2557.520500] SELinux: duplicate or incompatible mount options [ 2557.529243] SELinux: duplicate or incompatible mount options 19:47:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) r1 = syz_io_uring_complete(0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file2\x00', &(0x7f00000001c0), 0x2000020, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}, {@cache_none}, {@access_any}], [{@permit_directio}, {@obj_type={'obj_type', 0x3d, '+\xf9*\\*-}!%\\\xf4\x82\xc9\x94lJ\xe7*\xd0\xf0\xfaf\x9f\xb7\xbem\xf0\xc1YW\xd9\xdfZA\xe3j\xbb\xa0\xb4fi\b\x82\xa7B\xb1\x1a\xa1Ee\xef5SZD8@\xf67K\x91\xecp\a\xbc\xcb\xf3)]\xf7\xeai\xbf\xeaTiX\\\xb6\xd12p\xd8)\x87\xad\xa3>=n\xac\x1bA3I\xe3T3\x13\x1f\xcb\x05f$ZDW$4Y\xd8g\x9cI\x9cg\xa2'}}, {@subj_type={'subj_type', 0x3d, ','}}, {@dont_measure}, {@smackfsfloor={'smackfsfloor', 0x3d, 'trans=fd,'}}]}}) [ 2557.585039] 9pnet: Insufficient options for proto=fd [ 2570.609445] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:47:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) (fail_nth: 5) 19:47:47 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x6602c1, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) r2 = fork() r3 = getpgrp(0x0) pidfd_open(r3, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000500)={0x0}, &(0x7f0000000540)=0xc) r5 = getpgrp(0x0) pidfd_open(r5, 0x0) clone3(&(0x7f00000005c0)={0x28010000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x25}, &(0x7f0000000140)=""/33, 0x21, &(0x7f0000000200)=""/161, &(0x7f0000000580)=[r1, r2, r3, r4, r5, r1], 0x6, {r0}}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="2c7766fb16782c3af7955114646e6f3d", @ANYRESHEX, @ANYBLOB=',\x00']) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x2400, 0x0) statx(r6, &(0x7f0000000300)='./file1\x00', 0x1000, 0x800, &(0x7f0000000340)) r7 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r7, 0x8018456f, &(0x7f0000000180)=""/17) setsockopt$bt_l2cap_L2CAP_LM(r7, 0x6, 0x3, &(0x7f0000000440)=0x10, 0x4) 19:47:47 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:47:47 executing program 7: r0 = gettid() r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) rt_sigqueueinfo(r2, 0x1d, &(0x7f0000000040)={0x5, 0x10000, 0xfffffff8}) syz_open_procfs(r0, &(0x7f00000000c0)='net/connector\x00') waitid(0x2, r0, 0x0, 0x2, 0x0) 19:47:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x101) r1 = syz_open_dev$vcsu(&(0x7f0000000200), 0x8, 0x200) clone3(&(0x7f0000000140)={0x612c1780, 0x0, 0x0, 0x0, {0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) openat$cgroup_procs(r0, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000080), 0x480) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="187fb869ac46d0", @ANYRESHEX=r2, @ANYBLOB=',\x00']) r3 = accept4$inet6(r0, 0x0, &(0x7f0000000280), 0x0) copy_file_range(r0, &(0x7f0000000240)=0x80, r3, &(0x7f0000000300)=0x5, 0x6, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r4, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r4, 0x330b) openat$cgroup_freezer_state(r4, &(0x7f0000000000), 0x2, 0x0) 19:47:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r1, 0x330b) symlinkat(&(0x7f0000000000)='./file1\x00', r1, &(0x7f0000000040)='./file1\x00') mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfd\x00o=', @ANYRESHEX, @ANYBLOB=',\x00']) [ 2580.349765] 9pnet: Insufficient options for proto=fd 19:47:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x575) 19:47:47 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {0x0}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 2580.358969] 9pnet: Insufficient options for proto=fd [ 2580.370945] SELinux: duplicate or incompatible mount options [ 2580.372028] FAULT_INJECTION: forcing a failure. [ 2580.372028] name failslab, interval 1, probability 0, space 0, times 0 [ 2580.373258] CPU: 1 PID: 25782 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 2580.373265] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2580.373268] Call Trace: [ 2580.373295] dump_stack+0x107/0x167 [ 2580.376391] should_fail.cold+0x5/0xa [ 2580.376813] ? create_object.isra.0+0x3a/0xa20 [ 2580.377304] should_failslab+0x5/0x20 [ 2580.377719] kmem_cache_alloc+0x5b/0x360 [ 2580.378171] create_object.isra.0+0x3a/0xa20 [ 2580.378672] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2580.379242] kmem_cache_alloc+0x159/0x360 [ 2580.379719] __alloc_file+0x21/0x320 [ 2580.380143] alloc_empty_file+0x6d/0x170 [ 2580.380615] path_openat+0xde/0x26d0 [ 2580.381049] ? path_lookupat+0x860/0x860 [ 2580.381483] ? perf_trace_lock+0xac/0x490 [ 2580.381943] ? __lockdep_reset_lock+0x180/0x180 [ 2580.382459] ? lock_acquire+0x197/0x490 [ 2580.382903] ? __lockdep_reset_lock+0x180/0x180 [ 2580.383433] do_filp_open+0x17e/0x3d0 [ 2580.383862] ? may_open_dev+0xf0/0xf0 [ 2580.384288] ? __alloc_fd+0x2a5/0x620 [ 2580.384731] ? lock_downgrade+0x6d0/0x6d0 [ 2580.385201] ? rwlock_bug.part.0+0x90/0x90 [ 2580.385672] ? _raw_spin_unlock+0x1a/0x30 [ 2580.386116] ? __alloc_fd+0x2a5/0x620 [ 2580.386541] do_sys_openat2+0x171/0x420 [ 2580.386984] ? build_open_flags+0x690/0x690 [ 2580.387460] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2580.387992] ? wait_for_completion+0x270/0x270 [ 2580.388498] __x64_sys_openat+0x13f/0x1f0 [ 2580.388944] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 2580.389484] ? ksys_write+0x1a9/0x260 [ 2580.389917] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2580.390503] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2580.391081] do_syscall_64+0x33/0x40 [ 2580.391509] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2580.392088] RIP: 0033:0x7f4b8590ab19 [ 2580.392499] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2580.394573] RSP: 002b:00007f4b82e80188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2580.395418] RAX: ffffffffffffffda RBX: 00007f4b85a1df60 RCX: 00007f4b8590ab19 [ 2580.396234] RDX: 000000000004ec00 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 2580.397048] RBP: 00007f4b82e801d0 R08: 0000000000000000 R09: 0000000000000000 [ 2580.397841] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2580.398631] R13: 00007ffdbd7b6def R14: 00007f4b82e80300 R15: 0000000000022000 [ 2580.409560] SELinux: duplicate or incompatible mount options 19:47:48 executing program 7: r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) waitid(0x0, r0, &(0x7f0000000000), 0x1000000, &(0x7f0000000080)) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r2, r1) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000140), &(0x7f0000000180)=0xc) 19:47:48 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x576) 19:47:48 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:47:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {0xfffffffd}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.time\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:47:48 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 2580.496259] SELinux: duplicate or incompatible mount options [ 2580.499833] SELinux: duplicate or incompatible mount options [ 2580.538034] 9pnet: Insufficient options for proto=fd 19:47:48 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:47:48 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) (fail_nth: 6) [ 2580.589867] SELinux: duplicate or incompatible mount options [ 2580.595742] SELinux: duplicate or incompatible mount options [ 2580.638339] FAULT_INJECTION: forcing a failure. [ 2580.638339] name failslab, interval 1, probability 0, space 0, times 0 [ 2580.639631] CPU: 1 PID: 26276 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 2580.640369] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2580.641286] Call Trace: [ 2580.641605] dump_stack+0x107/0x167 [ 2580.642001] should_fail.cold+0x5/0xa [ 2580.642418] ? security_file_alloc+0x34/0x170 [ 2580.642898] should_failslab+0x5/0x20 [ 2580.643306] kmem_cache_alloc+0x5b/0x360 [ 2580.643748] security_file_alloc+0x34/0x170 [ 2580.644216] __alloc_file+0xb6/0x320 [ 2580.644624] alloc_empty_file+0x6d/0x170 [ 2580.645061] path_openat+0xde/0x26d0 [ 2580.645476] ? path_lookupat+0x860/0x860 [ 2580.645910] ? perf_trace_lock+0xac/0x490 [ 2580.646367] ? __lockdep_reset_lock+0x180/0x180 [ 2580.646868] ? lock_acquire+0x197/0x490 [ 2580.647316] ? __lockdep_reset_lock+0x180/0x180 [ 2580.647831] do_filp_open+0x17e/0x3d0 [ 2580.648258] ? may_open_dev+0xf0/0xf0 [ 2580.648673] ? __alloc_fd+0x2a5/0x620 [ 2580.649108] ? lock_downgrade+0x6d0/0x6d0 [ 2580.649577] ? rwlock_bug.part.0+0x90/0x90 [ 2580.650034] ? _raw_spin_unlock+0x1a/0x30 [ 2580.650490] ? __alloc_fd+0x2a5/0x620 [ 2580.650917] do_sys_openat2+0x171/0x420 [ 2580.651348] ? build_open_flags+0x690/0x690 [ 2580.651818] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2580.652355] ? wait_for_completion+0x270/0x270 [ 2580.652863] __x64_sys_openat+0x13f/0x1f0 [ 2580.653334] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 2580.653872] ? ksys_write+0x1a9/0x260 [ 2580.654309] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2580.654899] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2580.655478] do_syscall_64+0x33/0x40 [ 2580.655893] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2580.656466] RIP: 0033:0x7f4b8590ab19 [ 2580.656875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2580.658874] RSP: 002b:00007f4b82e80188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2580.659688] RAX: ffffffffffffffda RBX: 00007f4b85a1df60 RCX: 00007f4b8590ab19 [ 2580.660479] RDX: 000000000004ec00 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 2580.661295] RBP: 00007f4b82e801d0 R08: 0000000000000000 R09: 0000000000000000 [ 2580.662063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2580.662870] R13: 00007ffdbd7b6def R14: 00007f4b82e80300 R15: 0000000000022000 [ 2593.663603] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:48:15 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) (fail_nth: 7) 19:48:15 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:48:15 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:48:15 executing program 7: getsockopt$EBT_SO_GET_INIT_ENTRIES(0xffffffffffffffff, 0x0, 0x83, &(0x7f00000000c0)={'nat\x00', 0x0, 0x3, 0x70, [0x433, 0x1, 0x2, 0x3, 0x1, 0x9], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000040)=""/112}, &(0x7f0000000140)=0x78) r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) 19:48:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x577) 19:48:15 executing program 4: ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000000940)={0x0, 0x0, "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", "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"}) r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x2, 0x80, 0x5, 0x4, 0x1b, 0x5, 0x0, 0x7037, 0x20000, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x40008, 0x1, 0x80000001, 0x7, 0x6d6b1ad5, 0xffffffff, 0x1, 0x0, 0x1, 0x0, 0x80000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000600)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f00000002c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x89140100, 0x0, 0x0, 0x0, {0xfffffffe}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe97, {r1}}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="7472616e733d66640572665a6e6f3d", @ANYRESHEX=r1, @ANYBLOB="0e4696282d090000ff010000013c8fcce655d4442e9b79aeb0d5ce0895c19af493ca3f47dbe83ad9610e1f8c70847604e03992db8b7840cc444f09622d89e5b097bb7058dc391e26310632b29f4335bfcaad0b4643e1b59a566774b2b158b9fd6e5c626819ab45e8e85e3a9bfc97d5fe8a43834658e10f0000503c25d16c5d166d52609471273ead5e444dd85756ff14bfe66a", @ANYRESHEX, @ANYBLOB="2c98f2ad80e6f9be97306ca68b01fcb262863a1b18c9bf7506dd30c2aa5066e40d4fea2d8ba503bcfc35f974af6743f08717ea207d4b278df6c90e67afd9e2cd24d86cef3fc092"]) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/class/bsg', 0x98002, 0x80) fallocate(r2, 0x10, 0x8000, 0x8000) 19:48:15 executing program 0: clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) write$binfmt_elf64(r0, &(0x7f0000000940)=ANY=[@ANYBLOB="7f454c4604090902020000000000000002003e00000000f7010000000000000040000000000000001101000000000000070000004c21380002000300040009000400000000000000f70d0000000000000000000000000000d70900000000000001040000000000006909000000000000000800000000000004000000040000000000000000000000440500000000000000040000000000000100000000000000080000000000000003000000000000005fd99549cd1869b91533c05021148b6f7cad065c2ffb0adeda84e00e662e15efe0e738acf0dfce5c6ad3f249f50e96f400fd7594b3ce46e42f10df9c89e50515cd70d5adef8effb91b025726a924635c06ec912b455e7c434528ef7d7ba62e8b7d546a902e16c31dd53115253d2ad96eb4ba0e5b9b3e8b2c93cada161d4d9a245795a439fef10e0fe4715ee972fd6e5740176b289306999b4080a4bc68afa0e1649475626e9ded723491eae06c2d91134629a1d6c3ae74f80e12f200a860101e7d4efccbdb296c782428a948d03e505afcb0e3b1a87813b0c17da11d525d4d7a92e1db642e1170bc434ea1229e1885f37200"/1697], 0x6a1) 19:48:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="7404b13f6e6f3d", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) [ 2607.455626] SELinux: duplicate or incompatible mount options [ 2607.458912] 9pnet: Could not find request transport: fdrfZno=0x0000000000000003F–(- [ 2607.462340] FAULT_INJECTION: forcing a failure. [ 2607.462340] name failslab, interval 1, probability 0, space 0, times 0 [ 2607.465025] CPU: 0 PID: 26314 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 2607.466644] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2607.466711] SELinux: duplicate or incompatible mount options [ 2607.468368] Call Trace: [ 2607.468397] dump_stack+0x107/0x167 [ 2607.468428] should_fail.cold+0x5/0xa [ 2607.471691] ? create_object.isra.0+0x3a/0xa20 [ 2607.472653] should_failslab+0x5/0x20 [ 2607.473462] kmem_cache_alloc+0x5b/0x360 [ 2607.474323] ? percpu_ref_put_many.constprop.0+0x4e/0x100 [ 2607.475481] create_object.isra.0+0x3a/0xa20 [ 2607.476408] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 2607.477503] kmem_cache_alloc+0x159/0x360 [ 2607.478394] security_file_alloc+0x34/0x170 [ 2607.479312] __alloc_file+0xb6/0x320 [ 2607.480100] alloc_empty_file+0x6d/0x170 [ 2607.480969] path_openat+0xde/0x26d0 [ 2607.481763] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 2607.482812] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 2607.483873] ? path_lookupat+0x860/0x860 [ 2607.484723] ? perf_trace_lock+0x2bd/0x490 [ 2607.485619] ? __lockdep_reset_lock+0x180/0x180 [ 2607.486597] ? lock_acquire+0x197/0x490 [ 2607.487438] ? __lockdep_reset_lock+0x180/0x180 [ 2607.488428] do_filp_open+0x17e/0x3d0 [ 2607.489243] ? may_open_dev+0xf0/0xf0 [ 2607.490058] ? __alloc_fd+0x2a5/0x620 [ 2607.490858] ? lock_downgrade+0x6d0/0x6d0 [ 2607.491737] ? rwlock_bug.part.0+0x90/0x90 [ 2607.492646] ? _raw_spin_unlock+0x1a/0x30 [ 2607.493523] ? __alloc_fd+0x2a5/0x620 [ 2607.494353] do_sys_openat2+0x171/0x420 [ 2607.495193] ? build_open_flags+0x690/0x690 [ 2607.496093] ? __mutex_unlock_slowpath+0xe1/0x600 [ 2607.497140] ? wait_for_completion+0x270/0x270 [ 2607.498122] __x64_sys_openat+0x13f/0x1f0 [ 2607.498996] ? __ia32_compat_sys_open+0x1c0/0x1c0 [ 2607.500001] ? ksys_write+0x1a9/0x260 [ 2607.500822] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2607.501928] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2607.503020] do_syscall_64+0x33/0x40 [ 2607.503808] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2607.504884] RIP: 0033:0x7f4b8590ab19 [ 2607.505684] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2607.509527] RSP: 002b:00007f4b82e80188 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 2607.511137] RAX: ffffffffffffffda RBX: 00007f4b85a1df60 RCX: 00007f4b8590ab19 [ 2607.512626] RDX: 000000000004ec00 RSI: 0000000020000140 RDI: ffffffffffffff9c [ 2607.514190] RBP: 00007f4b82e801d0 R08: 0000000000000000 R09: 0000000000000000 [ 2607.515686] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2607.517205] R13: 00007ffdbd7b6def R14: 00007f4b82e80300 R15: 0000000000022000 19:48:15 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x290f000000000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:48:15 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x600) [ 2607.670245] SELinux: duplicate or incompatible mount options 19:48:15 executing program 7: r0 = gettid() r1 = getpgrp(0x0) pidfd_open(r1, 0x0) r2 = getpid() rt_tgsigqueueinfo(r1, r2, 0x2a, &(0x7f00000000c0)={0x4, 0x6}) waitid(0x2, r0, 0x0, 0x2, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x8, 0x0, 0x8, 0x7, 0x0, 0x35, 0x0, 0x6, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x800, 0x1, @perf_bp={&(0x7f0000000000), 0xd}, 0xc0c, 0xd4f, 0xf03, 0x6, 0x6, 0x10000, 0x2, 0x0, 0x40, 0x0, 0x3}, r0, 0x8, 0xffffffffffffffff, 0x0) [ 2607.678081] SELinux: duplicate or incompatible mount options 19:48:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(r0, &(0x7f0000000140)='./file1\x00', 0x105000, 0x80) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') openat(r1, &(0x7f0000000080)='./file1\x00', 0x40200, 0x81) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 19:48:15 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x3, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:48:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) syz_open_dev$tty1(0xc, 0x4, 0x2) r1 = fork() syz_open_procfs(r1, &(0x7f0000000000)='attr/prev\x00') mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:48:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="a4aaf48402cd9801921e13bd", @ANYRESHEX, @ANYBLOB=',\x00']) [ 2607.785339] 9pnet: Insufficient options for proto=fd [ 2620.312575] kmemleak: 35 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:48:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x700) 19:48:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) (fail_nth: 8) 19:48:36 executing program 4: sendmsg$NFQNL_MSG_VERDICT(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0x2d4, 0x1, 0x3, 0x401, 0x0, 0x0, {0x2, 0x0, 0x3}, [@NFQA_EXP={0x1c, 0xf, 0x0, 0x1, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x2}, @CTA_EXPECT_TIMEOUT={0x8, 0x4, 0x1, 0x0, 0xffff}, @CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x4}]}, @NFQA_EXP={0x2a4, 0xf, 0x0, 0x1, [@CTA_EXPECT_ZONE={0x6, 0x7, 0x1, 0x0, 0x1}, @CTA_EXPECT_MASK={0x94, 0x3, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @empty}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @remote}, {0x14, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}]}, @CTA_EXPECT_HELP_NAME={0xb, 0x6, 'amanda\x00'}, @CTA_EXPECT_FLAGS={0x8, 0x8, 0x1, 0x0, 0x3}, @CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0x3}, @CTA_EXPECT_ID={0x8, 0x5, 0x1, 0x0, 0x5}, @CTA_EXPECT_HELP_NAME={0xe, 0x6, 'sip-20000\x00'}, @CTA_EXPECT_NAT={0x1d0, 0xa, 0x0, 0x1, [@CTA_EXPECT_NAT_TUPLE={0xac, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x6}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @private=0xa010101}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @remote}, {0x8, 0x2, @rand_addr=0x64010101}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x7b299600b07e1889}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x2f}}]}, @CTA_EXPECT_NAT_DIR={0x8}, @CTA_EXPECT_NAT_TUPLE={0x78, 0x2, 0x0, 0x1, [@CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @local}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @private1}, {0x14, 0x4, @mcast2}}}]}, @CTA_EXPECT_NAT_TUPLE={0x1c, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x5}}]}, @CTA_EXPECT_NAT_TUPLE={0x74, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @local}, {0x8, 0x2, @loopback}}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @multicast1}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x1}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x4}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast1}, {0x8, 0x2, @local}}}, @CTA_TUPLE_ZONE={0x6, 0x3, 0x1, 0x0, 0x1}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x21}}]}, @CTA_EXPECT_NAT_DIR={0x8, 0x1, 0x1, 0x0, 0x1}, @CTA_EXPECT_NAT_DIR={0x8}]}]}]}, 0x2d4}, 0x1, 0x0, 0x0, 0x4000000}, 0x20008040) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) creat(&(0x7f0000000040)='./file1\x00', 0x0) 19:48:36 executing program 2: ioctl$HIDIOCGSTRING(0xffffffffffffffff, 0x81044804, &(0x7f0000000140)={0x4b, "fe2f4692bb3d7a96fe4e14116a1291423d315d5f8f246e8fe1b1924ac56359ee485496d0f4c6931585767cb9332bc935c562268459c132a82c925a50c0a78c2b312120e5fc04c1658d2d04"}) r0 = getpgrp(0x0) pidfd_open(r0, 0x0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) kcmp$KCMP_EPOLL_TFD(r0, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, r1, 0x800}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r2}}) 19:48:36 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="62623b71feff29261675ce6b4f83f7093a3e8175df9418f0456a04a83e36eaeec58b236a5d5b0596a8ad3f", @ANYRESHEX, @ANYBLOB="2cab172300"]) 19:48:36 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{0x0}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:48:36 executing program 7: r0 = gettid() process_vm_readv(r0, &(0x7f0000000440)=[{&(0x7f0000000140)=""/32, 0x20}, {&(0x7f0000000180)=""/16, 0x10}, {&(0x7f00000001c0)=""/162, 0xa2}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/239, 0xef}], 0x5, &(0x7f00000005c0)=[{&(0x7f00000004c0)=""/176, 0xb0}, {&(0x7f0000000580)=""/9, 0x9}], 0x2, 0x0) waitid(0x2, r0, 0x0, 0x2, 0x0) r1 = getpid() waitid(0x0, r1, &(0x7f0000000000), 0x20000000, &(0x7f0000000080)) 19:48:36 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 2628.656915] SELinux: duplicate or incompatible mount options [ 2628.658215] FAULT_INJECTION: forcing a failure. [ 2628.658215] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2628.658243] CPU: 0 PID: 27149 Comm: syz-executor.3 Not tainted 5.10.153 #1 [ 2628.662169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2628.664248] Call Trace: [ 2628.664399] 9pnet: Insufficient options for proto=fd [ 2628.664817] dump_stack+0x107/0x167 [ 2628.664849] should_fail.cold+0x5/0xa [ 2628.667662] _copy_to_user+0x2e/0x180 [ 2628.668502] simple_read_from_buffer+0xcc/0x160 [ 2628.669699] proc_fail_nth_read+0x198/0x230 [ 2628.670649] ? proc_sessionid_read+0x230/0x230 [ 2628.671654] ? security_file_permission+0x24e/0x570 [ 2628.672745] ? perf_trace_initcall_start+0x101/0x380 [ 2628.673892] ? proc_sessionid_read+0x230/0x230 [ 2628.674898] vfs_read+0x228/0x580 [ 2628.675560] SELinux: duplicate or incompatible mount options [ 2628.675680] ksys_read+0x12d/0x260 [ 2628.675711] ? __ia32_sys_pwrite64+0x230/0x230 [ 2628.678717] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 2628.679848] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2628.680943] do_syscall_64+0x33/0x40 [ 2628.681901] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2628.683039] RIP: 0033:0x7f4b858bd69c [ 2628.683976] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2628.687874] RSP: 002b:00007f4b82e80170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2628.689800] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f4b858bd69c [ 2628.691330] RDX: 000000000000000f RSI: 00007f4b82e801e0 RDI: 0000000000000004 [ 2628.693125] RBP: 00007f4b82e801d0 R08: 0000000000000000 R09: 0000000000000000 [ 2628.694626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2628.696420] R13: 00007ffdbd7b6def R14: 00007f4b82e80300 R15: 0000000000022000 [ 2628.708208] 9pnet: Insufficient options for proto=fd 19:48:36 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:48:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x900) 19:48:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {0x21}, 0x0, 0xffffffffffffff37, 0x0, 0x0, 0xfffffffffffffce1}, 0x7d) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 2628.861408] SELinux: duplicate or incompatible mount options 19:48:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) [ 2628.874839] SELinux: duplicate or incompatible mount options 19:48:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000040), 0x180, 0x0) clone3(&(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, {0x39}, 0x0, 0xfffffffffffffec3, 0x0, 0x0, 0x0, {r1}}, 0x58) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 19:48:36 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{0x0}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() [ 2628.943908] 9pnet: Insufficient options for proto=fd 19:48:36 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:48:36 executing program 7: r0 = gettid() waitid(0x2, r0, 0x0, 0x8, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @mcast1, 0x3}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000000480)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000640)="76e08d347f15340e7e5cb65120f96450301f501fcb1ad99e8c085b8612ea714d5e3f99c24e071035131e34fd4f1feb4769ba0dd1568a8b118b75a37c806c762ef1c3d273bebbd6a90c81186cff64e87d5277ebc774002c3f3fa7ed0c765940474d5fe42b458610defd89b8d9ff1448e3cb46c2b9f77332b59ab991b5f0fc8d5d71534ed1b97ae418329a2f0506e643fa53e3a34b4465a0a8fa81250a10edceec1f49fdb0cc6ab3c80a6f0fe5e67c4e4c83b8c3dcfe6de6f873ad601b1011b4a3c0963458d100aff963cccadecf1a8ab225ea235c50b6237b59bf502ec53f47e9f04ab90d1edea67c0916fde448922cd4319362a7c8a5157a21f3963818950ec927b6720499523f7c30ee6f9906e3d1955a53ce13c21430c7c69cd6cac7dde067367854fdd31c1b884e07ed293e9d19b1a830f895830ff2238236a8d005f1b1f7933bc50068fd5bd251a837b5df301231efdc2a6e4636b111fe523235fe2b5bc91185784280106d7639ba884daeff3ad57da2705d7c8398d9f71a14404b5942e586192d9bf2c9ca38770734edd82e6d595c53e62c2ef41f1c11973fb8999588e24615dfcc1c990f8a44f6918ef297f28340aae7d13adf0244cf8eaebd21025cdf248312f5cb86c3e79478065757eb8f6ed421a8c4c556cf60f5d71e6af3e7130442ad062d637d0174b7bdddcf206203a25df2f91845cb77f8b53e3943ce0147f426f8c9436952e0e1531367cb477f64b82e85612c70e938522a60507d121a0027f42f4a874f3bcc104e78e190478f4f6a4abedcd57df09cca5b89bf022a3d730328cee096c27d5c4ebbf7679b04508ab8841b12fe9c822c01c0a1179c1cafc789127d11aa847a452f6db4a4522f637b8ce961a4435c59affa7f94409a371f4c98151664be648cb8abf72b17635f36a0ac9f94ea84257eda55ae1a84b55a4e5c5f1d2fc6a4e7049d2c9d29043e1d8213da5932dc54cc48d94f32310308e832de3fe225d62c584bbd00cd8768add16ae52726e73d0969fd3c5da1262ef754e54800c122f3613fa96f02fb24dd255137e266e7e5f94b930325fcf6ddc8eebdef4f22ec5ba3c682f8938268c5241fc01c4dcbadead5c8b04f4b548fb42e78dcfc22244e62dd322c1fe39b1ff43f1f989ccd2612188b9b3d73b726cf9ea6a6cf8e7840b503ccfbb3236ca6e0596d08955612a4968a75a93bd7f77d41522f80301319b26ff71fab50dcff5cef303a1e80ed4422dce091d3beb5420bcc447f6c300fcab1053e5f786078e2fd026dbe7e3851d0f5c90dabe8ce56b03be2a0fc1c54112e34e86595538181502bfee6d063e56c804c3c489d0cdb99169c7fd05f026a794c2560d2745d653abf1209ba7eb10722085ce1528252b0f024b51ae1c8b30614506c4054832fd33336b364d5140625c13fa554a84f21555fc681993add77bbd919287cc7b215e5a38e69f2876cba85af728fcdd42cdea6853c6310168246221cfc724fc0e0a04f7437dfcc960b86646c6af646f627a389fc80d8733d5f3307aba10fd31846ef183ee86fe4ad6ec709d331d533ae1b12c62b1c21e51a9c3c09dd4b389d60cedefb1cb94b90a91d77ff95cb4837d1238f95892e2abd40ae4c38801539512767e00f8ac59084add4c6fb7f7a1470e213dc68fd423e86c16fe9bcab54f9c3a9a36e652aa46b334a3b006ddfcab24ffa6332d5ae8311cc1683ec13adf592ca4df2228620c8835123228e66e50535860516d0b614343ea74955b6d153bb1d724510e6df689c1be1314427eaa6c1f0002bd8a9aeae89e5cee98a6e5482215dd41a4d3726f38b64aa9e79faf9ceb4725b591b7f5dbef3c19bf58f54ec63ee54b4a301852964850aeb79c354b10844235a8cca499d8bd1d806fb8d5f6cac6d2c193957674df8fe7bfd5163b16ae91288f4cc64daf33e3bde4cac9b2bb658f51e30d6759e0b59ad84e7093a5d5957a8f82273297f2e467049ffbf21fa7322b91aaa15034fae78244e1efc6046e805a72751ddc2a553c7b1952e2b54a45473bf2f183dddc600d4a32397f4c90540", 0x5ad}], 0x1}}], 0x1, 0x8000) setsockopt$inet6_mtu(r1, 0x29, 0x17, &(0x7f0000000000)=0x4, 0x4) sendmmsg$inet6(r1, &(0x7f000000bb40)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) waitid(0x2, r2, &(0x7f0000000180), 0x40000000, &(0x7f0000000200)) r3 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x66, 0x3f, 0x3, 0x3, 0x0, 0x8001, 0x8811, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7ff, 0x4, @perf_bp={&(0x7f00000000c0), 0x5}, 0x1000, 0x9, 0x80000000, 0x0, 0x80000000, 0xf96a, 0x1cf6, 0x0, 0x6, 0x0, 0x2}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$EVIOCGABS2F(0xffffffffffffffff, 0x8018456f, &(0x7f0000000180)=""/17) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, &(0x7f00000002c0)={0x0, 0x1, 0x6, @multicast}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x2, 0x3, 0xa, 0x9, 0x0, 0xe30, 0x1010, 0x9, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_bp={&(0x7f0000000000), 0xa}, 0x48102, 0x1000, 0x8, 0x8, 0x8, 0x0, 0x1ff, 0x0, 0xa41, 0x0, 0x8}, r0, 0x2, r3, 0x8) 19:48:36 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x1800) 19:48:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4e700, 0x0) [ 2629.068392] SELinux: duplicate or incompatible mount options [ 2629.075543] SELinux: duplicate or incompatible mount options [ 2643.097657] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:49:01 executing program 7: r0 = gettid() perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6, 0x3, 0xff, 0x0, 0x0, 0x10000, 0x4000, 0xa, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5e2c, 0x2, @perf_bp={&(0x7f0000000000), 0x1}, 0xa00, 0x1000, 0xfffffff9, 0x0, 0x4, 0x2, 0x8, 0x0, 0xfffffffc, 0x0, 0x8df2}, r0, 0x2, 0xffffffffffffffff, 0x0) fork() setpriority(0x2, r0, 0x6) waitid(0x2, r0, 0x0, 0x2, 0x0) 19:49:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x36e63, 0x12) ftruncate(r0, 0x1000003) r1 = dup2(r0, r0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r0) sendmsg$NL80211_CMD_LEAVE_IBSS(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r2, 0x10, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x1, 0x32}}}}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4004000}, 0x4000) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x20, r2, 0x400, 0x70bd2a, 0x25dfdbfb, {{}, {@void, @val={0xc, 0x99, {0x401, 0x32}}}}}, 0x20}, 0x1, 0x0, 0x0, 0x44}, 0x4004000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = syz_io_uring_complete(0x0) ioctl$BINDER_ENABLE_ONEWAY_SPAM_DETECTION(r4, 0x40046210, &(0x7f0000000480)=0x1) r5 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r5}}) ioctl$F2FS_IOC_RELEASE_COMPRESS_BLOCKS(r3, 0x8008f512, &(0x7f0000000240)) r6 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r6, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r6, 0x330b) ioctl$EXT4_IOC_MOVE_EXT(r6, 0xc028660f, &(0x7f0000000200)={0x0, r0, 0x7ddf, 0x9, 0x1000, 0x4}) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000300)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xff}}, './file1\x00'}) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r3) sendmsg$NL80211_CMD_GET_WIPHY(r7, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x30, r8, 0x200, 0x70bd2c, 0x25dfdbfc, {{}, {@val={0x8, 0x1, 0x6f}, @val={0x8}, @val={0xc, 0x99, {0x101, 0x13}}}}, ["", "", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0xc0}, 0x0) 19:49:01 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x3, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:49:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec02, 0x0) 19:49:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x5000) 19:49:01 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{0x0}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:49:01 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000000)=0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r3, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r3, 0x330b) r4 = socket$netlink(0x10, 0x3, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000200), r4) r6 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r6, 0x0, 0x0, 0x8800000) sendmsg$GTP_CMD_GETPDP(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x44, r5, 0x10, 0x70bd28, 0x25dfdbff, {}, [@GTPA_O_TEI={0x8}, @GTPA_VERSION={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @local}, @GTPA_NET_NS_FD={0x8, 0x7, r6}, @GTPA_I_TEI={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @rand_addr=0x64010101}]}, 0x44}, 0x1, 0x0, 0x0, 0x40}, 0x800) r7 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r7, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r7, 0x330b) ioctl$BTRFS_IOC_QGROUP_CREATE(r7, 0x4010942a, &(0x7f0000000080)={0x0, 0x3}) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000280)={&(0x7f0000000100)={0x24, r5, 0x627, 0x70bd25, 0x25dfdbff, {}, [@GTPA_I_TEI={0x8, 0x8, 0x3}, @GTPA_I_TEI={0x8, 0x8, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x44000090}, 0x44000) sendmsg$GTP_CMD_GETPDP(r3, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="010026bd7000fddb5f250200000008000900040000000c00030002f7ff0000800000b03653afd65abcead8f560b507f05cdfcfda2854603f929371a249b49d6d9413beb30291e4ae3b7dcae678711dbad26e574290f7e826693ab4b228b0fc1eebde3ec4635754799d9ca0a8ace2d347ee3886ed2e858f24e22808f67c60"], 0x28}, 0x1, 0x0, 0x0, 0x24004850}, 0x1) setresuid(0xffffffffffffffff, r2, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@euid_eq}, {@obj_type={'obj_type', 0x3d, ']-}('}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x0, 0x34, 0x65, 0x61, 0x64, 0x32, 0x33], 0x2d, [0x63, 0x35, 0x6, 0x31], 0x2d, [0x38, 0x37, 0x34, 0x39], 0x2d, [0x31, 0x33, 0x61, 0x62], 0x2d, [0x36, 0x0, 0x36, 0x61, 0x0, 0x62, 0x36, 0x5a]}}}, {@fowner_gt={'fowner>', r1}}, {@smackfsdef={'smackfsdef', 0x3d, '{\x89+&.^'}}, {@fsname}]}}) [ 2653.707081] SELinux: duplicate or incompatible mount options [ 2653.713649] SELinux: duplicate or incompatible mount options 19:49:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec04, 0x0) 19:49:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat$sr(0xffffffffffffff9c, &(0x7f00000004c0), 0x4101, 0x0) openat(r2, &(0x7f0000000500)='./file0\x00', 0x10000, 0x15d) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) r4 = getpgrp(0x0) pidfd_open(r4, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000280)=0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000003c0)=0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r7, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r7, 0x330b) clone3(&(0x7f0000000440)={0x3240000, &(0x7f0000000140), &(0x7f0000000180), &(0x7f0000000200), {0x3f}, &(0x7f0000000240)=""/9, 0x9, &(0x7f0000000300)=""/157, &(0x7f0000000400)=[0xffffffffffffffff, r3, r4, r5, r6, r1], 0x6, {r7}}, 0x58) waitid$P_PIDFD(0x3, 0xffffffffffffffff, 0x0, 0x1000001, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:49:01 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:49:01 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x7505) 19:49:01 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, 0x0, 0x0, 0x0) fork() [ 2653.903294] SELinux: duplicate or incompatible mount options [ 2653.922108] SELinux: duplicate or incompatible mount options 19:49:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0xfff) write$binfmt_elf64(r0, &(0x7f0000000940)={{0x7f, 0x45, 0x4c, 0x46, 0x3f, 0x8, 0x5, 0x6, 0x0, 0x2, 0x3e, 0x1000, 0x8a, 0x40, 0x269, 0x3, 0x20, 0x38, 0x1, 0x9, 0x8, 0xfc42}, [{0x3, 0x10000, 0x2, 0x2, 0x75c, 0x6, 0x4, 0x80000000}], "19e147b61a8e7c8c3dd9295ecc14a60309b18bc9fd0800b474b58635231ec1952a2f332cb89c616ff956513457f384c976255d196e4c3cfab92d506578eb2a239d58eeb63d60ca84c2f62e7752db7917af66ab872e7e02ddb10640b2ca903aa08a686c26b297b579de1e3a90fba231ac40c0ba37a1704f978206be4bfbd4b71578011dc68a415d45ec9a4316c429ff2dcc799408afa56b8f60167c4ba1e5fece77f98b0df18b957280dfaf123dfe981aaa65e206939cbef47e45db82c8ea123038193101cb6bbac480e02197a65aaf11c24862901a72ca2cde13d3", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x753) pread64(r0, &(0x7f0000000400)=""/223, 0xe9, 0xfe) syz_open_dev$vcsa(&(0x7f0000000080), 0x3ff, 0x200000) 19:49:01 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec18, 0x0) 19:49:01 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x5, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 2654.100591] SELinux: duplicate or incompatible mount options [ 2654.108265] SELinux: duplicate or incompatible mount options [ 2669.421005] kmemleak: 15 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:49:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x400800, 0x45) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:49:25 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x6, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:49:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000180)=""/17) ioctl$NS_GET_OWNER_UID(r0, 0xb704, &(0x7f0000000000)) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000200)) statx(r1, &(0x7f0000000080)='./file1\x00', 0x6000, 0x7ff, &(0x7f0000000300)) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f00000001c0), 0x282204c, &(0x7f0000000440)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {}, 0x2c, {[], [{@subj_user}, {@smackfsfloor={'smackfsfloor', 0x3d, '^$+'}}, {@audit}, {@obj_user={'obj_user', 0x3d, '9p\x00'}}, {@fsname={'fsname', 0x3d, '['}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}, {@defcontext={'defcontext', 0x3d, 'staff_u'}}, {@subj_user={'subj_user', 0x3d, '/dev/vcs#\x00'}}, {@appraise_type}]}}) [ 2677.486154] SELinux: duplicate or incompatible mount options [ 2677.488769] SELinux: duplicate or incompatible mount options 19:49:25 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, 0x0, 0x0, 0x0) fork() [ 2677.502872] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=28452 comm=syz-executor.7 19:49:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x2) 19:49:25 executing program 7: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000006a00274e00000000000000000002000002ea3c2bf8a58a2d2a7d12b697de544172f63bf0aeb9b2d542973d413fcb639fe7f9fc78c9b612"], 0x14}}, 0x0) r2 = dup2(r1, r0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001600)={0x0, 0x0, {}, {0x0, @struct, 0x0}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f0000001180), 0xc, &(0x7f0000001200)={&(0x7f00000011c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="e30027bd7000fddbdf252e0000dcffff00000000000000000000f3ff00000000df83ed26f8bc4520667c3c2ede2ee6cf4291af5821e43ddc77"], 0x24}, 0x1, 0x0, 0x0, 0x4c024}, 0x40024) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000900)={r3, 0x3ff, 0x20}) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000012c0), r1) sendmsg$ETHTOOL_MSG_WOL_SET(r2, &(0x7f0000001500)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x5aed8b563e1e26bd}, 0xc, &(0x7f00000014c0)={&(0x7f0000001300)={0x190, r4, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xdb, 0x3, "8c2f04e9f8075089cd4e7d2d86ded3f0bb5412561ce388a55d0ca0b436b9909a79704ab4cff9b68fbe172bc1efd94b49af71b1a270e54597417f89df81912823b6c52bddca44eaad8a78bc737ed96ded86891aff9781b44ddc895fc4a116b1a2850f30f63fa6a9d40a0e66c411c9ff59af573f30683b1d2cd6fe17fc3d3fa802638ef508ba99d686041e3b1c359c4073761846b36d33f7d729d5ea2b3dcae9d08577e8d23fd22c6c8db9c2e1b2e8f3fe7b3a072726ed364441e0c4d18a49af98dfa212665af0dda11ed5caa8dee700faebdd03b826da3f"}, @ETHTOOL_A_WOL_MODES={0x38, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_MASK={0x29, 0x5, "e1c3b55074168ece9dd0818cbd08facc6c602b014e9d406d094aa67b6a13f586351302052c"}]}, @ETHTOOL_A_WOL_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x190}, 0x1, 0x0, 0x0, 0x1}, 0x40880) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000440)={r3, 0x7, 0x5, 0x1}) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f0000000740)={0x0, 0x1, @start={r3, 0x0, "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", "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"}, [0x2, 0x2c8a, 0x62, 0x101, 0x8, 0x401, 0x4, 0xc000000000000000, 0x7, 0x101, 0x1, 0x3, 0x4, 0x0, 0xff, 0x7, 0x3, 0x5, 0x93c, 0xe5, 0x7, 0x0, 0x1b000000000, 0x8000, 0x81, 0xd8bb, 0x4, 0x0, 0x20, 0x200, 0x200, 0x9, 0x401, 0x5, 0x0, 0x6000, 0xa67, 0x20, 0x4, 0x9, 0x1, 0x401, 0x6, 0x8, 0x1ff, 0x1000, 0x6, 0xbb2, 0x7, 0x8, 0x80, 0x5, 0x81, 0x0, 0x3, 0x0, 0x200000, 0xffff, 0x0, 0x8000, 0xce20, 0x1f, 0x790b, 0x9]}) r5 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000001540), 0x40000, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000001580)=0x40000) r6 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r6, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r6, 0x330b) ioctl$SNAPSHOT_ATOMIC_RESTORE(r6, 0x3304) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000000)={r3, 0x0, 0xce5}) r7 = gettid() waitid(0x2, r7, 0x0, 0x2, 0x0) 19:49:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x7605) 19:49:25 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:49:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x7705) [ 2677.602364] SELinux: duplicate or incompatible mount options 19:49:25 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x4) [ 2677.614442] SELinux: duplicate or incompatible mount options 19:49:25 executing program 0: r0 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000300)={0x0, 0x10001, 0x0, [0x1, 0x3, 0x80000000, 0x10000, 0x1], [0x1, 0x100000000, 0x7, 0x6, 0x1f, 0x3, 0x40, 0x8001, 0x4, 0x1f, 0x6, 0xd9, 0x7, 0x2, 0x5, 0x800, 0xfffffffffffffeff, 0x9, 0x5, 0x4c, 0x5, 0x80000000, 0x9, 0x3, 0x8, 0x0, 0x7, 0x800, 0x5, 0x3, 0xf2b3, 0xfffffffffffffff7, 0x1, 0x8, 0x101, 0x80000001, 0x2a, 0x2, 0x0, 0x7, 0x80000001, 0x4, 0xff, 0x9, 0x6, 0x5, 0x0, 0x1, 0x0, 0x4, 0x0, 0x7fff, 0xf, 0x9, 0x3ff, 0x6b57ca6a, 0xec24, 0x7fffffff, 0x1, 0x800, 0x3, 0x0, 0x3, 0x100, 0x5b8, 0x8, 0x800, 0x1, 0x8000, 0x1, 0x7, 0x2, 0x0, 0x2, 0x7, 0xec19, 0x7, 0x7a68, 0x80, 0x0, 0x9, 0x84, 0x3ff, 0xfff, 0x1f, 0x20, 0x0, 0x6e0, 0x0, 0x6, 0x3ff, 0x5, 0x200, 0x5, 0x8, 0x5, 0x5, 0x9, 0x2, 0x7, 0x0, 0x8, 0xb61, 0x100000000, 0x4, 0x800, 0x1, 0x1f, 0xfffffffffffffffe, 0x1, 0xa6, 0x9, 0x2, 0x5, 0x10000, 0x3f, 0x3, 0xfff, 0xfff, 0x5, 0x80]}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f0000000040)) r2 = syz_open_procfs(r1, &(0x7f0000000080)='status\x00') getpeername$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @mcast1}, &(0x7f0000000180)=0x1c) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB='\x00\x00']) [ 2677.657975] 9pnet: Insufficient options for proto=fd 19:49:25 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x80000) 19:49:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_LINKS(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x24, r1, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {}, {0x8, 0x11, 0x80000001}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x4011}, 0x24000000) r2 = gettid() r3 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r3, 0x8018456f, &(0x7f0000000180)=""/17) ioctl$SCSI_IOCTL_STOP_UNIT(r3, 0x6) waitid(0x2, r2, 0x0, 0x2, 0x0) 19:49:25 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, 0x0, 0x0, 0x0) fork() 19:49:25 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 2677.763083] SELinux: duplicate or incompatible mount options [ 2677.767494] SELinux: duplicate or incompatible mount options [ 2691.167662] kmemleak: 17 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:49:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x2268c2, 0x163) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) r2 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000180)=""/17) ioctl$HIDIOCGFLAG(r2, 0x8004480e, &(0x7f0000000140)) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="74726134b110000000000055eb6f3d28a221d4c5e02a886e0474fefbb3ecad2ac27c9129e7890a6aef25d280b27fd73d33cb1ce191c68f9bfb13f6869818a9efef5308b33c8b72653f11af7b4de1ea1515792c6275f0c72bd9eab5a34ad6a78a447e7e7721795c2ef46cc164449a1d5c9bec2c8bffbdb2a79400a1", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="2c6d65615b75f9ffffff"]) 19:49:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x8) 19:49:47 executing program 7: r0 = gettid() waitid(0x2, r0, 0x0, 0x0, 0x0) 19:49:47 executing program 2: sendmsg$TIPC_NL_MON_GET(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000040)={&(0x7f0000000300)={0x308, 0x0, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@TIPC_NLA_NODE={0x14, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x48}]}, @TIPC_NLA_PUBL={0x44, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x401}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x9}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x7f}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x3}, @TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0xfffff0f3}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x20}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x6}]}, @TIPC_NLA_NODE={0x58, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x5}, @TIPC_NLA_NODE_KEY={0x3c, 0x4, {'gcm(aes)\x00', 0x14, "c05143a8d1cb9cf6ecb12e4c9003f2e6cac091b5"}}]}, @TIPC_NLA_MON={0x4c, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8001}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7ff}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x4}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x7}]}, @TIPC_NLA_SOCK={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x250}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x20}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x6}, @TIPC_NLA_SOCK_CON={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x4}]}, @TIPC_NLA_PUBL={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x200}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x9}]}, @TIPC_NLA_LINK={0xf8, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}]}, @TIPC_NLA_LINK_PROP={0x14, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_LINK_PROP={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6633}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}]}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x11d68aff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7ff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}]}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}, @TIPC_NLA_SOCK={0x64, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x8}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000000}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x80000001}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x9}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x10001}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0xdfc}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x400}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x400}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_SOCK={0x18, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0xc, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8, 0x2, 0x800}]}, @TIPC_NLA_SOCK_REF={0x8}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x401}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x200}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x20}]}]}, 0x308}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = open_tree(r0, &(0x7f0000000140)='./file1\x00', 0x101) openat(r1, &(0x7f0000000180)='./file1\x00', 0x400, 0x80) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="1f00"]) 19:49:47 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x300, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:49:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r1, r0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r3, r2) close(r2) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee01}}, {@access_any}, {@msize={'msize', 0x3d, 0x6}}, {@cachetag={'cachetag', 0x3d, 'wfdno'}}, {@access_any}, {@aname={'aname', 0x3d, '/'}}]}}) 19:49:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0xe0ffff) 19:49:47 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}], 0x1, 0x0) fork() [ 2699.549428] SELinux: duplicate or incompatible mount options [ 2699.556826] 9pnet: Insufficient options for proto=fd [ 2699.558222] SELinux: duplicate or incompatible mount options 19:49:47 executing program 7: r0 = gettid() fcntl$getown(0xffffffffffffffff, 0x9) waitid(0x2, r0, 0x0, 0x2, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r2 = socket$netlink(0x10, 0x3, 0xb) sendmsg$nl_generic(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r2, r1) write(r2, &(0x7f0000000000)="d522cbe2342a005cee24cf0c24e3910f6b11f578b6c36b236ef73c76b1e9e911e0f57d6ca612266c46a2a454bc303ef1715284ab9f388c22c502d06acd4611836476b26d62dcfd92887293cdbdf02142a3093b547a527bc8ef68d71a9263599173c020928ee21a7617d38efee42d87b807b0ac8b417bdc9c28869474f545d136cf1d", 0x82) r3 = gettid() tkill(r3, 0x3d) 19:49:47 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x500, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:49:47 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x1000000) 19:49:47 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x18) [ 2699.742342] SELinux: duplicate or incompatible mount options [ 2699.765515] SELinux: duplicate or incompatible mount options 19:49:47 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}], 0x1, 0x0) fork() 19:49:47 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r1, 0x29, 0x18, &(0x7f0000000000)=0x80000001, 0x4) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000280)={{0x7f, 0x45, 0x4c, 0x46, 0xfd, 0x80, 0x1, 0x9, 0x8, 0x2, 0x3, 0x0, 0x2c5, 0x40, 0x336, 0x80, 0x20, 0x38, 0x2, 0x5, 0x6, 0xc0}, [{0x5, 0x7, 0x46c, 0x400, 0x8073, 0x6, 0x3, 0x7fffffff}, {0x4, 0x5, 0x7fff, 0xa8, 0x4, 0x80000001, 0x312722f8, 0x1}], "d2d378b829b92952e0b43267797a644d3ef6636904d828e828e0d5f279d9998ccfa7f04df0427d42c8e61d1b9fa7e194174bc2386dc9c7d73a6ed1532a82354997267acdda3f2bf3061621407dfb543be98a43126192bac298046dd7c82e11d72b45e5e813abb20650f0e70d51cbb5aa8c58", ['\x00']}, 0x222) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) r4 = syz_open_dev$mouse(&(0x7f0000000140), 0x24, 0x44000) ioctl$BTRFS_IOC_SUBVOL_CREATE(r4, 0x5000940e, &(0x7f0000000940)={{r3}, "37ba5ce10fd2b09b8bda820c33d8ef75778877ef1041e1ca168fc7117d2c04d0f108bbd59ddec257d661a19b3af01a54417774604fb019d4b24decfe22a87602c6bfb6fd579b28ea3fcbd9efbc48941e1be2b414e8605980b53cfc9245fbd6c81b719ab09ce5ceec9cf3796cdf4b498c2405d6681e64b552fe2aee957ebe775bc292c99acf36942833328c7257e9bc1c1d96918e88281a5c1c790a2cb7a5ba4784233cbe05f6dbf13a1dcf3951b25eab1c23688cf6f581835f6a052d47bfa9fb6b78bef5d8908d70b991eb3b4bc637ad8f1d728ce64c5f9b754439a691c96352ed8dd34f47614e019dbf4408efa93512d57e3a18b2fe162f49cfc26f1d6941d1471f81f7ce3d13c62730a0c5b148b647c1dd43f0480bc43ac7364b79303f2a33c00e42f43e0a28df003f31e8e6420d2f595f0c2fd39992ae0501241e2c63d7a35eac679933d06299abf081b81a043a3d9262bbcaf4de3440942fba2cf870851f908021c6c363ad3b6bca5275bea871c690464b84653f2fa5942637f8eb566cc2e952fa432983a850705bc6dac10abd340d6926ca3b8ca3f78527f9b44fe3278cf0539328488a9e3a98d2a5f4ea6c3c0d27ea771ea2f6465a5b1367ce23b74cd7330098ac0e5599af18e0e4d7d2910657d3cd6056b33f252d84722309ff255a5c4ca6bc915c6f330697cd55373a2074073c7eabac114477e663a2b31eb04aae16666d6fc7d2a66ea574102003508f28951de09cd38bf9758b4d616e2f821a6ed3b611e40c1accb71f4ea8c85b2008784fea8781df977295413818bc24fc78895666e3931230a733bf7fc5e1e92824b2c6050df6aa1ef6faa1b506972e77474472f8ef44ca9ca579c01a173cee05e8e5fca707703208a52ec4ca33dccfa2c37962ce4b1ce9632897060736c172e805aaae395eb34af343575b9d5d59e883370d84f4c3677d656377e3c35f16b5fde301436ea5687c89a10b53779464eaf0c035577fc19b140471e2e24dd57f471a6c4470dd0968b711c3a898d90775639649ecc8e99d672f8c4768596010e47bf3bb4277f3de3545b977cc507fa2fa0ddcf467f82b783db0a2ec36b10332dc04d10ff6ca39cefa66bd532acd10793e68c2fa8a940edcd67563186a2f1c399db9f6b9c7fdf1299eca5879672d64874f5a24835a66ddbdd6c840e67333007c21acce318a5fd4a1fb451146d67d8f4134ff536af5fae68704c4e732bc21d156cb49772d8f064f3bdf8cd660e040f766906c2d2f1ba50beafcae3c30842e03fc1cc212aff2d2c1db7bef82f6d79d082b54eed5bfa8095ba0f7e61a55dc024b1f1674edbd759fe7af8d5c5b9aa40c127e8c0f25820392c4906b2be036dc771ec90a22936186c59eca4600543416760985cd6b9e862f2dc2d74c923ab91419f39fe1376d547efa321068a2bc303fee8059c5335e1b4833cb87077dcf57b264222496e47919028fe3a297e0a6e94692c56b0100bb1de629cbd27b08bb570242aef45110fac9515e616e3289b58946eea140439cdf501614a4adbafa3a8c7ffffbbabe897a998b97e5886ae70db7ccd7d6b39ad1f77d48f1cc4468ceec7fec4a8eb045858f7c0013da835a90be5cbd0a833f854d63e50146183348fa598e802fe9bfc2b174a67e062c8dc99321d271bd47c021183b9c0558b555edab96b6b55662ea147d128886ae16514b16dc15f79208e34d8dbc312f6d8f2b7a2901d55abf234e6c91f80b7fab9934c373d00efaa7aafa99ace50cc35511bab4aa29eb3a1daccaf7b6704935688c752140d59115b2764d88656f7ad872be998dcd063313024d970fc217605eb7d83303901fdbab29f9870f87a4af7181507eb79b5188cb946745b31c6dff8dc33333898ccc63efdc4a2457e75ae6913bfcc99ebfd11de3a6ff85bb365821c709f2daf2747206ddffa1f5c79b7ee292b60f22380dd44469d00ab2b86be1ed4882c0c7aa2521164dfcc4cc19087f1a100eefb1f8bda8298bd94420f97b072be3f26fb6fea073c0bbe4b6381ae735ce0c5bc30355097a95057239686cef4ac6fbdaf9b19afef26d34459897ea67e708826d351b1532489936c8e8d42cc4bb4c387fa96fb8508ae2155125b4ba9ac014b08b9596e2ffa4553cfea4c6bdac5cd8de85308daa36a00089434801b9cd7619529009835c3c95b29360d18dc17522e41ac0214cf6e968aa402581daa735441bf22247435ee3c6fc52caf303a9a3e82b740f4c977f0bcf68ffd41935b051a39c2d4f9a80c5c346e07de37c2c5cc53bd8e1c34b646c5aef110b6300c4b91a52a0549290fa58c2cc246b002438d940b480717559a702dff61bd62e3c0cb27488c71613543bcf667c2459fcf116dd13d2d079727c223aad46ef182d1987bdd8cc1d4087a02ab1392df2c0b69e75c19480c065f1e32dea63c0466cdc26d43a636d93b7c81f627f877edfb8c2f6de1c79e4e71b5df08fabd48e05a4ba086e2290aabd9351b2f16911de0b11fe11e8652e403f1add185e2a04d2161283bec5dff949623094db1e3941ed5657eb2e5d7ecb55fcc769e1549a39518c449c431e1a7da75252aaec9b76f8bec2696373ed6b9f40c4c68c570ab72ff1c1a4fcc58db08fafac8186ca0042a8f70a85ac9f11ec209bd805b9c5bcc09b555b92f4300491cb40144a9f5dd932728e031459fb0f86d17bb0572cc6938a789d784e658733bf7ef02502c2f410435467c2af3e74ef281f74158b4947dec89bc96c00a32048fd37fa630c753b1be10ccb299517b3d5be15f993263262929f243f0af161ac65103f76137775141c3abfa72a17778ede401b51b515778fc988a19dccdc7c8e0fe79b93f4f60b0ee94c54fe1adfe9da01ea2abc8daf0308b192dcd29aefc8362bcf9afd4d9adde06d67a499d7884ceb2bb52abf443c2a45751d2cae219cef8218c566d4d86afc84f787e2d388552d7170e3d6cae0d1fb19a4eb01dad4148f172e882cb3f14f5c223a0a5b842ec048c3833a0c688d32b1147437e3a9804ecead58de6239ed690f3d22f9554ee8bc6481f27ab3b05ad46ceb53c39a1dce289533a245cbec6dd39f7024775174f042416931d7a7aa64354f59731b12bc6797c9742441cbbca26526c90da20f7c474f7ccf7d0e3910db2757daa776d11dd78d95dc6def10b54e26b72cba556c48ab0b169985a6c4c0e788d11d17fb31da7e5954834153c9e267c96ab35e2f05c5f7c8cd926b22b96c0c66722d499793431647f87198dab647fc15502dbaeabfcf92508e3df8bf505b633f7e0bcbd128eb06b4ae20258f22bd760d5c8cc5fd9b0b66e392cd9f91a94ef0365a8b30cc15e878425e9c93008d935d3184ed83b6ca0cecd225777c5dc96bcecf67ba4d3edc7196b27f0da37c836e99220dcf4eb5243a006b7c2c2b24345f00574b64d85b4ae29385ff829b6f22060304c008614b815d86319c829f428690b3fa2baa2853691318ed07cf19c086542bebff509c1c121d421337da6045dca3c15c2be28aa8f76a0f3b808160494e4d5b7a84310c1904d4313089a5633e6ac10d7bec4ab733f3e49611924a590396eac2a97de2606b63f389bdcd43ac61c7df6eb110497cfaf971c69ae91690a31c1c7982a28d0f5662bdd92dfbcd2fadd34a6e2f77e2cdde2acac1f4fcf44d373663d3d9549a468b7853027d428d6141e0d8d2ee9c2515669a67e8e371a1b53b249e44fb4444d885ca30c7611d6086bdbc1b42603a367f5f8864fcb4095047175a1706abb0d522f1d7b4fae29daac3cd3bc8abc36883ed7a6346d6efee94f191f90dc9fddc42ebba2fd338c0f67066713a03d7ff1e65f3622655711649ca0bcbf677df0f1d65b583d897d361b08a0925281486dc0074877fc6936b10c090b9c27fca0dd09a4ddce0f6e02673bc72fc14faa822c766d8f4a736d3fdc6642cea2f2bd895adeb11c208a8e327d87ac32101adfb1f1203f1fe7228ca8a5332f285771d6a44947b1deb8b7640c1436a6624c9b3f743d05c4903e0733a4b6e0a68bd40632270255b32383927d6d5d78e829b12f81deca4f66b957765f7ac560184e02a2448a13da2fb551a2c9230b575ddc46ea73104b6288edb6cc8e078c0d2b63a3d05b830938ef4203f2f1bb58af101109872be5684b77ba64bdcdd68a903c33ae68ab2d507502d808886ca2968bd8e259bdfe94324880c0f00a3a716965d8a70f40497355ceca11bbe6e1328978ec628d436c44747c96aa392f56e49526f53068c94c13693ac4e29acb9c6fee73decb4ed227f21583472a926c2896526f658e21f1afdade3cfc7247505bd059949036e70bfded3c05813652b1bc1d02ea79384a755d8e71e629f0d11906addc12d9237621bdfc6707705c5e3f5857c42c5caaf72170e72c802696308b5a56bd4136da62802719d5d7013652b1dbde76821e78632fcbac7698656d6f86befb5799aade5a80992fab1861ef64f8bf32c19cb0681e08b21b3a64437e43e29a20e738e02630e8773e7a8765bd24b0af10fb27e3f3946fc4597aa1ffe061f9ede5bab3664041bbe5ca0722d65941bf06ead9b0a72c94a3923e488686191d9306b0834f7e3472d0f47f76f926c01a4226bc732e8d5dd83eb3d70f71dec5b7a46f051e7fd322142543f859f1799c88df290b6ed7b2e7daefbeb7dfe9a1f2dd8fafb4a5c965cca1c22f2fccc49c32a4acb77d44e6455ce65e89eedf0250d973dc3ef2281b9b0b9adbbdcb5e792ea1fd3a4fb7b9e51e655b62c28af60be53e5bcc31cf838b4c2dfa91b3ad6d8a0f6109adcb26ccf00fe9cd100971e886f321c0d0e4596612b43e8342d1ccccb5a85c9ffc3f642e76b202403124e2676cf71a96c8f4d36977ff0d034d8cff110f048175879741018db4c42c730f89943daae94f921e0c89d3419513164e9ea8e16b4756c174b355c2f178f2864609a426d827fc1ad21242379cee1717b3eda0d1744cd5abaa82bdaea31204ce640db8563b3ac30bfd7f5b934f86e4f4142c12872c4383858af9955ab3819abf42a47d6cc97224f571cf9747ba1c95d973e0f060aa920d07f1092a7e60751cfb3574ee96d6481995ef40e62148c2905292fe5b75bc8a08dac0d4191d5c03d4d6ff26f6136bc96d99aa3e3b88a06d477364e80e4d3677aa8462943ee9197e1f9a7c91da5a0c56c1658e14cb6d26f6e5bafd357779cd45e37cede743df5b0ea3e0c153b2f6a68965a69a1b7707aa3823fe2d9be9d7c94559ff20c8ffc612f62e7434a97f4795451cdfee448248582744438cd56095740d9b2b70848ea85ba4b4eec2c5371e5edade15bccc4d00a15bf98bb5f12206063d10bb4da3af02afaaf6c922fe51f44fb83f6fcc81cbadd4e40a8c0cee851e136feb722cf8974f86d3f6a95d9ede02679e3d617b45ad0bab054d808949c743c61b213bd05b704e745eb03807cc777679c83513b8845898b2d346116abc6e0566f09a3042526f638f11015439a2603a3b743e67dfef53fc4f603918df59187fbfe49896a50905ee608b5d063b34c1b04004074a39185da4b5bb303eca4956668ca10388d2c2fb00ba1d456fa9dc47d8534122227f1602deeae5da61ac2fdce198a3c3a55e43f0957cf59af6892397df0615118bceb4444be41d87e22192338ea8aee2d7f6ab34923225374dc5756c53c734ee7f74e6a742d6dee796ab9f7aef6aeec70d79eb430f02f18d2e6e1d5e1920ad06159eb71bae0fa2f873b843fd5675c54fc6b0de1f706201570a05912c3ff75301f97ea6cbe8d4a9fa3547f6803959ce6fb214c108ae7"}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0xa, &(0x7f0000000200)=ANY=[@ANYBLOB="7472bbac7a1b6101733d66642c7266646e2f3d", @ANYRESHEX=r0, @ANYBLOB="2c7766746e6f3d5a05e15397f08cb9f46f8f44c65141e172bf534c987d51942b387787393d8ebd69251d6eac5a13e19110a6d83924b6c7720000000000", @ANYRESHEX=r0, @ANYBLOB=',\x00']) 19:49:47 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@loose}, {@cache_fscache}], [{@fsuuid={'fsuuid', 0x3d, {[0x39, 0x34, 0x0, 0x63, 0x65, 0xc6, 0x64], 0x2d, [0x34, 0x65, 0x66, 0x30], 0x2d, [0x64, 0x2da0b966df960fbe, 0x36, 0x64], 0x2d, [0x2c, 0x30, 0x66, 0x30], 0x2d, [0x0, 0x64, 0x34, 0x37, 0x31, 0x31, 0x5d, 0x36]}}}, {@euid_gt={'euid>', r1}}, {@uid_eq={'uid', 0x3d, r2}}, {@obj_type={'obj_type', 0x3d, 'rfdno'}}]}}) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=@md5={0x1, "5a87a5451cabc5fe73921880015d9ea5"}, 0x11, 0x1) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000000)={0x0, 0x18000000, 0xffffffff}) 19:49:47 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[], [{@mask={'mask', 0x3d, 'MAY_WRITE'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x66, 0x0, 0x0, 0x35, 0x38, 0x66], 0x2d, [0x34, 0x38, 0x36, 0x34], 0x2d, [0x66, 0x62, 0x37, 0x64], 0x2d, [0x39, 0x36, 0x39, 0x65], 0x2d, [0x39, 0x63, 0x34, 0x36, 0x33, 0x67, 0x64]}}}]}}) [ 2699.878252] 9pnet: Insufficient options for proto=fd [ 2713.957401] kmemleak: 38 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:50:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) open(&(0x7f0000000000)='./file1\x00', 0x400000, 0xa3) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:50:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x2000000) 19:50:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x4f2002, 0x2) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400), 0x40001, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000940)=ANY=[@ANYBLOB="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"], 0x14}}, 0x0) dup2(r3, r2) ioctl$INCFS_IOC_FILL_BLOCKS(r3, 0x80106720, &(0x7f0000000640)={0x8, &(0x7f0000000540)=[{0x5, 0x83, &(0x7f0000000100)="dddb52826abbe6b5b17ef68e7da860df08d62e4d8c7610854e0623439c41561d327f99e0aca50d35e63d13dbbd9ab7f0b04f825f13c40cb0ca5f4633e00369331a272ededf7a6fa2c7e9828315a3a59b0f4cf7530b6a361f31031dd3e64d9fd6ae60d12fc051faa608e8b75677f5b800c40b83d967275fe35d73616e78a1d1ba71885e"}, {0x8, 0x7, &(0x7f0000000080)="11580df073fc98", 0x1}, {0x5a, 0xfd, &(0x7f0000000300)="f1d72627e7c1c648293bf06b5d5fb155b2b015df304ddf6511296bc71404afaf4bf51878bb75615542639a523598ab73c65099565fe28d19d190c94ccb94c56bbdd9b8edec46f30e33bc55bb86f599d3a7081e194e51c8b5eafd280024c0a12938072c8a74bd2a40240820908c451366826a568f9e62315295db01597fc48d8bad5a722cb837d7577d6d33cf5cead9d66601bcba74f3e7a86532a71d093d5750d53b6cf2498ea6be5835429780a2d076e85b819cb4139008670b09bc3d21f89df748082aec53361793566916832d64eac78555800433f5e66fc2d58733df867b3afa8434b907997a01dd5894db746c588dd783de974a1473af44bd6b7d", 0x1, 0x1}, {0x0, 0xbe, &(0x7f0000000200)="1ad97388d90e1687a5a4c753d0a199e9df57f9a66043ada10c7f203eeaade3f8b6cfd07042f0e40a879a2c096ddc656617193f8a1c8eb69c9a7485b4cf5cbecd7b9061b27b1448e667dc178312ba1c55f51adf021b0f9d5a6c056724d31e943cf1a9417f39ab483f77678e3311d24cbd7719eba3dfe9f12a80eac8557cd70f0ac89390348486c202b0e2c2b3b639f551bedbd75edab7cb5593cf460fecc06121d6a3364b27d076276af941c3f1294d3221c7046504e17cbce9bf56f38119", 0x0, 0x21bc1094030fd66f}, {0x0, 0x3f, &(0x7f00000006c0)="fb774c696a78c585200c70b48278458286e237fd3eccaf1bfdee68d42ec758e157c837a25eefdba37a297aa6970bc7baaff38bafbd641c14f8870a862ae676", 0x1, 0x1}, {0x3, 0x29, &(0x7f0000000440)="7e2f7b2f84f75c40c5714731fe1f296a703f4773effe24b7831472e44e391199f339fae0d9fdb31c03", 0x0, 0x1}, {0x5, 0x2c, &(0x7f0000000480)="cb6c6887d962d50e2f911707ef7019ceaaa8cbf4e14c5c7dc07e2ed3ece72343eb3d9e5af7f420a994b9cb29", 0x2}, {0x4, 0x7b, &(0x7f00000004c0)="91a2476bd576856c482270ccb611e49e186e3c2f8e2565e3f6782808940b7dcd6f101081034a0eaa63d69c8ea0678e0261537d6e6198a4325af5a343ae0f7f9a574c00ddcf17d57653c042961f77503d2b0f57612540d179823f94ff575de7aaed9f8f1f8e4e13081b0d477c0f9387fc9b79d86a0818464b5d3f2e", 0x1}]}) r4 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000680), 0x19d242, 0x0) fchdir(r4) 19:50:09 executing program 7: r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) r2 = getpgrp(0x0) r3 = pidfd_open(r2, 0x0) ptrace$setsig(0x4203, r2, 0x3, &(0x7f00000000c0)={0x2c, 0x3ff, 0x62}) fcntl$getownex(r3, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setsig(0x4203, r4, 0xfff, &(0x7f0000000180)={0x1f, 0x7fffffff, 0x8}) ptrace$setsig(0x4203, r1, 0x6, &(0x7f0000000040)={0x3d, 0x101, 0x8000}) 19:50:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x1800) 19:50:09 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x600, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:50:09 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}], 0x1, 0x0) fork() 19:50:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="d23ede0f00003d", @ANYRESHEX, @ANYBLOB=',\x00']) [ 2722.150231] 9pnet: Insufficient options for proto=fd [ 2722.160908] SELinux: duplicate or incompatible mount options [ 2722.175718] SELinux: duplicate or incompatible mount options [ 2722.178159] 9pnet: Insufficient options for proto=fd 19:50:09 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x3000000) 19:50:09 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x700, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:50:09 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x80000) [ 2722.336745] SELinux: duplicate or incompatible mount options [ 2722.339528] SELinux: duplicate or incompatible mount options 19:50:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) creat(&(0x7f0000000040)='./file1\x00', 0xe0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB='1(']) 19:50:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat$cgroup_subtree(r0, &(0x7f0000000000), 0x2, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, &(0x7f0000000300)={{0x1, 0x1}, 0x100, './file1\x00'}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:50:09 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {0x0}], 0x2, 0x0) fork() 19:50:10 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf29, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:50:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x4000000) 19:50:10 executing program 0: ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, &(0x7f0000000040)=0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000940)={{}, r0, 0xa79528dcb05ab4e6, @unused=[0x401, 0x2ec, 0x1ff, 0xffffffff], @subvolid=0x3}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x40c1, 0x64) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) [ 2722.469308] 9pnet: Insufficient options for proto=fd [ 2722.473428] 9pnet: Insufficient options for proto=fd [ 2722.539430] 9pnet: Insufficient options for proto=fd [ 2736.814037] kmemleak: 19 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:50:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x1000000) [ 2744.758518] 9pnet: Insufficient options for proto=fd 19:50:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c00b72342d1be16e304c3127fc2d3f8d74c72f5391bba9d2e2975674e05dbe45788ab0a7a0cb4f0ee486fc7080a75b4c8aa1a6d6450ca90bf680312d0abce8247ae44ead678a54cad1cccd00c9ba9efdf"]) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000180)=""/17) openat(r0, &(0x7f0000000000)='./file1\x00', 0x400001, 0x84) 19:50:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdfo=', @ANYRESHEX=r1, @ANYBLOB="2c00c2d01fe99e35b4002e4366005da4aa79b011ed44d4c35bb692204806f50135ad2d7eab91d8df7ae67ede1ba030cc9124afe2c8820c25340823aadbea691cf02a775f68"]) 19:50:32 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {0x0}], 0x2, 0x0) fork() 19:50:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x5000000) 19:50:32 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:50:32 executing program 7: r0 = gettid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000500)={&(0x7f0000000fc0)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB="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"], 0x4b4}, 0x1, 0x0, 0x0, 0xc061}, 0x4040001) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000580)=0x0) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@private0}, 0x14) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000100)={@private0, r4}, 0x14) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000700)={'syztnl0\x00', &(0x7f0000000680)={'syztnl1\x00', 0x0, 0x4, 0x40, 0x0, 0x9, 0x21, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x1, 0x0}}, @local, 0x8000, 0x1, 0x63, 0x7}}) getsockname$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000780)=0x14) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r7, 0x29, 0x1b, &(0x7f0000000100)={@private0, r9}, 0x14) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000840)={'syztnl2\x00', &(0x7f00000007c0)={'syztnl2\x00', 0x0, 0x2f, 0x58, 0x1f, 0x0, 0x20, @private0={0xfc, 0x0, '\x00', 0x1}, @private2, 0xc0, 0x7800, 0x1, 0xffff}}) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'wg2\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000008c0)={{{@in6=@private2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@remote}}, &(0x7f0000000600)=0xffffffffffffffd1) sendmsg$TEAM_CMD_PORT_LIST_GET(0xffffffffffffffff, &(0x7f0000000f80)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000f40)={&(0x7f0000000a00)=ANY=[@ANYBLOB="10050000", @ANYRES16=0x0, @ANYBLOB="000229bd7000ffdbdf250300000008000100", @ANYRES32=0x0, @ANYBLOB="3c00028038000100240001006d636173745f72656a6f696e5f696e74657276616c00000000000000000000000500030003000000080004000300000008000100", @ANYRES32=0x0, @ANYBLOB="f40002803800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000300000008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e7400000000000000000000000000000500030003000000080004000900000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000900000008000600", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="7c00028040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="080007000000000038000100240001006d636173745f72656a6f696e5f636f756e7400000000000000000000000000000500030003000000080004000000010008000100", @ANYRES32=0x0, @ANYBLOB="640202803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="4000faffffffff98ffff6575655f696400000800000000000000000000000000030003000000080004000000008004000600", @ANYRES32=r4, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000500030003000000080004000700000040000100240001006c625f686173685f737461747300000000000000000000000000000000000000050003000b0000000800040003000000080007000000000040000100240001007072696f72697479000000000000000000000000000000000000000000000000050003000e000000080004000200000008000600", @ANYRES32=r5, @ANYBLOB="38000100240001006d636173745f72656a6f696e5f636f756e740000000000000000000000000000050003000300000008000400080000003c00010024000100757365725f6c696e6b75705f656e61626c65640000000000000000000000000005000300060000000400040008000600", @ANYRES32=r6, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000050003000b000000080004004000000008000600", @ANYRES32=r9, @ANYBLOB="400001002400010071756575655f69640000000000000000000000000000000000000000000000000500030003000000080004001f00000008000600", @ANYRES32=r10, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000050003000300000008000400", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="7c00028038000100240001006e6f746966795f70656572735f698674657276616c000000000000000000f7ff04000300030000000800040080ffffff400001002400010071756575655f6964000000000000000000000000000000000000000000000000050003000300000008000400ff7f000008000600", @ANYRES32=r11, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="400002803c00010024000100656e61626c65640000000000000000000000000000000000000000000000000005000300060000000400040008000600", @ANYRES32=r12, @ANYBLOB], 0x510}, 0x1, 0x0, 0x0, 0x810}, 0x1) ptrace(0x4207, r1) waitid(0x0, r0, 0x0, 0x2, 0x0) 19:50:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) fcntl$setstatus(r0, 0x4, 0x0) [ 2744.768474] 9pnet: Insufficient options for proto=fd [ 2744.803172] 9pnet: Insufficient options for proto=fd 19:50:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x2000000) 19:50:32 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x6000000) 19:50:32 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:50:32 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000340)=""/170, 0xaa}, {0x0}], 0x2, 0x0) fork() 19:50:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB="8000"]) ioctl$SNDRV_TIMER_IOCTL_STATUS32(r0, 0x80585414, &(0x7f00000003c0)) r2 = getpgid(0x0) r3 = dup(0xffffffffffffffff) clone3(&(0x7f0000000340)={0x10020200, &(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000140), {0x2d}, &(0x7f0000000180)=""/16, 0x10, &(0x7f0000000200)=""/189, &(0x7f0000000300)=[r2], 0x1, {r3}}, 0x58) 19:50:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pidfd_open(r0, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c5fd117022318955722304f0c351a48cf00"]) 19:50:32 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x4000000) 19:50:32 executing program 7: r0 = gettid() syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000daf4655fdaf4655f0100ffff53ef010001000000d9f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011500)="ed41000000080000d9f4655fdaf4655fdaf4655f000000000000040004", 0x1d, 0x2200}], 0x0, &(0x7f0000000280)=ANY=[]) chroot(&(0x7f0000000180)='./file0\x00') perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) umount2(&(0x7f0000000140)='./file0\x00', 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) pwrite64(0xffffffffffffffff, &(0x7f0000000200)=';', 0x1, 0x0) ftruncate(r1, 0xffff) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20d315) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) writev(r2, &(0x7f0000000480)=[{0x0}], 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000002180)=ANY=[], 0x78) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000040)) pread64(0xffffffffffffffff, &(0x7f00000000c0)=""/16, 0x10, 0x1100) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/cpuinfo\x00', 0x0, 0x0) ioctl$TIOCCONS(0xffffffffffffffff, 0x541d) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000080)) socket$inet6_udplite(0xa, 0x2, 0x88) dup2(0xffffffffffffffff, 0xffffffffffffffff) waitid(0x0, r0, 0x0, 0x2, 0x0) [ 2745.082919] 9pnet: Insufficient options for proto=fd [ 2745.097748] 9pnet: Insufficient options for proto=fd [ 2745.139138] EXT4-fs (loop7): mounted filesystem without journal. Opts: ,errors=continue [ 2745.154918] EXT4-fs (loop7): re-mounted. Opts: (null) [ 2757.858243] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:50:53 executing program 7: r0 = openat2$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)={0x424182, 0x0, 0x7}, 0x18) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x80) r1 = gettid() waitid(0x2, r1, 0x0, 0x2, 0x0) 19:50:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x7000000) 19:50:53 executing program 2: sendmsg$AUDIT_DEL_RULE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000080)={&(0x7f0000000d80)=ANY=[@ANYBLOB="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"], 0x448}, 0x1, 0x0, 0x0, 0x80}, 0x40810) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r0, 0x8010661b, &(0x7f0000000000)) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r3, 0x29, 0x1b, &(0x7f0000000100)={@private0, r5}, 0x14) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_DEVKEY(r1, &(0x7f0000000540)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000500)={&(0x7f00000004c0)={0x1c, 0x0, 0x300, 0x70bd25, 0x25dfdbfd, {}, [@IEEE802154_ATTR_SHORT_ADDR={0x6, 0x4, 0xaaa1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24000001}, 0x8040000) setsockopt$inet6_mreq(r6, 0x29, 0x1b, &(0x7f0000000100)={@private0, r8}, 0x14) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000580)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000340)={0xd4, 0x0, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@ETHTOOL_A_PAUSE_HEADER={0x7c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dummy0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}]}, @ETHTOOL_A_PAUSE_HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_virt_wifi\x00'}]}, @ETHTOOL_A_PAUSE_TX={0x5, 0x4, 0x1}]}, 0xd4}, 0x1, 0x0, 0x0, 0x1}, 0x400c1) r9 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r2) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000240)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x24, r9, 0x501, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_ENABLED={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r10}]}, 0x24}}, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000240)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r0, @ANYBLOB="b37d035042a993583d", @ANYRES16=r10, @ANYBLOB=',\x00']) copy_file_range(r0, &(0x7f0000000180)=0x100000000, r0, &(0x7f0000000200)=0x5, 0x6, 0x0) 19:50:53 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) r0 = syz_open_dev$vcsa(&(0x7f0000000880), 0x7ff, 0x400) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000a00)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)={0x14, 0x0, 0x20, 0x70bd26, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x8800}, 0x4008000) 19:50:53 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2010, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:50:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x18000000) 19:50:53 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000400)=""/214, 0xd6}], 0x1, 0x0) fork() 19:50:53 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x11040000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x59}, 0x58) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f0000000040)={{0x2, 0x2, 0x0, 0x1, 0xfff}}) [ 2765.644208] 9pnet: Insufficient options for proto=fd 19:50:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0xf6ffffff) 19:50:53 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x290f, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:50:53 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x9000000) 19:50:53 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000400)=""/214, 0xd6}], 0x1, 0x0) fork() 19:50:53 executing program 7: r0 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.log\x00', 0x800, 0x150) ioctl$AUTOFS_IOC_SETTIMEOUT(r0, 0x80049367, &(0x7f0000000180)=0x7ff) setsockopt$inet_group_source_req(r0, 0x0, 0x2f, &(0x7f0000000040)={0x6, {{0x2, 0x4e24, @multicast1}}, {{0x2, 0x4e23, @local}}}, 0x108) r1 = gettid() waitid(0x2, r1, 0x0, 0x2, 0x0) 19:50:53 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x18124a480, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='blkio.bfq.io_service_time\x00', 0x0, 0x0) recvfrom$unix(r1, &(0x7f0000000940)=""/4096, 0x1000, 0x161, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r3, r2) ioctl$FIGETBSZ(r2, 0x2, &(0x7f0000000080)) 19:50:53 executing program 4: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x80, 0x0) signalfd(r0, &(0x7f0000000080)={[0xffffffff]}, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 19:50:53 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0xfffffff6) 19:50:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r1, 0x330b) close(r1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 2765.969309] 9pnet: Insufficient options for proto=fd [ 2765.972620] 9pnet: Insufficient options for proto=fd [ 2781.260223] kmemleak: 27 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:51:17 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xedc0, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:51:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x1000000000000) 19:51:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x10000000) 19:51:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000280)=ANY=[@ANYBLOB="0100000001000055207f80fe25fa", @ANYRES32=r0, @ANYBLOB="8b130000000000002e2f66696c653100"]) clone3(&(0x7f0000000300)={0x200000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x3f}, &(0x7f0000000140)=""/61, 0x3d, &(0x7f0000000180)=""/37, &(0x7f0000000200)=[r1, r1], 0x2, {r2}}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:51:17 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{&(0x7f0000000400)=""/214, 0xd6}], 0x1, 0x0) fork() 19:51:17 executing program 7: gettid() r0 = getpgrp(0x0) r1 = pidfd_open(r0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r3, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r3, 0x330b) ioctl$SG_SET_TIMEOUT(r3, 0x5392, &(0x7f0000000040)=0x4) ioctl$SNAPSHOT_S2RAM(r2, 0x330b) r4 = syz_open_dev$vcsn(&(0x7f0000000000), 0x4, 0x1c1080) openat(r4, &(0x7f0000000080)='./file1\x00', 0x210000, 0xc0) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r6, r5) r7 = accept$packet(r3, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000100)=0x14) fcntl$dupfd(r6, 0xc0a, r7) pidfd_getfd(r1, r2, 0x0) waitid(0x2, r0, 0x0, 0x2, 0x0) 19:51:17 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') fcntl$notify(r0, 0x402, 0xa) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, 0x0, 0x0) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000000, 0x80010, r0, 0x10000000) r2 = syz_io_uring_setup(0x2, &(0x7f0000000500), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff6000/0xa000)=nil, &(0x7f0000000080), &(0x7f0000000140)) r3 = io_uring_setup(0x3ddf, &(0x7f0000000680)={0x0, 0x0, 0x8}) r4 = eventfd(0x0) io_uring_register$IORING_REGISTER_EVENTFD(r2, 0x4, &(0x7f0000000000)=r4, 0x1) r5 = dup2(r3, 0xffffffffffffffff) r6 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) syz_io_uring_submit(0x0, r1, &(0x7f0000000040)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, r0, 0x0, &(0x7f0000000000)='./file0\x00', 0x2c, 0x208000, 0x12345}, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:51:17 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x42, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) r3 = dup(r2) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2, @ANYBLOB="2c008a665d8d125f69f91577b6a38135bd619f87330faae87d7954c8e29d3d2e1720999c400764988158401771f736accca29d17c7737118"]) r4 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000440)={0x0, 0x0}) r6 = getpgrp(0x0) pidfd_open(r6, 0x0) r7 = getpgrp(0x0) pidfd_open(r7, 0x0) r8 = getpgrp(0x0) pidfd_open(r8, 0x0) r9 = getpgrp(r1) clone3(&(0x7f0000000500)={0x80000, &(0x7f0000000040), &(0x7f0000000580), &(0x7f0000000280), {0x3a}, &(0x7f00000002c0)=""/223, 0xdf, &(0x7f00000003c0)=""/116, &(0x7f00000004c0)=[r5, 0x0, r1, r6, r7, r1, r8, r9], 0x8, {r3}}, 0x58) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000180)=""/17) openat$cgroup_subtree(r4, &(0x7f0000000080), 0x2, 0x0) 19:51:17 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x18000000) 19:51:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x8000000000000) 19:51:17 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x80000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:51:17 executing program 7: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000600), 0xffffffffffffffff) ioctl$EVIOCGABS0(r0, 0x80184540, &(0x7f0000000700)=""/117) sendmsg$TIPC_CMD_RESET_LINK_STATS(r0, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x28, r1, 0x10, 0x70bd2c, 0x25dfdbfd, {{}, {}, {0xc, 0x14, 'syz0\x00'}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0x20010004) r2 = gettid() waitid(0x2, r2, 0x0, 0x1, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) rt_sigtimedwait(&(0x7f0000000000)={[0x400]}, &(0x7f0000000040), &(0x7f0000000100)={r3, r4+60000000}, 0x8) r5 = getpgrp(0x0) pidfd_open(r5, 0x0) process_vm_readv(r5, &(0x7f00000004c0)=[{&(0x7f0000000140)=""/160, 0xa0}, {&(0x7f0000000200)=""/211, 0xd3}, {&(0x7f0000000300)=""/198, 0xc6}, {&(0x7f0000000400)=""/41, 0x29}, {&(0x7f0000000440)=""/84, 0x54}], 0x5, &(0x7f0000000580)=[{&(0x7f0000000540)=""/39, 0x27}], 0x1, 0x0) 19:51:17 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:51:17 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x100000000000000) [ 2807.106527] kmemleak: 25 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:51:42 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r2, r1) read(r2, &(0x7f0000000000)=""/10, 0xa) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r3) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYRES32, @ANYRESHEX, @ANYBLOB="74c6"]) 19:51:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x50000000) 19:51:42 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000180)=""/17) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000040)={&(0x7f0000000300)=@allocspi={0x18c, 0x16, 0x200, 0x70bd2b, 0x25dfdbfc, {{{@in=@dev={0xac, 0x14, 0x14, 0x24}, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0x4e24, 0xb6, 0x4e22, 0x800, 0x8, 0x0, 0xa0, 0x33, 0x0, r1}, {@in6=@private1, 0x4d3, 0x6c}, @in=@broadcast, {0x80, 0x1, 0x4b3, 0x200, 0x8, 0x7ff, 0x4, 0x5}, {0x6862, 0x9, 0xfffffffffffffff9, 0x5}, {0x7, 0x8c, 0x6c000}, 0x70bd25, 0x0, 0x2, 0x3, 0x6, 0x5a}, 0x0, 0x1c}, [@algo_auth={0x51, 0x1, {{'sha384-arm\x00'}, 0x48, "6effa0dd93c414214b"}}, @coaddr={0x14, 0xe, @in=@multicast1}, @user_kmaddress={0x2c, 0x13, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, @in=@broadcast, 0x0, 0xa}}]}, 0x18c}, 0x1, 0x0, 0x0, 0x40800}, 0x4890) stat(&(0x7f0000000640)='./file1\x00', &(0x7f0000000680)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wffnm=', @ANYRESHEX, @ANYBLOB=',\x00']) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240), r2) sendmsg$TIPC_CMD_SET_LINK_TOL(r3, &(0x7f0000000540)={&(0x7f0000000200), 0xc, &(0x7f0000000280)={&(0x7f00000004c0)={0x68, r4, 0x200, 0x70bd2c, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0x1, @link='syz1\x00'}}}, ["", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x4000}, 0xf009791e73b62acd) setxattr(&(0x7f0000000580)='./file1\x00', &(0x7f00000005c0)=@known='trusted.overlay.origin\x00', &(0x7f0000000600)='rfdno', 0x5, 0x3) 19:51:42 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:51:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x200000000000000) 19:51:42 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000180)=""/17) sendto$inet(r0, &(0x7f0000000040)="1ad4b204c3f038d23cba16f40049531865f1152346eab5119cf9b643586f7afa198c55d0d6a8548c2201fa5c770f56a70420598d781365639a83130d566e9b03a916d8e1c0cc097f56782b1d01602d69e722553ab982a6ea8938271ce48f0fb4be95fa95e86f0d46e78d9ac9", 0x6c, 0x4, &(0x7f0000000140)={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) r3 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r4, r3) fchown(r3, 0xee01, 0x0) r5 = mq_open(&(0x7f0000000200)='/!:]::]\x00', 0x800, 0x302, &(0x7f0000000240)={0xfffffffffffffffa, 0x10000, 0x7, 0x3}) open_by_handle_at(r5, &(0x7f0000000280)=@FILEID_UDF_WITHOUT_PARENT={0xc, 0x51, {0x40, 0x40, 0x7, 0x7}}, 0x5c1800) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 19:51:42 executing program 7: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x41000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000080)={0x148, 0x3e, 0x400, 0x70bd2d, 0x25dfdbfe, {0x1c}, [@generic="0cc51789c26c0ee212f53cbca864b4a355cfb23129633b293b407764031ac9824150dca27a69ed80de7bb0d8983d49a42951c796d9015df3636b444f5241b707caa91876ec77a502401d07c7bc906ddd9b9a2bb055224624e0df145a600277fa5cebdccd0803805ecfd53fcc3cdbe2ceb2c9b01a5a3c92ab1280c94a4a568723966d4af7fd31ce95ae347d2db611aed2aa33deb6263925c32408a46905534a633f804d85be03a890cc1d29c9cae074d2", @generic="4889988b5642be48d8421aaae71ecb69de57c6893a4a41d778cccc691a489a8f231374607956f725c647262edbd88e2fc75813e76cc8ae0928a26c4f1a9fa70b066580fa50a778b6f7d73c1762b081e6d20686bec6d723194521a0cea040b6a9b526d951981aa2e9d083c3231286f8627fba890a979e4f9f17f6cf", @typed={0x8, 0x40, 0x0, 0x0, @uid}]}, 0x148}, 0x1, 0x0, 0x0, 0x4000000}, 0x8000) r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) 19:51:42 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xe0ffff, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 2814.903133] 9pnet: Insufficient options for proto=fd 19:51:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x75050000) 19:51:42 executing program 5: r0 = getpgrp(0x0) process_vm_readv(r0, &(0x7f0000000300)=[{&(0x7f0000000140)=""/140, 0x8c}, {&(0x7f0000000200)=""/62, 0x3e}, {&(0x7f0000000240)=""/75, 0x4b}, {&(0x7f00000002c0)=""/46, 0x2e}], 0x4, &(0x7f0000000500)=[{0x0}, {&(0x7f0000000400)=""/214, 0xd6}], 0x2, 0x0) fork() 19:51:42 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:51:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x400000000000000) [ 2815.081256] SELinux: duplicate or incompatible mount options [ 2815.090262] SELinux: duplicate or incompatible mount options 19:51:42 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x76050000) 19:51:42 executing program 7: r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) ptrace$setsig(0x4203, r1, 0x81, &(0x7f0000000000)={0x34, 0x7, 0xf5}) 19:51:42 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x1800000000000000) [ 2829.914003] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:52:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0xf6ffffff00000000) 19:52:06 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:52:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r2, 0x330b) ioctl$SNDRV_TIMER_IOCTL_TREAD(r2, 0x40045402, &(0x7f0000000080)) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x4000004, &(0x7f0000000200)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@version_9p2000}, {@debug={'debug', 0x3d, 0x40a5}}]}}) r3 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r3, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r3, 0x330b) openat$cgroup_type(r3, &(0x7f0000000040), 0x2, 0x0) 19:52:06 executing program 2: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000540)=""/28) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000500)={0x1, 0x8, [@dev={'\xaa\xaa\xaa\xaa\xaa', 0xf}, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xe}, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x1c}, @random="a5842d3dc15c", @link_local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @local, @broadcast]}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r2 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x224c800, 0x0) stat(&(0x7f0000001880)='./file0\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000a40), 0x4) fcntl$getownex(r1, 0x10, &(0x7f0000000140)={0x0, 0x0}) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000280)) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r8 = dup(r7) clone3(&(0x7f0000000200)={0x200, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x10}, &(0x7f0000000300)=""/228, 0xe4, &(0x7f0000000400)=""/211, &(0x7f0000000180)=[r3, r2, r6, r2], 0x4, {r8}}, 0x58) ioctl$TUNSETVNETHDRSZ(0xffffffffffffffff, 0x400454d8, &(0x7f0000000580)=0xfffffc01) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB, @ANYRESHEX, @ANYBLOB=',\x00']) 19:52:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x77050000) 19:52:06 executing program 7: r0 = gettid() waitid(0x0, r0, 0x0, 0x2, 0x0) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) sched_rr_get_interval(r1, &(0x7f0000000000)) 19:52:06 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x80, 0x0) signalfd(r0, &(0x7f0000000080)={[0xffffffff]}, 0x8) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 19:52:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r2) ioctl$sock_SIOCGIFINDEX_802154(r1, 0x8933, &(0x7f0000000240)={'wpan1\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000006c0)={0x24, r4, 0x501, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_ENABLED={0x5}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r5}]}, 0x24}}, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d97a12d7423080a7e22df4c3c59a9ebf030a6e74aadcd4b6e40190b9942657e521b702be7ff3f2eee2b5b1da2fc5c512f0bd8f4f260775a4f400eed4ea26a0ddf8ba9a0785c20750300df2b6cec3fd3c575f568d65509361cf35908d872f8b11db07c67f30a9b930ca63a5a0f2f5c1f8a59713af8108979dc2cf8d1933adeb0f1202b5b1ab287", @ANYRESHEX, @ANYBLOB="2c99666401013d", @ANYRES32=r4, @ANYBLOB="2be7"]) [ 2839.172585] SELinux: duplicate or incompatible mount options [ 2839.180232] 9pnet: Insufficient options for proto=fd [ 2839.185562] SELinux: duplicate or incompatible mount options 19:52:06 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000180)=""/17) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='/dev/snapshot\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) 19:52:06 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x3000000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:52:06 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0xf6ffffff) 19:52:06 executing program 7: gettid() r0 = getpgrp(0x0) pidfd_open(r0, 0x0) waitid(0x2, r0, 0x0, 0x2, 0x0) [ 2839.376530] SELinux: duplicate or incompatible mount options 19:52:06 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) signalfd4(r0, &(0x7f0000000000), 0x8, 0x80000) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r2, r1) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, &(0x7f0000000080)) [ 2839.383891] SELinux: duplicate or incompatible mount options 19:52:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c52066403003d", @ANYRESHEX=r1, @ANYBLOB=',\x00']) 19:52:07 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:52:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) [ 2839.476556] 9pnet: Insufficient options for proto=fd [ 2839.492562] 9pnet: Insufficient options for proto=fd 19:52:07 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0xffffe000) [ 2839.555688] 9pnet: Insufficient options for proto=fd [ 2839.561970] SELinux: duplicate or incompatible mount options [ 2839.565552] SELinux: duplicate or incompatible mount options 19:52:07 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) setsockopt$IP_VS_SO_SET_ADDDEST(r0, 0x0, 0x487, &(0x7f00000000c0)={{0x29, @rand_addr=0x64010100, 0x4e22, 0x2, 'ovf\x00', 0x14, 0x8, 0x19}, {@initdev={0xac, 0x1e, 0x0, 0x0}, 0x4e20, 0x3, 0xfb5, 0x1000, 0x3}}, 0x44) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) [ 2851.414032] kmemleak: 23 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 2860.370311] SELinux: duplicate or incompatible mount options [ 2860.374585] SELinux: duplicate or incompatible mount options 19:52:27 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000180)=""/17) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000000)='/dev/snapshot\x00') openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) 19:52:27 executing program 7: r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) ptrace$setsig(0x4203, r0, 0x75, &(0x7f0000000000)={0x4, 0x9, 0xfffffac0}) tkill(r0, 0x4) 19:52:27 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xffffffff}, 0x20, 0xffffffffffff0001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/devices/msr', 0x8200, 0x40) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x5, 0x1, 0xa3, 0xff, 0x0, 0x7ff, 0x50002, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0xffff, 0x1, @perf_config_ext={0x7, 0x9a3}, 0x4, 0x1, 0x9, 0x0, 0x30e, 0x1, 0x7ff, 0x0, 0x1, 0x0, 0x1}, 0xffffffffffffffff, 0x7, r1, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) ioctl$SNAPSHOT_PLATFORM_SUPPORT(r2, 0x330f, 0xce8) 19:52:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) copy_file_range(r0, &(0x7f0000000040)=0x7, r0, &(0x7f0000000080)=0x401, 0x8, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:52:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='net/if_inet6\x00') seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000280)={0x7, &(0x7f0000000240)=[{0x1f, 0x8, 0xff, 0x2}, {0x1000, 0x1, 0x34, 0x7}, {0x401, 0x1, 0x6, 0xcb}, {0x4, 0x1, 0x88, 0x6}, {0x7fff, 0x2c, 0x80, 0x3}, {0x1c12, 0xa9, 0x7, 0x4}, {0xfffa, 0x1f, 0x6, 0x91e}]}) openat$cgroup_ro(r2, &(0x7f0000000200)='blkio.throttle.io_serviced\x00', 0x0, 0x0) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000180)=""/17) execveat(r1, &(0x7f0000000000)='./file1\x00', &(0x7f0000000080)=[&(0x7f0000000040)='$\\\'#{\xad[\'-$$$(\x00'], &(0x7f0000000140), 0x1000) 19:52:27 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0xfffffff6) 19:52:27 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x5000000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:52:27 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x745f01, 0x8) ioctl$SG_SET_TIMEOUT(r0, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c000000060601010000000001000700200005007a32000000000000000000000000006400000000cabde7eba1eb501c4280765cf3539f0922a4f86c9440e5a2f5944b0aaf00c10f2615074caad416adf70805f85fec21a7a02ce3238aaff11a00"/107], 0x3c}, 0x1, 0x0, 0x0, 0x20040080}, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(r1, &(0x7f0000000000)='./file1\x00', 0x6040, 0x10) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x200100) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000600)={0x53, 0xfffffffffffffffd, 0x71, 0x1f, @buffer={0x0, 0x83, &(0x7f0000000400)=""/131}, &(0x7f00000004c0)="23356c2b9d294df2f6d4e27561538a30903afbef69940f2946723f637f22506fe076db32a893b97d2acbaae639c4a229dc4399dbe8837570ae8e86f6266459b8128d10c8a63933a63f6687c1589d5797282e533d9ea4bbfafd5db5440c062893c270bc5194b4e6ea61a3dabc567b898850", &(0x7f0000000540)=""/138, 0x3, 0x16, 0x3, &(0x7f00000002c0)}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="e1ff78b32889e4649920766291fdf6b8c67b85a96033423a26ebec8e6421fcb4cb1820d406a23c486d2bfcbdc097d0587d6ce22f3a991a0a0a0ea8efdc1d231a86a005107153c2f0e02492b39c5b94557fbe7c79986b50e9a47108f0cd88520e7b6a1d202397d0a74678749a8f3202dba69c19f2ff28c3d755ce2a14543e6e571a0255bcbed70d6b871e1b181118596d00"/159]) [ 2860.389460] 9pnet: Insufficient options for proto=fd [ 2860.391115] 9pnet: Insufficient options for proto=fd 19:52:28 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) r0 = syz_open_dev$vcsa(&(0x7f0000000880), 0x7ff, 0x400) sendmsg$DEVLINK_CMD_PORT_SET(r0, &(0x7f0000000a00)={&(0x7f0000000940)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)={0x14, 0x0, 0x20, 0x70bd26, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x8800}, 0x4008000) 19:52:28 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:52:28 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x80000000000) [ 2860.560586] 9pnet: Insufficient options for proto=fd 19:52:28 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0xf9, 0x9, 0x7, 0xfe, 0x0, 0x0, 0x80848, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xa174, 0x2, @perf_config_ext={0x274a, 0x4}, 0x8240, 0x4, 0x4, 0x1, 0x73d5, 0x4, 0x8, 0x0, 0xb71, 0x0, 0x20}, 0xffffffffffffffff, 0x5, r0, 0x8) perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x7, 0x80, 0x40, 0xd7, 0x0, 0x5, 0xc00, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x8, 0xfffffffffffffff7}, 0x4000, 0x7, 0x80, 0x5, 0x4, 0xbd, 0x5, 0x0, 0x7, 0x0, 0x7}, 0x0, 0x4, r0, 0x1) ioctl$SNAPSHOT_SET_SWAP_AREA(r1, 0x400c330d, &(0x7f0000000000)={0x7d, 0xfffffff8}) r2 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_nlink(r2, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) connect$inet6(r3, &(0x7f00000001c0)={0xa, 0x4e22, 0x4, @dev={0xfe, 0x80, '\x00', 0x21}, 0xfffffe01}, 0x1c) [ 2860.567432] SELinux: duplicate or incompatible mount options [ 2860.575867] SELinux: duplicate or incompatible mount options 19:52:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) write(r1, &(0x7f0000000040)="7512359b438ffeda92246f03a9f114b19defac6a12f0bf1772aea5497972a8ed4eef64cd9b1e6461c3b47c081be8c1264f464b67eb2228fa3a5a1bc5b29aa722ee3690970c8fa14947a462f3a962cd61dad6b5472b332a0c55d21339", 0x5c) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0xfffffffd, {0x11, 0x2}}, 0x14}}, 0x0) dup2(r3, r2) r4 = getpgrp(0x0) pidfd_open(r4, 0x0) fcntl$setown(r3, 0x8, r4) 19:52:28 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x745f01, 0x8) ioctl$SG_SET_TIMEOUT(r0, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) sendmsg$IPSET_CMD_SWAP(r0, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="3c000000060601010000000001000700200005007a32000000000000000000000000006400000000cabde7eba1eb501c4280765cf3539f0922a4f86c9440e5a2f5944b0aaf00c10f2615074caad416adf70805f85fec21a7a02ce3238aaff11a00"/107], 0x3c}, 0x1, 0x0, 0x0, 0x20040080}, 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(r1, &(0x7f0000000000)='./file1\x00', 0x6040, 0x10) r2 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x200100) ioctl$SG_IO(r2, 0x2285, &(0x7f0000000600)={0x53, 0xfffffffffffffffd, 0x71, 0x1f, @buffer={0x0, 0x83, &(0x7f0000000400)=""/131}, &(0x7f00000004c0)="23356c2b9d294df2f6d4e27561538a30903afbef69940f2946723f637f22506fe076db32a893b97d2acbaae639c4a229dc4399dbe8837570ae8e86f6266459b8128d10c8a63933a63f6687c1589d5797282e533d9ea4bbfafd5db5440c062893c270bc5194b4e6ea61a3dabc567b898850", &(0x7f0000000540)=""/138, 0x3, 0x16, 0x3, &(0x7f00000002c0)}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="e1ff78b32889e4649920766291fdf6b8c67b85a96033423a26ebec8e6421fcb4cb1820d406a23c486d2bfcbdc097d0587d6ce22f3a991a0a0a0ea8efdc1d231a86a005107153c2f0e02492b39c5b94557fbe7c79986b50e9a47108f0cd88520e7b6a1d202397d0a74678749a8f3202dba69c19f2ff28c3d755ce2a14543e6e571a0255bcbed70d6b871e1b181118596d00"/159]) [ 2860.673836] 9pnet: Insufficient options for proto=fd [ 2860.695188] 9pnet: Insufficient options for proto=fd [ 2874.707498] kmemleak: 25 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:52:51 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x7000000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:52:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x842, 0x10) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:52:51 executing program 7: ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000004c40)={'sit0\x00', &(0x7f0000004bc0)={'syztnl2\x00', 0x0, 0x4, 0x7, 0x4, 0xe12, 0x6, @remote, @mcast2, 0x80, 0x1, 0x2, 0x8}}) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000100)={@private0, r3}, 0x14) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000100)={@private0, r6}, 0x14) r7 = socket$inet6_udplite(0xa, 0x2, 0x88) r8 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r7, 0x29, 0x1b, &(0x7f0000000100)={@private0, r9}, 0x14) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) r11 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r10, 0x29, 0x1b, &(0x7f0000000100)={@private0, r12}, 0x14) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000004c80)={{{@in6=@loopback, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in6}}, &(0x7f0000004d80)=0xe8) sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, &(0x7f0000004f80)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000004f40)={&(0x7f0000000180)={0x144, 0x0, 0x5, 0x70bd29, 0x25dfdc03, {}, [@HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}, @HEADER={0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @HEADER={0x4}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r9}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r0}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r13}]}, @HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'gretap0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_vlan\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vxcan1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x144}, 0x1, 0x0, 0x0, 0x41}, 0x0) gettid() 19:52:51 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r2, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000080), 0x0, &(0x7f0000000240)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[{@loose}, {@cache_fscache}], [{@fsuuid={'fsuuid', 0x3d, {[0x39, 0x34, 0x0, 0x63, 0x65, 0xc6, 0x64], 0x2d, [0x34, 0x65, 0x66, 0x30], 0x2d, [0x64, 0x2da0b966df960fbe, 0x36, 0x64], 0x2d, [0x2c, 0x30, 0x66, 0x30], 0x2d, [0x0, 0x64, 0x34, 0x37, 0x31, 0x31, 0x5d, 0x36]}}}, {@euid_gt={'euid>', r1}}, {@uid_eq={'uid', 0x3d, r2}}, {@obj_type={'obj_type', 0x3d, 'rfdno'}}]}}) fsetxattr$security_evm(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000140)=@md5={0x1, "5a87a5451cabc5fe73921880015d9ea5"}, 0x11, 0x1) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r0, 0x4018f50b, &(0x7f0000000000)={0x0, 0x18000000, 0xffffffff}) [ 2883.901975] SELinux: duplicate or incompatible mount options [ 2883.914367] SELinux: duplicate or incompatible mount options 19:52:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x1000000000000) 19:52:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) execveat(r0, &(0x7f0000000280)='./file1\x00', &(0x7f0000000500)=[&(0x7f00000002c0)='9p\x00', &(0x7f0000000480)='9p\x00', &(0x7f00000004c0)=']^\x00'], &(0x7f00000007c0)=[&(0x7f0000000540)='9p\x00', &(0x7f0000000580)='-$%$-+(\x00', &(0x7f00000005c0)='&\x00', &(0x7f0000000600)='\xff+:$\\&\x00', &(0x7f0000000640)='9p\x00', &(0x7f0000000680)='9p\x00', &(0x7f00000006c0)='9p\x00', &(0x7f0000000700)='9p\x00', &(0x7f0000000740)='\x00', &(0x7f0000000780)='!*\x00'], 0x1000) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000140)=0x0) r4 = getpgrp(0x0) r5 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r5, 0x8018456f, &(0x7f0000000180)=""/17) utimensat(r5, &(0x7f0000000840)='./file1\x00', &(0x7f0000000880)={{0x77359400}, {0x0, 0x2710}}, 0x0) pidfd_open(r4, 0x0) clone3(&(0x7f0000000200)={0xb41ee4476b0ee91a, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x32}, &(0x7f0000000940)=""/4096, 0x1000, &(0x7f0000000300)=""/231, &(0x7f0000000180)=[r1, r1, r2, 0x0, r3, r1, r1, r4], 0x8, {r0}}, 0x58) r6 = fcntl$dupfd(r0, 0x0, r0) readv(r5, &(0x7f0000001c00)=[{&(0x7f0000001940)=""/79, 0x4f}, {&(0x7f00000019c0)=""/171, 0xab}, {&(0x7f0000001a80)=""/63, 0x3f}, {&(0x7f0000001ac0)=""/212, 0xd4}, {&(0x7f0000001bc0)=""/41, 0x29}], 0x5) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r6, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="91803ffa3aa024438a2c00"]) 19:52:51 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000180)=""/17) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x36e63, 0x12) ftruncate(r1, 0x1000003) r2 = dup2(r1, r1) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r1) sendmsg$NL80211_CMD_LEAVE_IBSS(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x28, r3, 0x10, 0x70bd29, 0x25dfdbfc, {{}, {@val={0x8}, @val={0xc, 0x99, {0x1, 0x32}}}}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x4004000}, 0x4000) sendmsg$NL80211_CMD_START_SCHED_SCAN(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000180)={0x174, r3, 0x100, 0x70bd26, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_SCAN_SSIDS={0x44, 0x2d, 0x0, 0x1, [{0xa, 0x0, @default_ap_ssid}, {0xa, 0x0, @default_ap_ssid}, {0x19, 0x0, @random="177883c9310de22205367186d740f45197e3ebbdc7"}, {0xa, 0x0, @default_ibss_ssid}]}, @NL80211_ATTR_SCAN_FREQUENCIES={0xc, 0x2c, 0x0, 0x1, [{0x8, 0x0, 0x400}]}, @NL80211_ATTR_IE={0x103, 0x2a, [@link_id={0x65, 0x12, {@initial, @device_a, @device_b}}, @ht={0x2d, 0x1a, {0x300, 0x3, 0x0, 0x0, {0x1, 0x9, 0x0, 0x161, 0x0, 0x1, 0x1, 0x0, 0x1}, 0x1, 0x2}}, @fast_bss_trans={0x37, 0xcd, {0xb0, 0x5, "ce9a7b18014eb2c66509b62c9a81dba8", "318f4da2085a068d823a9972c9e484e2061f2451e99e4bab50afe1af276e08b5", "f3b775455424cb53c4acf183c569fe190699cf660031e62520fc44ae09313e06", [{0x3, 0x11, "c7e2f4ec57c3d3157371ce2070c914ac5c"}, {0x1, 0x1b, "58573079f327baaf382c4ac24e6344d20da0a4b2455f661df19fa2"}, {0x3, 0x1e, "4dfa7fdc2c98fd3153afa18e8c72af263fc9d172dff045d90cac10d2ce62"}, {0x3, 0x27, "bc578dfe901155ea08db1eb38929318e61b35e2fbf91320d8c1789aa15ab87725e764847a5f252"}, {0x1}]}}]}, @NL80211_ATTR_SCHED_SCAN_RELATIVE_RSSI={0x5, 0xf6, 0x9}, @NL80211_ATTR_MEASUREMENT_DURATION_MANDATORY={0x4}]}, 0x174}}, 0x24048804) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) 19:52:51 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="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", @ANYRESHEX, @ANYBLOB=',\x00']) [ 2883.920622] 9pnet: Insufficient options for proto=fd [ 2883.937913] 9pnet: Insufficient options for proto=fd 19:52:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x8000000000000) 19:52:51 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20000000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:52:51 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r1, r0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r3, r2) close(r2) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000280)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@dfltgid={'dfltgid', 0x3d, 0xee01}}, {@access_any}, {@msize={'msize', 0x3d, 0x6}}, {@cachetag={'cachetag', 0x3d, 'wfdno'}}, {@access_any}, {@aname={'aname', 0x3d, '/'}}]}}) [ 2884.100525] SELinux: duplicate or incompatible mount options [ 2884.110349] SELinux: duplicate or incompatible mount options 19:52:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="740200003d00"/15, @ANYRESHEX=r0, @ANYBLOB="2c7752f66e6f3d5d9cb50dbf45ddd2be27d346a8d4a5b731ab6ea7ab37f02e296004b3d807ddc60dbb17838b643aedebebe1841b610eeeddc13e4267c9f9ec372e384c8897eb0ae5e85efda82a38f69b6e9d65c3763423b415351e01d04c306289617a71e3cfce449cafb1df53ec70b4aca37ef07e58310e3cce134bcd53f194fb97a93c34c3090b943b5b9c2f00dc2871423e3adf4f704f716694310f8cf0260ca1f64f311e17c706e1e45070e4c9a7dc4688bff6dd3c89f2bb618616859ebae12dfe575fc48c0234800d0efbe4cfae4f9f06ef493a5f468a11b2b5994d32356206f27007c92d550c0dbf", @ANYRESHEX, @ANYBLOB=',\x00']) 19:52:51 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0xe0ffff00000000) 19:52:51 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000180)=@abs, 0x6e, &(0x7f00000004c0), 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1c0000000000003a7a22a49d45aa01001db102000000bc4540ca7811dcdb00000000000071933ce0454bae06969dc82fd064a45b0089f346856bc808f2e0aefdc13807e0d39cc0f77783e31d2e1cd1ef676ed563e3d6aef24695ae0f4b8403c503bdadae6bb08cb6f3dd2540ab98ad6f7db5b6d196fbe528e2d15a496276fa2828e3f93bbfd9a87cdff7fae8d90544c1cd111eee3d3fd4a3ab24de6e9919b828d8bd1a5f62744e0f98a2a6e186b63322020d5bd9cee996ed5d298633f4c9a46d", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0100"/20, @ANYRES32, @ANYRES32], 0x38}, 0x40010103) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x3d, 0xfb, 0x0, 0x40, 0x0, 0x6, 0x8538, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x100, 0xfffffffffffffff7, 0xffffffff, 0xb, 0x101, 0x6, 0x4, 0x0, 0x4, 0x0, 0x4}, r0, 0x6, 0xffffffffffffffff, 0x3) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000280)=@l2tp6={0xa, 0x0, 0x0, @private2}, &(0x7f0000000300)=0x80, 0x80000) fsetxattr$security_evm(r1, &(0x7f0000000340), &(0x7f0000000380)=@v1={0x2, "7d76c5c08c4fa52ead"}, 0xa, 0x1) 19:52:51 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f0000000200)={0x44080400, &(0x7f0000000000)=0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080), {0x18}, &(0x7f0000000140)=""/18, 0x12, &(0x7f0000000940)=""/4096, &(0x7f0000000180)=[r1, r1], 0x2, {r0}}, 0x58) copy_file_range(r2, &(0x7f0000000280)=0x3, 0xffffffffffffffff, &(0x7f0000000300)=0x7, 0x80000001, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:52:51 executing program 7: r0 = gettid() ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000080), 0x100000000, 0x400a01) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000180)=""/17) ioctl$TCSBRK(r2, 0x5409, 0x5) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, r1, 0x10, &(0x7f0000000040)={0x9099}) waitid(0x2, r0, 0x0, 0x2, 0x0) 19:52:51 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x20100000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 2898.018176] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:53:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) openat2(r0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000040)={0x101001, 0x6c, 0x1}, 0x18) syz_open_dev$mouse(&(0x7f0000000080), 0x1, 0x400100) 19:53:14 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x290f0000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 2906.493984] 9pnet: Insufficient options for proto=fd 19:53:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x100000000000000) 19:53:14 executing program 7: r0 = gettid() sched_setparam(r0, &(0x7f0000000000)=0xefbb) waitid(0x2, r0, 0x0, 0x2, 0x0) 19:53:14 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000400)=ANY=[@ANYBLOB="140000006a00274e00000000000000000002000002ea3c2bf8a58a2d2a7d12b697de544172f63bf0aeb9b2d542973d413fcb639fe7f9fc78c9b612"], 0x14}}, 0x0) r2 = dup2(r1, r0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001600)={0x0, 0x0, {}, {0x0, @struct, 0x0}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000001240)={&(0x7f0000001180), 0xc, &(0x7f0000001200)={&(0x7f00000011c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="e30027bd7000fddbdf252e0000dcffff00000000000000000000f3ff00000000df83ed26f8bc4520667c3c2ede2ee6cf4291af5821e43ddc77"], 0x24}, 0x1, 0x0, 0x0, 0x4c024}, 0x40024) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000900)={r3, 0x3ff, 0x20}) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000012c0), r1) sendmsg$ETHTOOL_MSG_WOL_SET(r2, &(0x7f0000001500)={&(0x7f0000001280)={0x10, 0x0, 0x0, 0x5aed8b563e1e26bd}, 0xc, &(0x7f00000014c0)={&(0x7f0000001300)={0x190, r4, 0x400, 0x70bd25, 0x25dfdbfe, {}, [@ETHTOOL_A_WOL_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan0\x00'}]}, @ETHTOOL_A_WOL_SOPASS={0xdb, 0x3, "8c2f04e9f8075089cd4e7d2d86ded3f0bb5412561ce388a55d0ca0b436b9909a79704ab4cff9b68fbe172bc1efd94b49af71b1a270e54597417f89df81912823b6c52bddca44eaad8a78bc737ed96ded86891aff9781b44ddc895fc4a116b1a2850f30f63fa6a9d40a0e66c411c9ff59af573f30683b1d2cd6fe17fc3d3fa802638ef508ba99d686041e3b1c359c4073761846b36d33f7d729d5ea2b3dcae9d08577e8d23fd22c6c8db9c2e1b2e8f3fe7b3a072726ed364441e0c4d18a49af98dfa212665af0dda11ed5caa8dee700faebdd03b826da3f"}, @ETHTOOL_A_WOL_MODES={0x38, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1}, @ETHTOOL_A_BITSET_MASK={0x29, 0x5, "e1c3b55074168ece9dd0818cbd08facc6c602b014e9d406d094aa67b6a13f586351302052c"}]}, @ETHTOOL_A_WOL_HEADER={0x50, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macsec0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0x190}, 0x1, 0x0, 0x0, 0x1}, 0x40880) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f0000000440)={r3, 0x7, 0x5, 0x1}) ioctl$BTRFS_IOC_DEV_REPLACE(0xffffffffffffffff, 0xca289435, &(0x7f0000000740)={0x0, 0x1, @start={r3, 0x0, "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", "adb6e55fb22e762c02d98feadefcc8c25d09ee5fdaaa6748cb2642ff6114c64c242a93ed9ea42b6e187ad0964aca96955f5268ceaf401c97194062e1b206f49c4b7c256dfe458d5e37a01b98f7bb020be1dd9e62f0cd4db67d67d25fd3e5c2cb9f166d51e000855d95c0e685f8729368454605542eef48bda704b043ccab1e8145c074b7cfebd957fcde58e00e441dcd699b3dac64db7176518db5068500698cee19daf782920b04e3824928764fae42325fd78ec0bf75875a1a8d8607d0a5f3d3c5a824c142b6639bf7b7e5249f84f33b2b915cea756bbacd9d0cdc4ff3022689557adb9512162db422b7786178f1be0ea96febc103ca398c537ff0c1b0783fd74d605135bfd6dd750c0620b2052b6d9ad11c5ba926e33b8fbcc1d7d8aaf61845e53582156d0abd243f636a36d521e84c8023703e7cb7b3badfa17502d31f77e00118c9e384626300857124fdb4a78a75ea6d0ff1ca0c6962e3cd293d9fdc3cb1e119d0f2e381cf387cc1af86b33a29b9d122a51e56f1e1e09d641432c96fe772fbc0c39f0d4e450506c18d1a50f89133447920e4fd8500328977fa252324472c66e05e9712b85e123e71b62bd4a9ead4f5fca6d479604e8be9e6dba4422a298315dc93a3310fdec4fbd23767b9950607583cf639f8fdd8de8250df403e6d573038afaa5a4b8c4ed231d0c27bd9e7470022f4a09e21ba4de238fe233cba03d8629bdaf386dc6a8487923b7c0447f5fb7cb6df07bcc6219b2314a27b2bb74443c16315d8720a9b5ef4f2c069fc4a0384013b50622174a9d3de15eef003194f15aa29f73f6cb20d9941a6e71c331a0c51aa0c8230d71291fa6fbafa00b39f2855405b4a1f3d68f70e43f1ceac2605613a469f41f47b5a2b4cf57b7b23c34d005f534cbec04a49c40a5bb034afdec95fcf39daca6f04bca5678668e773930fed430e58b17766725cbca14e226fb6272e0524cac9d12be4c935c5e59d459bed9f49014246dda659d6f60f716fdf4d38aa6f7088690b82eceeb6e3743f9ee3863adbc67c0f0be21250f9b636635e245e0cd6f26ee51486cbc2dddb883856c2e565d561da1a7632a9269dcf2b617573eafc363839299bb3fc64c49f1418424ca93bc9c124daa04a722abc93dbfac71aafab7f6e52c0ff4edec568fc01cf105dfe708cd97b16e67438a25df6968e4f68f4d75ebf1914b94336ec9aecc197a8ccab59e39f0a5db7efaeef070675daac05de0dc3275db7f44621a387ca05c9a7561d1ea7207b22566285184f8c59e5b2f9e4354cdf76bdfd3d01fc7eeafc253683fe403fd052a4adf46720a5edf78de5283b99632e7b68a34273dcbea06f785f0e9364e0e73e9bbcb4acb401b2869424f9d616581b23e76433983ab7937386a2a9bd201c6b304b0918d032f4bda4025aefdb176e1f409df409671382822e31888248a5383d"}, [0x2, 0x2c8a, 0x62, 0x101, 0x8, 0x401, 0x4, 0xc000000000000000, 0x7, 0x101, 0x1, 0x3, 0x4, 0x0, 0xff, 0x7, 0x3, 0x5, 0x93c, 0xe5, 0x7, 0x0, 0x1b000000000, 0x8000, 0x81, 0xd8bb, 0x4, 0x0, 0x20, 0x200, 0x200, 0x9, 0x401, 0x5, 0x0, 0x6000, 0xa67, 0x20, 0x4, 0x9, 0x1, 0x401, 0x6, 0x8, 0x1ff, 0x1000, 0x6, 0xbb2, 0x7, 0x8, 0x80, 0x5, 0x81, 0x0, 0x3, 0x0, 0x200000, 0xffff, 0x0, 0x8000, 0xce20, 0x1f, 0x790b, 0x9]}) r5 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000001540), 0x40000, 0x0) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000001580)=0x40000) r6 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r6, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r6, 0x330b) ioctl$SNAPSHOT_ATOMIC_RESTORE(r6, 0x3304) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r1, 0xc400941d, &(0x7f0000000000)={r3, 0x0, 0xce5}) r7 = gettid() waitid(0x2, r7, 0x0, 0x2, 0x0) 19:53:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c7766646e6f3d7570b3950dbfb6b2cdbb8bd283eab564c868129fccd625cee9e441ecf4a4afebcbad15686166614214f9b64e630e55172498bdaa77c83df8d7e6f69a5feafddc", @ANYRESHEX=r1, @ANYBLOB=',\x00']) 19:53:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) open(&(0x7f0000000040)='./file1\x00', 0x143280, 0x110) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) openat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x40, 0x280) 19:53:14 executing program 3: perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20811, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000000), 0xa}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xacb}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) [ 2906.545480] 9pnet: Insufficient options for proto=fd [ 2906.548411] 9pnet: Insufficient options for proto=fd [ 2906.561311] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=35668 comm=syz-executor.5 19:53:14 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:53:14 executing program 3: ioctl$FS_IOC_FIEMAP(0xffffffffffffffff, 0xc020660b, &(0x7f0000000180)=ANY=[@ANYBLOB="ea84ca6a00000000e00100000000000000103900000000100000000000000000003f0000451c980000020000000000000000000000000000000000000200"/91]) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) ioctl$SNAPSHOT_CREATE_IMAGE(r0, 0x40043311, &(0x7f00000000c0)) 19:53:14 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x200000000000000) 19:53:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {0x40000000}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:53:14 executing program 7: r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) get_robust_list(r0, &(0x7f0000000140)=&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, &(0x7f0000000180)=0x18) 19:53:14 executing program 0: clone3(&(0x7f00000008c0)={0x40180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="d51082060952b3666306a1f7144f2100"]) 19:53:14 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:53:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2c77010000003d", @ANYRESHEX=r1, @ANYBLOB=',\x00']) 19:53:14 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) open(&(0x7f0000000040)='./file1\x00', 0x143280, 0x110) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) openat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0x40, 0x280) [ 2906.833292] 9pnet: Insufficient options for proto=fd [ 2906.849193] SELinux: duplicate or incompatible mount options [ 2906.857751] SELinux: duplicate or incompatible mount options [ 2906.894618] 9pnet: Insufficient options for proto=fd [ 2906.912938] 9pnet: Insufficient options for proto=fd [ 2919.204944] kmemleak: 18 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:53:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = open_tree(r0, &(0x7f0000000040)='./file1\x00', 0x80100) accept4$inet(r2, &(0x7f0000000080), &(0x7f0000000140)=0x10, 0x80800) 19:53:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x300000000000000) 19:53:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x1ff, 0x8, 0xf897, 0x0, 0x1}) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:53:35 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = mq_open(&(0x7f0000000080)='/dev/vcs\x00', 0x1, 0x0, &(0x7f0000000140)={0x8, 0xce, 0x2, 0x7fffffff}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000180), 0x0, &(0x7f00000001c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@afid={'afid', 0x3d, 0xfff}}], [{@euid_lt={'euid<', 0xffffffffffffffff}}]}}) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x264480, 0x0) ioctl$TUNGETFEATURES(r1, 0x800454cf, &(0x7f0000000040)) 19:53:35 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:53:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x408100, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r3, r2) sendfile(r3, r1, &(0x7f0000000100)=0x2c, 0x7fffffff) 19:53:35 executing program 5: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x100000000000000) 19:53:35 executing program 7: r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) r1 = gettid() ptrace$setsig(0x4203, r1, 0xfffffffffffff821, &(0x7f00000000c0)={0x24, 0x4, 0x7ff}) waitid(0x2, r0, 0x0, 0x8, &(0x7f0000000000)) [ 2927.531887] 9pnet: Insufficient options for proto=fd 19:53:35 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffe000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:53:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x400000000000000) 19:53:35 executing program 5: r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) get_robust_list(r0, &(0x7f0000000140)=&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, &(0x7f0000000180)=0x18) 19:53:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000140), 0x102, 0x0) recvmmsg(r0, &(0x7f0000004480)=[{{&(0x7f0000000200)=@vsock={0x28, 0x0, 0x0, @my}, 0x80, &(0x7f0000000180)=[{&(0x7f0000000300)=""/223, 0xdf}, {&(0x7f0000000940)=""/4096, 0x1000}, {&(0x7f0000001940)=""/4096, 0x1000}], 0x3, &(0x7f0000000400)=""/91, 0x5b}, 0x1}, {{&(0x7f0000000480)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x0, 0x0, @private1}}, 0x80, &(0x7f0000000780)=[{&(0x7f0000000280)=""/14, 0xe}, {&(0x7f0000000500)=""/14, 0xe}, {&(0x7f0000000540)=""/109, 0x6d}, {&(0x7f00000005c0)=""/163, 0xa3}, {&(0x7f0000000680)=""/105, 0x69}, {&(0x7f0000000700)=""/120, 0x78}], 0x6, &(0x7f0000000800)=""/136, 0x88}, 0x1}, {{&(0x7f0000002940)=@un=@abs, 0x80, &(0x7f0000003e00)=[{&(0x7f00000029c0)=""/4096, 0x1000}, {&(0x7f00000039c0)=""/188, 0xbc}, {&(0x7f0000003a80)=""/227, 0xe3}, {&(0x7f0000003b80)=""/252, 0xfc}, {&(0x7f0000003c80)=""/74, 0x4a}, {&(0x7f0000003d00)=""/246, 0xf6}], 0x6, &(0x7f0000003e80)=""/129, 0x81}, 0x4b}, {{&(0x7f0000003f40)=@ieee802154={0x24, @short}, 0x80, &(0x7f0000004140)=[{&(0x7f0000003fc0)=""/84, 0x54}, {&(0x7f0000004040)=""/117, 0x75}, {&(0x7f00000040c0)=""/75, 0x4b}], 0x3, &(0x7f0000004180)=""/231, 0xe7}, 0x1954}, {{&(0x7f0000004280)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, 0x80, &(0x7f0000004400)=[{&(0x7f0000004300)=""/9, 0x9}, {&(0x7f0000004340)=""/189, 0xbd}], 0x2, &(0x7f0000004440)=""/64, 0x40}, 0x7}], 0x5, 0x2000, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080), 0x2802c21, &(0x7f0000004700)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',version=9p2000.L,func=POLICY_CHECK,measure,smackfsdef=^,dont_appraise,uid<', @ANYRESDEC=0xee00, @ANYBLOB=',fowner=', @ANYRESDEC=0x0, @ANYBLOB="2ce1707072636973651d7052723d30303030b03030303030303030010000000000000000ccd6d6d6ef583e6ab0aa4849d92945ece699f9fe489525f68bed0b9326b3f818f8dbfbdd5936af1cb7a66c100583f32c873b1f81cd1ce6f4cc43d716b3040b73825abe72516fe83634a266"]) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 19:53:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000140)=0x0) r4 = fork() r5 = getpgrp(0x0) pidfd_open(r5, 0x0) clone3(&(0x7f0000000400)={0x10000, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x32}, &(0x7f0000000300)=""/203, 0xcb, &(0x7f0000000200)=""/140, &(0x7f0000000180)=[r1, r2, r3, r1, r4, r5, r1, r1], 0x8, {r0}}, 0x58) 19:53:35 executing program 3: nanosleep(&(0x7f0000000100), &(0x7f0000000180)) getsockopt$sock_timeval(0xffffffffffffffff, 0x1, 0x15, &(0x7f0000000000), &(0x7f00000000c0)=0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) [ 2927.877008] 9pnet: Insufficient options for proto=fd [ 2941.217775] kmemleak: 33 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:53:58 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:53:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x500000000000000) 19:53:58 executing program 4: clone3(&(0x7f00000008c0)={0x3862100, 0x0, 0x0, 0x0, {0x19}, 0x0, 0xfdde, 0x0, 0x0}, 0x58) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) r1 = socket$inet6(0xa, 0x800, 0x5) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, r1, 0x9, 0x9, 0x8000, 0x2}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}}) 19:53:58 executing program 7: r0 = gettid() r1 = getpgid(0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000300)=0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)=0x0) r4 = getpgrp(r1) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000380)={0x0, 0x0}) r6 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r6, 0x8018456f, &(0x7f0000000180)=""/17) clone3(&(0x7f0000000400)={0x100001200, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200), {0x1e}, &(0x7f0000000240)=""/90, 0x5a, &(0x7f00000002c0)=""/41, &(0x7f00000003c0)=[r1, r2, r1, r0, r3, r1, r0, r4, 0x0, r5], 0xa, {r6}}, 0x58) r7 = getpgrp(0x0) pidfd_open(r7, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000140)={0xffffffffffffffff, 0x400, 0x101, 0x100000001}) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x40, 0x7, 0x81, 0x80, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={&(0x7f0000000080), 0xf}, 0x10b08, 0x100, 0xd9b, 0x4, 0x2, 0x5, 0x3, 0x0, 0x3, 0x0, 0x7}, r7, 0x6, r8, 0x1) r9 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000100)={@private0, r10}, 0x14) getsockopt$inet_mreqn(r8, 0x0, 0x24, &(0x7f0000000b00)={@remote, @local, 0x0}, &(0x7f0000000b40)=0xc) sendmsg$TEAM_CMD_OPTIONS_GET(r8, &(0x7f0000001580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001540)={&(0x7f0000000b80)={0x9b0, 0x0, 0x100, 0x70bd28, 0x25dfdbff, {}, [{{0x8}, {0x278, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3f}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xfff}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x6, 0x3, 0x81, 0x1000}, {0x7, 0x9, 0x5, 0xc073}, {0x8, 0x3, 0x0, 0x8}, {0x1c, 0x5, 0x1, 0x4}]}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}, {{0x8}, {0xf8, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xffffffe0}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x5}}, {0x8}}}]}}, {{0x8}, {0xb0, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xff}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}]}}, {{0x8}, {0x1d8, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3b91}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x3}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x1}}, {0x8}}}]}}, {{0x8}, {0x224, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x80000000}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x2e59}}, {0x8}}}, {0x3c, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0xc, 0x4, [{0x4, 0xff, 0x3, 0x2}]}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0xa2a}}}]}}, {{0x8}, {0x40, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r10}, {0x108, 0x2, 0x0, 0x1, [{0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x4, 0x6, 0x7f}, {0xff, 0x0, 0x81, 0x1f}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8}}, {0x8}}}]}}]}, 0x9b0}, 0x1, 0x0, 0x0, 0x1000c004}, 0x4000040) rt_sigqueueinfo(r1, 0x1f, &(0x7f0000000000)={0x3a}) waitid(0x2, r0, 0x0, 0x2, 0x0) 19:53:58 executing program 5: r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) get_robust_list(r0, &(0x7f0000000140)=&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, &(0x7f0000000180)=0x18) 19:53:58 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000180)=""/17) r1 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f00000001c0)='./file1\x00', 0x9, 0x3, &(0x7f0000000440)=[{&(0x7f0000000200)="5c2603162235b7e7cbf9c2a47f85477722167971fa179333fa07f881468fdd88f38197b9afda96456de6eaa0414687dee0111c6161e7edde4f31b9b333c0e24fd68e2ae99a041e857c2b3db1d99847ccc2316d75dd662dc8af4a77bcc5b8208cc5e8f662472a9485aec18a4c61bf30a096e96c8a23c8c7de263d775970ff131036a7a62328e29b9b680b707f13b4a25638ea4f5a8a20a10a40b1d1a454ee80bb5f469ea8b485abba6227e35fb7a662864458c19e7612fd2aa68fd709a8194f908cd4ead99e62696f546669506c225a1e", 0xd0, 0x7}, {&(0x7f0000000300)="54208fd5fa1c7400a2a644240a4a158b29f8bf8234951a284559eacc42e36624a005252950c21c4edce2ffc5317432e87abf19368d2c21c80113ead4c553c7781dbe4705e920a7923e35e2a4751c60873b988ced5b678630ea878492f0859f2c7731e06897dce74a0632a69c55", 0x6d, 0x2}, {&(0x7f0000000380)="8deaa0e29b0b9f537679025b08640d6df11409b075b5a613d657719a4c599fb1fc931ebaa2415c5266aafbd0c918aa84c19686ef73895f15808172935d6cbe8c5c0c7efd237d555bb0581fb44f4ebe1452f88115e380f392007123d553ddb76abcc6474ce42623593f475afcf5abb847aad98d44eb238a30a1ff2f87cc71cd5092e17ec029138cda00a37cf808922b36ed7066e555b10369ff27139ec76ab908517021f61caf45ccbc02", 0xaa, 0x7fff}], 0x9000, &(0x7f00000004c0)={[{@fat=@nfs}, {@dots}, {@nodots}, {@nodots}, {@dots}, {@fat=@dmask={'dmask', 0x3d, 0x8}}], [{@subj_user}, {@subj_role={'subj_role', 0x3d, 'rfdno'}}]}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000000), 0x41042, &(0x7f0000000540)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cache_loose}, {@access_uid={'access', 0x3d, 0xee01}}]}}) 19:53:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r1, r0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000080), 0x0, &(0x7f0000000000)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@privport}]}}) 19:53:58 executing program 3: syz_io_uring_setup(0x5efe, &(0x7f00000000c0)={0x0, 0xb331, 0x8, 0x0, 0x245}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000000), &(0x7f0000000180)) r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) [ 2951.068249] 9pnet: Insufficient options for proto=fd 19:53:58 executing program 5: r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) get_robust_list(r0, &(0x7f0000000140)=&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, &(0x7f0000000180)=0x18) 19:53:58 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:53:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x600000000000000) 19:53:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r1, 0x8018456f, &(0x7f0000000180)=""/17) inotify_add_watch(r1, &(0x7f0000000040)='./file1\x00', 0x100) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) ioctl$SNDRV_TIMER_IOCTL_CONTINUE(r0, 0x54a2) 19:53:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat(r0, &(0x7f0000000140)='./file1\x00', 0x200, 0x52) r2 = creat(&(0x7f0000000080)='.\x00', 0x6) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000000)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@loose}, {@cache_none}, {@aname={'aname', 0x3d, 'rfdno'}}]}}) r3 = openat$cgroup_pressure(r1, &(0x7f0000000180)='memory.pressure\x00', 0x2, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000200)={0x401, 0x4, 0xfffffffb, 0x80000001, 0x400}) 19:53:58 executing program 5: r0 = gettid() get_robust_list(r0, &(0x7f0000000140)=&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, &(0x7f0000000180)=0x18) 19:53:58 executing program 0: getgroups(0x2, &(0x7f0000000100)=[0x0, 0xee01]) setgroups(0x5d, &(0x7f00000000c0)) socket$inet_icmp(0x2, 0x2, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) sendto$inet(0xffffffffffffffff, &(0x7f0000000000)="790d7c9046c52db1fb32ca1b2a50f53606ad9080b08c96c407493b249890711dc72eed8faf411855", 0x28, 0x1, &(0x7f0000000040)={0x2, 0x4e20, @rand_addr=0x64010100}, 0x10) 19:53:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x700000000000000) [ 2951.400052] 9pnet: Insufficient options for proto=fd 19:53:59 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 2951.419820] 9pnet: Insufficient options for proto=fd 19:53:59 executing program 5: get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, &(0x7f0000000180)=0x18) 19:53:59 executing program 7: gettid() r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000040)=0x0) r2 = getpgrp(0x0) pidfd_open(r2, 0x0) waitid(0x3, r1, 0x0, 0x20000000, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) openat(r3, &(0x7f0000000080)='./file1\x00', 0x100, 0x7f) 19:53:59 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000000000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:53:59 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x900000000000000) 19:53:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) r1 = openat$cgroup_ro(r0, &(0x7f0000000000)='pids.current\x00', 0x0, 0x0) pidfd_getfd(r0, r1, 0x0) 19:53:59 executing program 5: get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, &(0x7f0000000180)=0x18) [ 2951.641773] 9pnet: Insufficient options for proto=fd [ 2964.332160] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 2973.954240] 9pnet: Insufficient options for proto=fd 19:54:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) newfstatat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) r3 = getuid() mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x2030022, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [{@euid_gt={'euid>', r1}}, {@euid_eq={'euid', 0x3d, r3}}]}}) lchown(&(0x7f0000000000)='./file1\x00', r3, r2) 19:54:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r3, r2) fallocate(r3, 0x0, 0x6, 0x9) 19:54:21 executing program 5: get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, &(0x7f0000000180)=0x18) 19:54:21 executing program 0: r0 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000000), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="7472616e733d66642c7276646e6f3df2d3374ca98d6f8f9546f1ecf80a1320f6df7ff683fe48a87b7174febf16b5c79a2022e83dceb4058999af", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r1, 0x330b) r2 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r2, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r2, 0x330b) lseek(r2, 0xfffffffffffffff4, 0x1) 19:54:21 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r0, 0x8018456f, &(0x7f0000000180)=""/17) accept(r0, &(0x7f0000000240)=@qipcrtr, &(0x7f00000002c0)=0x80) waitid$P_PIDFD(0x3, r0, &(0x7f00000000c0), 0x4, &(0x7f0000000180)) r1 = getpgrp(0x0) r2 = pidfd_open(r1, 0x0) r3 = getpgrp(0x0) pidfd_open(r3, 0x0) r4 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r4, 0x8018456f, &(0x7f0000000180)=""/17) clone3(&(0x7f0000000640)={0x0, &(0x7f0000000380), &(0x7f00000003c0), &(0x7f0000000400), {0x3f}, &(0x7f0000000440)=""/249, 0xf9, &(0x7f0000000540)=""/163, &(0x7f0000000600)=[r1, r3, 0x0], 0x3, {r4}}, 0x58) fork() perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) perf_event_open$cgroup(&(0x7f0000000300)={0x0, 0x80, 0x4, 0x80, 0x8, 0x1, 0x0, 0x5, 0x20200, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x80000000, 0x6, @perf_config_ext={0x1f, 0x1266}, 0x304, 0x1ff, 0xffffffe0, 0x2, 0x2, 0x1, 0x3, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, r2, 0x3, r0, 0x0) 19:54:21 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xe0ffff00000000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:54:21 executing program 7: r0 = gettid() process_vm_readv(r0, &(0x7f00000012c0)=[{&(0x7f0000000080)=""/8, 0x8}, {&(0x7f00000000c0)=""/32, 0x20}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/88, 0x58}, {&(0x7f0000001180)=""/203, 0xcb}, {&(0x7f0000001280)=""/4, 0x4}], 0x6, &(0x7f0000001440)=[{&(0x7f0000001340)=""/222, 0xde}], 0x1, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) waitid(0x0, r1, 0x0, 0x8, 0x0) r2 = getpgid(r0) getpgid(r2) 19:54:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x1000000000000000) 19:54:21 executing program 5: gettid() get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, &(0x7f0000000180)=0x18) 19:54:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x1800000000000000) 19:54:21 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:54:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000000), 0x1, 0x200040) writev(r0, &(0x7f0000000200)=[{&(0x7f0000000940)="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", 0x1000}, {&(0x7f0000000040)="e58230ceaa3e475de590de8bf1a7fcd200efad80aa1166634fe44b79c010eb48b8db07a42d64a606d1f883e6a529aaed1b3d0a623115", 0x36}, {&(0x7f0000000140)="daebb4435498b26027120e4160342da8c81f6e3ce99d3638c65870950c6546e2dab99a69d3ccc472ebb9a1f5ca6e60599989090fce6a978b8a90e2c0818e54dc77d1d4cbc7ccc8c57c77f844d28eb8de16abd413db2a4b12332a0819b81e7a2a197c8b649e89d30402445aebd7b5783a80f1d89cad218109c469edf1ba1509689d37", 0x82}, {&(0x7f0000000080)="69c7fb357e1b74f360da8648d18c8cd296e2713f3385c66b9b613090ee77eb9b7491ad5839afb88c4b959ef6991897b1671ac28d13362ea4e42406838b5273a4e30310c63986b35251033bb24d7f2b3470d5b7f663dbe87661d6b50f15d1dfabf5dce7fe8d1acb2ed32b", 0x6a}], 0x4) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 19:54:21 executing program 7: sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB="2800000022e8776e1a58f33dfc9ff0cdd5929a81e454f08b432058cd996aecc8132d8e307a6c8ebc52e973700017f9c711737a49b867db75d3b4e568fabe800ab207cda662640588adb4ca6662d36458a6e1f5cb686eb668af66bbbc8b894bbca48124f6ceba5fd4a0315196e66c84939f8ac3a8a2f4ce1c0200f27ce4c7bc9e271acc92992a5920568294", @ANYRES16=0x0, @ANYBLOB="000125bd7000fedbdf25110000000c009900ffff00001e00000006001a0103000000"], 0x28}, 0x1, 0x0, 0x0, 0x44000}, 0x0) r0 = gettid() waitid(0x0, r0, 0x0, 0x2, 0x0) r1 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000), 0xabb249e06d5ea9f0, 0x0) waitid(0x0, r0, &(0x7f0000000180), 0x1, &(0x7f0000000200)) fcntl$getown(r1, 0x9) 19:54:21 executing program 5: gettid() get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, &(0x7f0000000180)=0x18) 19:54:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x17) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d46d188457a456db1", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) io_cancel(0x0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x6, 0xb28, r0, &(0x7f0000000040)="9a27ad5124977620fa36cdb20c561739b35b5fff89d874", 0x17, 0x100000000, 0x0, 0x5, r0}, &(0x7f0000000140)) 19:54:21 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:54:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x81d42, 0x0) ioctl$BTRFS_IOC_SCRUB_CANCEL(r1, 0x941c, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x183003) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 19:54:21 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x5000000000000000) [ 2974.275567] 9pnet: Insufficient options for proto=fd [ 2987.438015] kmemleak: 24 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:54:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$SG_SET_TIMEOUT(r0, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r0, 0x330b) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000080)={0x400, 0x9, 0x40, &(0x7f0000000040)="8d720e278ab20eee0b978ad85c7b01743673d92fcef3d12811be223eada9120463859868eff87dd4ff08b10222392c68cbcb588e8af6891e4c386342d5ae706c"}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}}) 19:54:45 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x4ac00, 0x0) 19:54:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) readlinkat(r0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000300)=""/172, 0xac) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r1 = fsopen(&(0x7f0000000140)='xfs\x00', 0x1) ioctl$BTRFS_IOC_SET_FEATURES(r1, 0x40309439, &(0x7f0000000180)={0x1, 0x3, 0x9}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r0, 0xc018937b, &(0x7f0000000040)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01}}, './file1\x00'}) write$binfmt_script(r2, &(0x7f0000000080)={'#! ', './file1', [{0x20, 'trans=fd,'}, {0x20, 'wfdno'}], 0xa, "d93807a597868dd6992f8c95"}, 0x27) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:54:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x7505000000000000) 19:54:45 executing program 5: gettid() get_robust_list(0x0, &(0x7f0000000140)=&(0x7f0000000100)={&(0x7f0000000040)={&(0x7f0000000000)}, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)}}, &(0x7f0000000180)=0x18) 19:54:45 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:54:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7472617266646e6f3d51046c6616a651e6169339345ac40ea76dee682beb52393c7d93f54eb9df2e35ed0c9deacafb3b8dbd72", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) 19:54:45 executing program 7: r0 = gettid() r1 = getpgrp(0x0) pidfd_open(r1, 0x0) timer_create(0x1, &(0x7f0000000000)={0x0, 0x1b, 0x2, @thr={&(0x7f0000000080)="77c1ce70e964ed67fb8fd2af20f3b82095678a96b09f28bbbdeffdb897651e57d1b30b07414cb016880d7e4708e063ec03c0b2a676c34f1d435c31a3f9abe90b55dc5e172bf290b2123e73513a0b2dd9610924cdcab209c30988d0b5dfa7953381edef353fea1874f341793602e29909e5cd5714c983dd4a01364907b81ee50250ca1fe3e1da284cc89aeef6f8ca05fdfc0c3a1a5b83832a0297ef6bf26005a3fbe944884dbd02431926730987a566b87c811308136b61fea8bcb850a8a6a7b1416d7fd8", &(0x7f0000000180)="d26361c5c789d22ca18e6c3de4aa3ed2b4bf0de34b827ccd282c637db44030c4be9e74e8ddb70ba3e0cd7f244a9fc660210c1259d646bb3dd9d2540662bf5ece5fcb7ab05a7caec54d94b5e49e23b05869ece3a0456bfe990212d27ad5c4e00ffbc48181e67b925ec2508e6186c798900649d237411faa74fb6b9e85e93d68ea9a8269d042dd437c9f997cc8749a1dc5f624309c3335de8cb3328ca58e5c72e4a1911157630305e327e6a6e8c2c3feecaca6e8e2edd3e73130f6574943f4758185a70b497346320a8935cf5010da4d68eda1052dedbf946ca70c210d1220f587927def7b62de284c9822f8d76f98"}}, &(0x7f0000000040)) waitid(0x2, r0, 0x0, 0x2, 0x0) 19:54:45 executing program 5: r0 = gettid() get_robust_list(r0, 0x0, &(0x7f0000000180)) 19:54:45 executing program 3: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x20, 0x0, 0x3, 0x2, 0x0, 0x6, 0x48800, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0xcbc, 0x4, @perf_bp={&(0x7f0000000000), 0x5}, 0x400, 0x7, 0x10000, 0x8, 0xff, 0x4, 0x0, 0x0, 0xbc, 0x0, 0x8}, 0x0, 0x10, r0, 0xa) r1 = getpgrp(0x0) pidfd_open(r1, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x20, 0x1, 0xdd, 0x0, 0x6, 0x20000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x1ff}, 0xc80, 0x1, 0x13ce, 0x3, 0x10001, 0xfffe0000, 0x401, 0x0, 0x30, 0x0, 0x8}, r1, 0x1, 0xffffffffffffffff, 0x1) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) 19:54:45 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x7605000000000000) 19:54:45 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) [ 3015.348188] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:55:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) r1 = syz_open_dev$mouse(&(0x7f0000000040), 0x10001, 0x40000) ioctl$SNDRV_TIMER_IOCTL_SELECT(r1, 0x40345410, &(0x7f0000000080)={{0x0, 0x2, 0x1, 0x0, 0x3ff}}) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x1328004, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r0}}) 19:55:12 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:55:12 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4400) r1 = syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r1, 0xa, 0x0, r2) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_FSYNC={0x3, 0x0, 0x0, @fd_index=0x9, 0x0, 0x0, 0x0, 0x1, 0x0, {0x0, r2}}, 0xfffffffe) r3 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000100), 0xffffffffffffffff) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_mreq(r4, 0x29, 0x1b, &(0x7f0000000100)={@private0, r6}, 0x14) sendmsg$MPTCP_PM_CMD_GET_LIMITS(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="4800e30e", @ANYRES16=r3, @ANYBLOB="02002dbd7000fddbdf250600000008000300070000002c00018008000300640101010800060000000000060001000a00000008000700", @ANYRES32=r6, @ANYBLOB="0600010064730000"], 0x48}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) 19:55:12 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) sendfile(r1, r0, &(0x7f0000000000)=0x8, 0x12) 19:55:12 executing program 7: r0 = gettid() waitid(0x2, r0, 0x0, 0x2, 0x0) process_vm_readv(r0, &(0x7f0000004340)=[{&(0x7f0000000000)=""/4096, 0x1000}, {&(0x7f0000001000)=""/141, 0x8d}, {&(0x7f00000010c0)=""/172, 0xac}, {&(0x7f0000001180)=""/4096, 0x1000}, {&(0x7f0000002180)=""/4096, 0x1000}, {&(0x7f0000003180)=""/42, 0x2a}, {&(0x7f00000031c0)=""/155, 0x9b}, {&(0x7f0000003280)=""/108, 0x6c}, {&(0x7f0000003300)=""/51, 0x33}, {&(0x7f0000003340)=""/4096, 0x1000}], 0xa, &(0x7f0000004880)=[{&(0x7f0000004400)=""/7, 0x7}, {&(0x7f0000004440)=""/163, 0xa3}, {&(0x7f0000004500)=""/168, 0xa8}, {&(0x7f00000045c0)=""/174, 0xae}, {&(0x7f0000004680)=""/163, 0xa3}, {&(0x7f0000004740)}, {&(0x7f0000004780)=""/138, 0x8a}, {&(0x7f0000004840)=""/63, 0x3f}], 0x8, 0x0) 19:55:12 executing program 5: r0 = gettid() get_robust_list(r0, 0x0, &(0x7f0000000180)) 19:55:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x7705000000000000) [ 3024.843796] 9pnet: Insufficient options for proto=fd 19:55:12 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:55:12 executing program 5: r0 = gettid() get_robust_list(r0, 0x0, &(0x7f0000000180)) 19:55:12 executing program 2: r0 = getpgrp(0x0) pidfd_open(r0, 0x0) r1 = getpgrp(0x0) r2 = gettid() pidfd_open(r2, 0x0) pidfd_open(r1, 0x0) rt_tgsigqueueinfo(r0, r1, 0x1b, &(0x7f0000000300)={0x2, 0x9, 0x7fffffff}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = socket$nl_sock_diag(0x10, 0x3, 0x4) r5 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000080), 0x101300, 0x0) r8 = syz_open_dev$vcsa(&(0x7f0000000180), 0x80000001, 0x2a02) pidfd_getfd(r7, r8, 0x0) sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)={0x14, 0x6a, 0x878c5bf8df414e27, 0x0, 0x0, {0x0, 0x2}}, 0x14}}, 0x0) dup2(r6, r5) dup2(r4, r5) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB='-!']) [ 3037.470882] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 19:55:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0xf6ffffff00000000) 19:55:35 executing program 3: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x4ec00, 0x0) fallocate(r0, 0x0, 0x97c, 0xfff) 19:55:35 executing program 7: r0 = gettid() perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x7f, 0x91, 0x1, 0x99, 0x0, 0x80000000, 0x80180, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000000), 0x5}, 0x2080, 0x1000, 0x101, 0x0, 0xe57, 0xb, 0x1, 0x0, 0xfffffffe, 0x0, 0x5}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x2) waitid(0x2, r0, 0x0, 0x2, 0x0) 19:55:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) openat(r0, &(0x7f0000000000)='./file1\x00', 0x101000, 0xa0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}}) r1 = openat(0xffffffffffffff9c, &(0x7f0000004c40)='./file1\x00', 0x84e00, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000140)={0x2, 0x7fffffff, 0x8, 0x7fff, 0x40}) ioctl$SG_SET_TIMEOUT(r1, 0x5392, &(0x7f0000000040)) ioctl$SNAPSHOT_S2RAM(r1, 0x330b) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000080), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_client}, {@aname={'aname', 0x3d, '9p\x00'}}], [{@fsuuid={'fsuuid', 0x3d, {[0x63, 0x63, 0x36, 0x34, 0x38, 0x30, 0x34, 0x32], 0x2d, [0x0, 0x66, 0x30, 0x35], 0x2d, [0x36, 0x65, 0x65, 0x61], 0x2d, [0x36, 0x62, 0x32, 0x66], 0x2d, [0x32, 0x36, 0x62, 0x39, 0x34, 0x63, 0x36, 0x34]}}}, {@smackfstransmute}, {@dont_hash}]}}) r2 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r2, 0x8018456f, &(0x7f0000000180)=""/17) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000300)="0fd674728e4c354cb1d4982e2e030cbb4485c29c3f8a76429dabc7e266fad1e16a1a63c9d3f95b6626c64f25a045a5ba6e947a9f114240b33886537701d2ba934e49eff8a85b1ebe6896d7b03c1859cdc709e2f31fb233fa338375e1b59059bf870d8adf9031067097a4deb3b6047bc5ff01e552811a023474649ce5a8a255f2e0f188b8f40458e4f176ccfa89569be3c9c9d5b7845c271e9ceb38fb12b0f846c2ec294bec0fcd97c2dbd7bccb34ee3eb18feda998cc07659fc4811801e645ff44bacac9d92a8e7294cf4a3ccd3ce23cc96c923dfc3cd0f058997f20c30c5082bcd446948985cb879df5f95148c98ac64fd3cbe21ff86467139caa011840b733") 19:55:35 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:55:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) clone3(&(0x7f00000008c0)={0x3040700, 0x0, 0x0, 0x0, {0x3a}, 0x0, 0x0, 0x0, 0x0, 0xfffffc80, {r1}}, 0x58) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x42a040, 0x0) fallocate(r2, 0x64, 0x6, 0x2) r3 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x1) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r3}}) [ 3048.017505] 9pnet: Insufficient options for proto=fd 19:55:35 executing program 5: r0 = gettid() get_robust_list(r0, &(0x7f0000000140)=0x0, &(0x7f0000000180)) 19:55:35 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) r3 = getpid() r4 = getpgrp(0x0) r5 = pidfd_open(r4, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000200)=@abs, 0x6e, &(0x7f0000000740)=[{&(0x7f0000000280)=""/32, 0x20}, {&(0x7f0000000500)=""/134, 0x86}, {&(0x7f00000005c0)=""/198, 0xc6}, {&(0x7f00000006c0)=""/80, 0x50}], 0x4, &(0x7f00000009c0)=ANY=[@ANYBLOB="2800000000000000010034cf9e8c0000821db3e15010f89e4a800ee4a64fb150de12c49e1b", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x48}, 0x41) r7 = getpgrp(0x0) pidfd_open(r7, 0x0) r8 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x100000000, 0x100) ioctl$EVIOCGABS2F(r8, 0x8018456f, &(0x7f0000000180)=""/17) pidfd_send_signal(r5, 0x14, &(0x7f0000000780)={0x20, 0x8, 0x2}, 0x0) clone3(&(0x7f0000000940)={0x0, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0xf}, &(0x7f0000000300)=""/197, 0xc5, &(0x7f0000000400)=""/216, &(0x7f0000000840)=[r1, r1, r2, r3, r4, r1, 0xffffffffffffffff, r1, r6, r7], 0xa, {r8}}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)) 19:55:35 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:55:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0xffffffff00000000) 19:55:35 executing program 5: r0 = gettid() get_robust_list(r0, &(0x7f0000000140)=0x0, 0x0) 19:55:35 executing program 7: r0 = gettid() waitid(0x1, r0, &(0x7f0000000000), 0xe0000009, &(0x7f0000000080)) ptrace(0x10, 0x0) ptrace$setsig(0x4203, r0, 0x4, &(0x7f0000000140)={0x8, 0x6, 0xfffffffa}) ptrace$getregs(0xc, r0, 0x0, &(0x7f00000001c0)=""/162) 19:55:35 executing program 5: r0 = gettid() get_robust_list(r0, &(0x7f0000000140)=0x0, 0x0) 19:55:35 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2010000000000000, &(0x7f0000001280)={[], [{@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}) 19:55:35 executing program 0: ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f0000000000)=0x3d0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f00000001c0), 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='trans=fffdno=\x00\x00', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',\x00']) chdir(&(0x7f0000000080)='./file1/file0\x00') creat(&(0x7f0000000040)='./file1/file0\x00', 0x0) 19:55:35 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$eventfd(0xffffffffffffffff, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) [ 3048.357349] 9pnet: Could not find request transport: fffdno= VM DIAGNOSIS: 20:00:44 Registers: info registers vcpu 0 RAX=ffffffff83e1d800 RBX=ffffffff84e322c0 RCX=ffffffff83e0554c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e1dbc3 RBP=fffffbfff09c6458 RSP=ffffffff84e07e40 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85670d48 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e1d80e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007efe44e61000 CR3=000000000d4fc000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=0000000000000000410d2ac000000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff83e1d800 RBX=ffff88800852b300 RCX=ffffffff83e0554c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e1dbc3 RBP=ffffed10010a5660 RSP=ffff88800856fe78 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85670d48 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e1d80e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fd4ab6f2010 CR3=000000000d4fc000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000040000000000000004 XMM02=effc4e67884efc9513f2e5fc0401039a XMM03=0000060606020401b2f7a39bfc670b79 XMM04=039aff33001003fe016c6c6f502e7265 XMM05=a0a84efcc76cd699fc6340b0a9fc0701 XMM06=04951841fce3190126fc911ee799fc9f XMM07=000006020606060606070133f67cc4fc XMM08=646e616320636578650e007a7a756620 XMM09=746e696820636578650a006574616469 XMM10=657a696d696e696d20636578650d0073 XMM11=78650a006873616d7320636578650a00 XMM12=7420636578650a007364656573206365 XMM13=7220726f74756365786511006c61746f XMM14=65672063657865080073747261747365 XMM15=000065676169727420636578650b006e