9efda3995ff5a89c7ee3886f533886ddf94db14953d3d34f3f3075651ae021b0c03d2af448403a831e464e49f0c61a38619c8620727516687eda05be59b751b20aff4a931335bf0b043727dbf1aef50112a6033b7fb7e5e8b6771aeb2e22ce3d2dc11469919fda6cb718d9b8a767281a59aa997a51c953e8dff9a209acb8edaa8cb20b0740784f3ea1ba4e3d413becc988a5b773e941cebbff4d091520501cbd3bd2e0826f236a6af91c53210c70ed351f1581c8bb44e113ef32ee8b54a9b389d3378b756ee1558fb8fe9a9c46aebb56bedb48c054c16acb830dfb18bef1fcfc252ac01102e4251b25b9d61c6517bc760235ed9f0bae2f98aa2bf9c2aba3ad39fee9cf469d8d48cb80a3ab919b288351fb90b45f81f7723382db1cabff6bb71e6dbb9f257b926f28fda085fb5e4ab6aab3b5b78d1e33f80000005fc6af88da4e0bc6ff393b37a0d003f51c8db6bdfa590ffd55a7dcae4c9450e8731892f530e2f6a69abde945c7e8e3a780bbb92ad03e0d39cba03f101d702f933147e43bc22ab987d3e084b8e25ca6799e1b56fa8e6c63e5c065922831986cb767165887d26bdd9b41df636717b79234"], 0x1248}, 0x1, 0x0, 0x0, 0x48804}, 0x20000040) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x0, r4}) sendmsg$nl_generic(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x10a0}, 0x1, 0x0, 0x0, 0x20000841}, 0x40014) copy_file_range(0xffffffffffffffff, &(0x7f0000000200)=0xffffffffffffffff, r0, &(0x7f0000000240)=0xff, 0x7, 0x0) sendmsg$nl_generic(r0, &(0x7f00000015c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001580)={&(0x7f0000001340)=ANY=[], 0x224}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) io_uring_setup(0x6dc2, &(0x7f00000016c0)={0x0, 0x1573, 0x3a, 0x1, 0x158}) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001480)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001440)={&(0x7f0000001400)=ANY=[@ANYBLOB='0@u\x00', @ANYRES16=0x0, @ANYBLOB="20002cbd7000ffdbdf2512000000"], 0x14}, 0x1, 0x0, 0x0, 0x20000810}, 0x4000000) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000001780)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001740)={&(0x7f0000000100)={0x30, 0x0, 0x300, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x20004800) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000001500), 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001540)={&(0x7f0000001600)={0x5c, r5, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x9588}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x220}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x148}]}, 0x5c}}, 0x200000c0) 02:27:50 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x80000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:27:50 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r0, 0x0, 0x13, 0x0, &(0x7f0000000340)) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000001c0)={0x1, {{0x2, 0x4e24, @broadcast}}, {{0x2, 0x4e21, @remote}}}, 0x108) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r1, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000040)='tasks\x00', 0x2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x600e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, @perf_bp={&(0x7f0000000080), 0x8}, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$cdrom(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) dup2(r1, r2) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x40, 0x0, 0x0) [ 818.119849] FAULT_INJECTION: forcing a failure. [ 818.119849] name failslab, interval 1, probability 0, space 0, times 0 [ 818.121570] CPU: 1 PID: 5974 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 818.123665] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 818.125417] Call Trace: [ 818.126194] dump_stack+0x107/0x167 [ 818.127320] should_fail.cold+0x5/0xa [ 818.128360] ? create_object.isra.0+0x3a/0xa20 [ 818.129971] should_failslab+0x5/0x20 [ 818.131236] kmem_cache_alloc+0x5b/0x360 [ 818.132748] create_object.isra.0+0x3a/0xa20 [ 818.134549] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 818.136490] kmem_cache_alloc_trace+0x151/0x360 [ 818.138281] alloc_fs_context+0x57/0x840 [ 818.139876] path_mount+0xa72/0x20b0 [ 818.140486] ? strncpy_from_user+0x9e/0x470 [ 818.141615] ? finish_automount+0xa40/0xa40 [ 818.142298] ? getname_flags.part.0+0x1dd/0x4f0 [ 818.143040] ? _copy_from_user+0xfb/0x1b0 [ 818.143701] __x64_sys_mount+0x282/0x300 [ 818.144400] ? copy_mnt_ns+0xa00/0xa00 [ 818.145063] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 818.145844] ? syscall_enter_from_user_mode+0x1d/0x50 [ 818.146633] do_syscall_64+0x33/0x40 [ 818.147228] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 818.148040] RIP: 0033:0x7f5cd1c4db19 [ 818.148623] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 818.151509] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 818.152692] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 818.153847] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 818.154958] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 818.155991] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 818.157140] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 818.215571] netlink: 4648 bytes leftover after parsing attributes in process `syz-executor.6'. [ 818.398462] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5987 comm=syz-executor.6 [ 819.073219] netlink: 4648 bytes leftover after parsing attributes in process `syz-executor.6'. [ 819.084872] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 301979167 [ 819.087642] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue [ 819.089857] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5986 comm=syz-executor.6 [ 825.634632] hpet: Lost 1 RTC interrupts [ 833.679151] kmemleak: 20 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:28:14 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:28:14 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 12) 02:28:14 executing program 1: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$ptys(0xc, 0x3, 0x1) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r1, 0x8008f511, &(0x7f00000000c0)) sendmsg$SEG6_CMD_SETHMAC(r0, &(0x7f00000001c0)={&(0x7f0000000040), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x54, 0x0, 0x800, 0x70bd26, 0x25dfdbfb, {}, [@SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x7}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_SECRETLEN={0x5, 0x5, 0x2}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x40}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x4}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x1}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1f}]}, 0x54}, 0x1, 0x0, 0x0, 0x8804}, 0x20000001) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x20044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xdf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) pidfd_open(0x0, 0x0) connect$inet6(r0, &(0x7f0000000500)={0xa, 0x4e24, 0x7fff, @loopback, 0x1}, 0x1c) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f00000002c0)={0x2, 0x1, 0xb7c7, 0x6}) sendmsg$nl_generic(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000001d0021000002000000"], 0x1c}}, 0x0) sendmsg$nl_generic(r0, &(0x7f00000004c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="74010000320000032dbd7000ff03000004000000073ac0b8e1a7af2155175d40acfb226a8150635072de7f21d7c985222a9d945b475d048d6a01b2e47feea2053a7b167e1a566323f3fac026431096133b23cb7ca3a045b13fa33d3f414ed6b1714b714616c451b92e833b1e29a39d0f61c33394d1d7db785ebea73289d39a4f376618e526d10c00688008009100", @ANYRES32=0x0, @ANYBLOB="0800950007000000d5007e80d47d320740ab536947a9e467aaee6e2cc9ab6db62d26d4dd78b9fbdfff15298ed45689d7f47f06b40e61cf1c03004d94b8d63aa28fc8e90e35b18be45571dfe35bcc136fd5f6b31ababe89fd551acdeb9ed132a58cdefe9fd38cb815ffe523ba89987f4655e9accd82f47d7134c7501f3e80a283ad2827b8e11c618ef230d462c41536ab34208bc6bc0fbc1351f383188759403fe3a9aec6e81ba12eae6b3e9921a56112a20f558b319ccbce2b6d2487001f9100ff01000000000000000000000000000100"/226], 0x174}, 0x1, 0x0, 0x0, 0xd0}, 0x40) clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x802c2, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), r0) ioctl$FITRIM(r3, 0xc0185879, &(0x7f00000001c0)={0x0, 0x1319}) 02:28:14 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 18) 02:28:14 executing program 5: creat(0x0, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x58f2c2) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000280)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000400)=ANY=[]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) dup(r3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r4, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r4, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r4, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r4, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$sock_inet6_SIOCDIFADDR(r4, 0x8916, &(0x7f0000000080)={@remote}) pread64(0xffffffffffffffff, &(0x7f0000001100)=""/4095, 0xfff, 0x6800) ioctl$sock_inet_SIOCSIFDSTADDR(0xffffffffffffffff, 0x8918, &(0x7f0000000200)={'ip6_vti0\x00', {0x2, 0x0, @local}}) sendmmsg$inet(r0, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f0000001640)=ANY=[@ANYBLOB="14000000000000000000000007000000c4048f01000000001c000000000000000000000008000000", @ANYRES32=r2], 0x38}}], 0x1, 0x0) 02:28:14 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:28:14 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:28:14 executing program 6: pipe2(0x0, 0x0) pipe2(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000001340)=""/91, 0x5b) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001e00)=ANY=[@ANYBLOB="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"], 0x1248}, 0x1, 0x0, 0x0, 0x48804}, 0x20000040) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) r2 = dup(r1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r2, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x0, r4}) [ 842.132139] FAULT_INJECTION: forcing a failure. [ 842.132139] name failslab, interval 1, probability 0, space 0, times 0 [ 842.134473] CPU: 0 PID: 6007 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 842.135541] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 842.136611] Call Trace: [ 842.136964] dump_stack+0x107/0x167 [ 842.137480] should_fail.cold+0x5/0xa [ 842.137993] ? legacy_init_fs_context+0x44/0xe0 [ 842.138608] should_failslab+0x5/0x20 [ 842.139115] kmem_cache_alloc_trace+0x55/0x360 [ 842.139715] ? lockdep_init_map_type+0x2c7/0x780 [ 842.140342] legacy_init_fs_context+0x44/0xe0 [ 842.140943] ? generic_parse_monolithic+0x1f0/0x1f0 [ 842.141679] alloc_fs_context+0x4f8/0x840 [ 842.142230] path_mount+0xa72/0x20b0 [ 842.142727] ? strncpy_from_user+0x9e/0x470 [ 842.143385] ? finish_automount+0xa40/0xa40 [ 842.143986] ? getname_flags.part.0+0x1dd/0x4f0 [ 842.144628] ? _copy_from_user+0xfb/0x1b0 [ 842.145245] __x64_sys_mount+0x282/0x300 [ 842.145832] ? copy_mnt_ns+0xa00/0xa00 [ 842.146392] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 842.147128] ? syscall_enter_from_user_mode+0x1d/0x50 [ 842.147852] do_syscall_64+0x33/0x40 [ 842.148371] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 842.149163] RIP: 0033:0x7f5cd1c4db19 [ 842.149677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 842.153247] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 842.154417] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 842.155365] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 842.156313] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 842.157292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 842.158197] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 842.159445] hpet: Lost 1 RTC interrupts sendmsg$nl_generic(r2, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="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"], 0x10a0}, 0x1, 0x0, 0x0, 0x20000841}, 0x40014) copy_file_range(0xffffffffffffffff, &(0x7f0000000200)=0xffffffffffffffff, r0, &(0x7f0000000240)=0xff, 0x7, 0x0) sendmsg$nl_generic(r0, &(0x7f00000015c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001580)={&(0x7f0000001340)=ANY=[], 0x224}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) io_uring_setup(0x6dc2, &(0x7f00000016c0)={0x0, 0x1573, 0x3a, 0x1, 0x158}) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r0, &(0x7f0000001480)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001440)={&(0x7f0000001400)=ANY=[@ANYBLOB='0@u\x00', @ANYRES16=0x0, @ANYBLOB="20002cbd7000ffdbdf2512000000"], 0x14}, 0x1, 0x0, 0x0, 0x20000810}, 0x4000000) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f0000001780)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000001740)={&(0x7f0000000100)={0x30, 0x0, 0x300, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}, ["", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x40}, 0x20004800) r5 = syz_genetlink_get_family_id$nbd(&(0x7f0000001500), 0xffffffffffffffff) sendmsg$NBD_CMD_CONNECT(0xffffffffffffffff, &(0x7f0000001680)={&(0x7f00000014c0)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001540)={&(0x7f0000001600)={0x5c, r5, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x9588}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x9}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x220}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x148}]}, 0x5c}}, 0x200000c0) [ 842.184339] FAULT_INJECTION: forcing a failure. [ 842.184339] name failslab, interval 1, probability 0, space 0, times 0 [ 842.185944] CPU: 0 PID: 6019 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 842.186900] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 842.188046] Call Trace: [ 842.188466] dump_stack+0x107/0x167 [ 842.188981] should_fail.cold+0x5/0xa [ 842.189576] should_failslab+0x5/0x20 [ 842.190113] __kmalloc_track_caller+0x79/0x3c0 [ 842.190748] ? v9fs_session_init+0xe9/0x16a0 [ 842.191368] ? kernel_text_address+0xf2/0x120 [ 842.191997] kstrdup+0x36/0x70 [ 842.192469] v9fs_session_init+0xe9/0x16a0 [ 842.193092] ? find_held_lock+0x2c/0x110 [ 842.193678] ? kmem_cache_alloc_trace+0x151/0x360 [ 842.194353] ? v9fs_show_options+0x690/0x690 [ 842.194985] ? kasan_unpoison_shadow+0x33/0x50 [ 842.195632] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 842.196355] v9fs_mount+0x79/0x8f0 [ 842.196858] ? v9fs_write_inode+0x60/0x60 [ 842.197574] legacy_get_tree+0x105/0x220 [ 842.198213] vfs_get_tree+0x8e/0x300 [ 842.198775] path_mount+0x13be/0x20b0 [ 842.199332] ? strncpy_from_user+0x9e/0x470 [ 842.199961] ? finish_automount+0xa40/0xa40 [ 842.200656] ? getname_flags.part.0+0x1dd/0x4f0 [ 842.201359] ? _copy_from_user+0xfb/0x1b0 [ 842.201953] __x64_sys_mount+0x282/0x300 [ 842.202540] ? copy_mnt_ns+0xa00/0xa00 [ 842.203094] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 842.203851] ? syscall_enter_from_user_mode+0x1d/0x50 [ 842.204599] do_syscall_64+0x33/0x40 [ 842.205165] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 842.205891] RIP: 0033:0x7f8ff0aa5b19 [ 842.206421] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 842.208963] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 842.210060] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 842.211062] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 842.212059] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 842.213051] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 842.214116] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 [ 842.215333] hpet: Lost 1 RTC interrupts 02:28:14 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 842.233326] netlink: 4648 bytes leftover after parsing attributes in process `syz-executor.6'. [ 842.236602] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6023 comm=syz-executor.6 02:28:14 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 13) 02:28:14 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:28:14 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 842.431676] FAULT_INJECTION: forcing a failure. [ 842.431676] name failslab, interval 1, probability 0, space 0, times 0 [ 842.433614] CPU: 0 PID: 6038 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 842.434496] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 842.435556] Call Trace: [ 842.435930] dump_stack+0x107/0x167 [ 842.436427] should_fail.cold+0x5/0xa [ 842.436945] ? create_object.isra.0+0x3a/0xa20 [ 842.437651] should_failslab+0x5/0x20 [ 842.438157] kmem_cache_alloc+0x5b/0x360 [ 842.438682] create_object.isra.0+0x3a/0xa20 [ 842.439258] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 842.439933] kmem_cache_alloc_trace+0x151/0x360 [ 842.440531] ? lockdep_init_map_type+0x2c7/0x780 [ 842.441271] legacy_init_fs_context+0x44/0xe0 [ 842.441849] ? generic_parse_monolithic+0x1f0/0x1f0 [ 842.442489] alloc_fs_context+0x4f8/0x840 [ 842.443037] path_mount+0xa72/0x20b0 [ 842.443620] ? strncpy_from_user+0x9e/0x470 [ 842.444288] ? finish_automount+0xa40/0xa40 [ 842.444964] ? getname_flags.part.0+0x1dd/0x4f0 [ 842.445604] ? _copy_from_user+0xfb/0x1b0 [ 842.446177] __x64_sys_mount+0x282/0x300 [ 842.446700] ? copy_mnt_ns+0xa00/0xa00 [ 842.447262] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 842.448055] ? syscall_enter_from_user_mode+0x1d/0x50 [ 842.448842] do_syscall_64+0x33/0x40 [ 842.449451] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 842.450222] RIP: 0033:0x7f5cd1c4db19 [ 842.450823] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 842.453642] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 842.454791] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 842.455886] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 842.456986] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 842.458035] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 842.459133] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 857.285684] kmemleak: 10 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:28:38 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 19) 02:28:38 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:28:38 executing program 6: sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x40004, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000000100)="ed4100000093b200dff4655fe0f4655fe0f4655f0000080000000400045539545cee", 0x22, 0x2100}], 0x0, &(0x7f0000000140)=ANY=[]) r1 = openat(0xffffffffffffffff, &(0x7f00000002c0)='./file0\x00', 0x10000, 0x179) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='net/igmp6\x00') r4 = openat(r3, &(0x7f0000000140)='./file1\x00', 0x40000, 0x80) bind$bt_l2cap(r2, &(0x7f0000000500)={0x1f, 0x0, @none, 0x6}, 0xe) setsockopt$netlink_NETLINK_PKTINFO(0xffffffffffffffff, 0x10e, 0x3, 0x0, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(0xffffffffffffffff, 0xf507, 0x0) r5 = inotify_init1(0x0) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f0000000180)={0x6, 0x7f0}) fcntl$dupfd(r5, 0x0, r5) openat(r4, &(0x7f00000001c0)='./file0\x00', 0x100, 0x0) connect$bt_l2cap(r1, &(0x7f0000000080)={0x1f, 0x8, @any, 0x1, 0x1}, 0xe) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) umount2(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) 02:28:38 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 14) [ 865.962499] FAULT_INJECTION: forcing a failure. [ 865.962499] name failslab, interval 1, probability 0, space 0, times 0 [ 865.964240] CPU: 1 PID: 6059 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 865.965233] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 865.966350] Call Trace: [ 865.966704] dump_stack+0x107/0x167 [ 865.967185] should_fail.cold+0x5/0xa [ 865.967685] ? v9fs_mount+0x5a/0x8f0 [ 865.968175] should_failslab+0x5/0x20 [ 865.968674] kmem_cache_alloc_trace+0x55/0x360 [ 865.969275] ? v9fs_write_inode+0x60/0x60 [ 865.969850] v9fs_mount+0x5a/0x8f0 [ 865.970343] ? v9fs_write_inode+0x60/0x60 [ 865.971225] legacy_get_tree+0x105/0x220 [ 865.971804] vfs_get_tree+0x8e/0x300 [ 865.972345] path_mount+0x13be/0x20b0 [ 865.972993] ? strncpy_from_user+0x9e/0x470 [ 865.973918] ? finish_automount+0xa40/0xa40 [ 865.975160] ? getname_flags.part.0+0x1dd/0x4f0 [ 865.976266] ? _copy_from_user+0xfb/0x1b0 [ 865.976888] __x64_sys_mount+0x282/0x300 [ 865.977504] ? copy_mnt_ns+0xa00/0xa00 [ 865.978070] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 865.978926] ? syscall_enter_from_user_mode+0x1d/0x50 [ 865.979737] do_syscall_64+0x33/0x40 [ 865.980323] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 865.981106] RIP: 0033:0x7f5cd1c4db19 [ 865.981714] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 865.984624] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 865.986204] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 865.987186] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 865.988145] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 865.989107] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 865.991383] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 866.001652] FAULT_INJECTION: forcing a failure. [ 866.001652] name failslab, interval 1, probability 0, space 0, times 0 [ 866.003631] CPU: 1 PID: 6063 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 866.004999] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 866.006243] Call Trace: [ 866.006677] dump_stack+0x107/0x167 [ 866.007335] should_fail.cold+0x5/0xa [ 866.007935] ? getname_flags.part.0+0x50/0x4f0 [ 866.008663] should_failslab+0x5/0x20 [ 866.009257] kmem_cache_alloc+0x5b/0x360 [ 866.009918] getname_flags.part.0+0x50/0x4f0 [ 866.010673] user_path_at_empty+0xa1/0x100 [ 866.011283] do_readlinkat+0xcd/0x2f0 [ 866.011921] ? cp_compat_stat+0x830/0x830 [ 866.013282] ? fput_many+0x2f/0x1a0 [ 866.014467] ? ksys_write+0x1a9/0x260 [ 866.015751] __x64_sys_readlink+0x74/0xb0 [ 866.016437] ? syscall_enter_from_user_mode+0x1d/0x50 [ 866.018180] do_syscall_64+0x33/0x40 [ 866.018804] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 866.020115] RIP: 0033:0x7fa88322fb19 [ 866.020861] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 866.023831] RSP: 002b:00007fa8807a5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000059 [ 866.025001] RAX: ffffffffffffffda RBX: 00007fa883342f60 RCX: 00007fa88322fb19 [ 866.026157] RDX: 000000000000003f RSI: 00000000200001c0 RDI: 0000000020000180 [ 866.027149] RBP: 00007fa8807a51d0 R08: 0000000000000000 R09: 0000000000000000 [ 866.028145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 866.029162] R13: 00007fffce6f4cef R14: 00007fa8807a5300 R15: 0000000000022000 [ 866.050739] tmpfs: Bad value for 'uid' [ 866.064372] FAULT_INJECTION: forcing a failure. [ 866.064372] name failslab, interval 1, probability 0, space 0, times 0 [ 866.066283] CPU: 1 PID: 6066 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 866.067346] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 866.068602] Call Trace: [ 866.069004] dump_stack+0x107/0x167 [ 866.069595] should_fail.cold+0x5/0xa [ 866.070111] ? create_object.isra.0+0x3a/0xa20 [ 866.070813] should_failslab+0x5/0x20 [ 866.071348] kmem_cache_alloc+0x5b/0x360 [ 866.071983] create_object.isra.0+0x3a/0xa20 [ 866.072679] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 866.073583] __kmalloc_track_caller+0x177/0x3c0 [ 866.074318] ? v9fs_session_init+0xe9/0x16a0 [ 866.074989] ? kernel_text_address+0xf2/0x120 [ 866.075675] kstrdup+0x36/0x70 [ 866.076206] v9fs_session_init+0xe9/0x16a0 [ 866.076876] ? find_held_lock+0x2c/0x110 [ 866.077565] ? kmem_cache_alloc_trace+0x151/0x360 [ 866.078283] ? v9fs_show_options+0x690/0x690 [ 866.078891] ? kasan_unpoison_shadow+0x33/0x50 [ 866.079511] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 866.080190] v9fs_mount+0x79/0x8f0 [ 866.080690] ? v9fs_write_inode+0x60/0x60 [ 866.081251] legacy_get_tree+0x105/0x220 [ 866.081823] vfs_get_tree+0x8e/0x300 [ 866.082333] path_mount+0x13be/0x20b0 [ 866.082856] ? strncpy_from_user+0x9e/0x470 [ 866.083484] ? finish_automount+0xa40/0xa40 [ 866.084123] ? getname_flags.part.0+0x1dd/0x4f0 [ 866.085107] ? _copy_from_user+0xfb/0x1b0 [ 866.085740] __x64_sys_mount+0x282/0x300 [ 866.086313] ? copy_mnt_ns+0xa00/0xa00 [ 866.086849] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 866.087647] ? syscall_enter_from_user_mode+0x1d/0x50 [ 866.088500] do_syscall_64+0x33/0x40 [ 866.089042] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 866.089830] RIP: 0033:0x7f8ff0aa5b19 02:28:38 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:28:38 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) (fail_nth: 1) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:28:38 executing program 1: pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) copy_file_range(r0, &(0x7f0000000140)=0xbcd6, 0xffffffffffffffff, &(0x7f0000000180)=0xffffffffffff0000, 0x3, 0x0) pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = memfd_create(&(0x7f0000000040)='\x00\'\'x\xe0\x1c\xaa\x00d\x88\xc4p\xb0\x89`\xe4\xc6O\xca\x1d\b6\xdd\xda\xacQB\xa7\x8d\xb7\x01Q\xc6\x0fG/\xf9\n', 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f00000001c0)='/sys/module/snd_hda_codec', 0x840, 0x2) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x1f012, r3, 0x0) write$sndseq(r2, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0x0, @time, {}, {}, @connect}], 0x1c) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f00000000c0)="83ef556eb33dbe4d3b3c684d76d5482002a9027b9b190674d6549df2d882e89c3f360b507b4486a73bd9d69a4b25db4a36f00207d0c58c35c598a3826fad89704adeb6c4dfedf28c4010da4fc58d513b96c937", 0x53}], 0x1, 0x0) tee(r1, r0, 0x800, 0x0) 02:28:38 executing program 5: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18}, './file0\x00'}) syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',uid=', @ANYRESHEX=0xee00, @ANYBLOB="62617e44998a3eb95a47fa495a0763081a0fe2d13f0000003c647443281257f2ca04312e3c"]) [ 866.090395] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 866.093217] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 866.094343] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 866.095360] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 866.096383] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 866.097422] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 866.098448] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 02:28:38 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 15) 02:28:38 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x9000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 866.157774] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue 02:28:38 executing program 1: set_mempolicy(0x1, &(0x7f0000000040)=0x7, 0x8000) prlimit64(0x0, 0x9, &(0x7f00000017c0), 0x0) io_setup(0x23, &(0x7f0000000000)) 02:28:38 executing program 5: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000080)={{0x1, 0x1, 0x18}, './file0\x00'}) syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='gid=', @ANYRESHEX=0x0, @ANYBLOB=',uid=', @ANYRESHEX=0xee00, @ANYBLOB="62617e44998a3eb95a47fa495a0763081a0fe2d13f0000003c647443281257f2ca04312e3c"]) 02:28:38 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) (fail_nth: 2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 866.205770] tmpfs: Bad value for 'uid' [ 866.256112] FAULT_INJECTION: forcing a failure. [ 866.256112] name failslab, interval 1, probability 0, space 0, times 0 [ 866.257857] CPU: 1 PID: 6085 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 866.258797] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 866.259910] Call Trace: [ 866.260366] dump_stack+0x107/0x167 [ 866.260877] should_fail.cold+0x5/0xa [ 866.261417] ? create_object.isra.0+0x3a/0xa20 [ 866.262032] should_failslab+0x5/0x20 [ 866.262554] kmem_cache_alloc+0x5b/0x360 [ 866.263113] ? cred_has_capability.isra.0+0x152/0x2b0 [ 866.263824] create_object.isra.0+0x3a/0xa20 [ 866.264399] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 866.265087] kmem_cache_alloc_trace+0x151/0x360 [ 866.266081] ? v9fs_write_inode+0x60/0x60 [ 866.266933] v9fs_mount+0x5a/0x8f0 [ 866.267686] ? v9fs_write_inode+0x60/0x60 [ 866.268655] legacy_get_tree+0x105/0x220 [ 866.269455] vfs_get_tree+0x8e/0x300 [ 866.269991] path_mount+0x13be/0x20b0 [ 866.270929] ? strncpy_from_user+0x9e/0x470 [ 866.271931] ? finish_automount+0xa40/0xa40 02:28:38 executing program 5: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x80200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x7}, 0x0, 0xfffffffeffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) creat(&(0x7f00000002c0)='./file0\x00', 0x4) perf_event_open(&(0x7f0000000180)={0x3d8564b2c13c665d, 0x80, 0xfc, 0xb0, 0x0, 0x8a, 0x0, 0x2, 0x800, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x8, 0x4, @perf_bp={&(0x7f0000000140), 0x2}, 0x84, 0x3b45, 0x80, 0x2, 0x6, 0x3, 0xf5, 0x0, 0x1, 0x0, 0x1000}, 0x0, 0xf, r1, 0x2) r2 = signalfd4(r0, &(0x7f0000000000)={[0x1]}, 0x8, 0x0) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040), 0xa0000, 0x0) pread64(r3, &(0x7f0000000080)=""/47, 0x2f, 0xffff) clone3(&(0x7f0000000200)={0x44004100, 0x0, &(0x7f00000000c0), &(0x7f0000000100), {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) pidfd_getfd(r4, r2, 0x0) [ 866.273026] ? getname_flags.part.0+0x1dd/0x4f0 [ 866.274479] ? _copy_from_user+0xfb/0x1b0 [ 866.275120] __x64_sys_mount+0x282/0x300 [ 866.275754] ? copy_mnt_ns+0xa00/0xa00 [ 866.276297] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 866.277028] ? syscall_enter_from_user_mode+0x1d/0x50 [ 866.277891] do_syscall_64+0x33/0x40 [ 866.278413] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 866.279118] RIP: 0033:0x7f5cd1c4db19 [ 866.279618] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 866.282081] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 866.283217] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 866.284231] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 866.285193] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 866.286156] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 866.287094] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 866.334783] FAULT_INJECTION: forcing a failure. [ 866.334783] name failslab, interval 1, probability 0, space 0, times 0 [ 866.336287] CPU: 1 PID: 6091 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 866.337149] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 866.338286] Call Trace: [ 866.338637] dump_stack+0x107/0x167 [ 866.339117] should_fail.cold+0x5/0xa [ 866.339620] ? create_object.isra.0+0x3a/0xa20 [ 866.340225] should_failslab+0x5/0x20 [ 866.340724] kmem_cache_alloc+0x5b/0x360 [ 866.341246] create_object.isra.0+0x3a/0xa20 [ 866.341866] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 866.342531] kmem_cache_alloc+0x159/0x360 [ 866.343091] getname_flags.part.0+0x50/0x4f0 [ 866.343689] user_path_at_empty+0xa1/0x100 [ 866.344275] do_readlinkat+0xcd/0x2f0 [ 866.344804] ? cp_compat_stat+0x830/0x830 [ 866.345338] ? fput_many+0x2f/0x1a0 [ 866.345843] ? ksys_write+0x1a9/0x260 [ 866.346347] __x64_sys_readlink+0x74/0xb0 [ 866.346885] ? syscall_enter_from_user_mode+0x1d/0x50 [ 866.347552] do_syscall_64+0x33/0x40 [ 866.348085] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 866.348779] RIP: 0033:0x7fa88322fb19 [ 866.349259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 866.351652] RSP: 002b:00007fa8807a5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000059 [ 866.352636] RAX: ffffffffffffffda RBX: 00007fa883342f60 RCX: 00007fa88322fb19 [ 866.353574] RDX: 000000000000003f RSI: 00000000200001c0 RDI: 0000000020000180 [ 866.354525] RBP: 00007fa8807a51d0 R08: 0000000000000000 R09: 0000000000000000 [ 866.355444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 866.357274] R13: 00007fffce6f4cef R14: 00007fa8807a5300 R15: 0000000000022000 02:28:38 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) r4 = fcntl$dupfd(r1, 0x406, r3) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x7f, 0x7, 0x4d, 0x0, 0x0, 0xfd4, 0x80440, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080), 0xe}, 0x18100, 0x401, 0x800, 0x9, 0x1, 0x3ff, 0x4, 0x0, 0x401, 0x0, 0x8}, 0x0, 0x5, r4, 0x0) read(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0xc6) r5 = creat(0x0, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r5, &(0x7f0000000140), 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r0) 02:28:38 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:28:38 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 20) [ 866.488500] FAULT_INJECTION: forcing a failure. [ 866.488500] name failslab, interval 1, probability 0, space 0, times 0 [ 866.490075] CPU: 0 PID: 6104 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 866.490980] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 866.492105] Call Trace: [ 866.492495] dump_stack+0x107/0x167 [ 866.493025] should_fail.cold+0x5/0xa [ 866.493592] ? p9_client_create+0xaf/0x1090 [ 866.494219] should_failslab+0x5/0x20 [ 866.494797] kmem_cache_alloc_trace+0x55/0x360 [ 866.495511] ? find_held_lock+0x2c/0x110 [ 866.496098] p9_client_create+0xaf/0x1090 [ 866.496707] ? lock_downgrade+0x6d0/0x6d0 [ 866.497320] ? p9_client_flush+0x430/0x430 [ 866.497969] ? lockdep_init_map_type+0x2c7/0x780 [ 866.498670] ? rcu_read_lock_sched_held+0x3e/0x80 [ 866.499376] ? __raw_spin_lock_init+0x36/0x110 [ 866.500058] v9fs_session_init+0x1dd/0x16a0 [ 866.500687] ? kmem_cache_alloc_trace+0x151/0x360 [ 866.501419] ? v9fs_show_options+0x690/0x690 [ 866.502074] ? kasan_unpoison_shadow+0x33/0x50 [ 866.502728] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 866.503470] v9fs_mount+0x79/0x8f0 [ 866.503989] ? v9fs_write_inode+0x60/0x60 [ 866.504585] legacy_get_tree+0x105/0x220 [ 866.505177] vfs_get_tree+0x8e/0x300 [ 866.505727] path_mount+0x13be/0x20b0 [ 866.506274] ? strncpy_from_user+0x9e/0x470 [ 866.506919] ? finish_automount+0xa40/0xa40 [ 866.507543] ? getname_flags.part.0+0x1dd/0x4f0 [ 866.508209] ? _copy_from_user+0xfb/0x1b0 [ 866.508813] __x64_sys_mount+0x282/0x300 [ 866.509433] ? copy_mnt_ns+0xa00/0xa00 [ 866.510008] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 866.510774] ? syscall_enter_from_user_mode+0x1d/0x50 [ 866.511513] do_syscall_64+0x33/0x40 [ 866.512072] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 866.512815] RIP: 0033:0x7f8ff0aa5b19 [ 866.513378] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 866.515987] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 866.517089] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 866.518129] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 866.519131] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 866.520145] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 866.521164] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 [ 866.522280] hpet: Lost 1 RTC interrupts [ 881.600450] kmemleak: 19 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:29:02 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 16) 02:29:02 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:29:02 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 21) 02:29:02 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) (fail_nth: 3) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:29:02 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x10, 0x0, 0x80000001, 0x9, 0x1, 0xffff4b02}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, 0x0) poll(&(0x7f0000000840)=[{0xffffffffffffffff, 0x8200}, {0xffffffffffffffff, 0x200}, {0xffffffffffffffff, 0x2}, {r0, 0xa001}, {r0, 0x1040}, {0xffffffffffffffff, 0x5200}], 0x6, 0x69) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000080)=ANY=[@ANYBLOB="0100000001efe06a00000018", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) 02:29:02 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) sendmsg$NL80211_CMD_TDLS_CANCEL_CHANNEL_SWITCH(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYRESOCT, @ANYRESHEX=r1, @ANYRES32=r0], 0x50}}, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}, r5}, 0x14) [ 890.259088] FAULT_INJECTION: forcing a failure. [ 890.259088] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 890.262939] CPU: 1 PID: 6129 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 890.265274] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 890.268147] Call Trace: [ 890.269058] dump_stack+0x107/0x167 [ 890.270328] should_fail.cold+0x5/0xa [ 890.271654] strncpy_from_user+0x34/0x470 [ 890.273060] getname_flags.part.0+0x95/0x4f0 [ 890.274563] user_path_at_empty+0xa1/0x100 [ 890.276408] do_readlinkat+0xcd/0x2f0 [ 890.277756] ? cp_compat_stat+0x830/0x830 [ 890.279158] ? fput_many+0x2f/0x1a0 [ 890.280389] ? ksys_write+0x1a9/0x260 [ 890.281734] __x64_sys_readlink+0x74/0xb0 [ 890.283124] ? syscall_enter_from_user_mode+0x1d/0x50 [ 890.284905] do_syscall_64+0x33/0x40 [ 890.286241] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 890.288068] RIP: 0033:0x7fa88322fb19 [ 890.289351] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 890.295955] RSP: 002b:00007fa8807a5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000059 [ 890.298482] RAX: ffffffffffffffda RBX: 00007fa883342f60 RCX: 00007fa88322fb19 [ 890.300925] RDX: 000000000000003f RSI: 00000000200001c0 RDI: 0000000020000180 [ 890.303354] RBP: 00007fa8807a51d0 R08: 0000000000000000 R09: 0000000000000000 [ 890.305766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 890.308653] R13: 00007fffce6f4cef R14: 00007fa8807a5300 R15: 0000000000022000 [ 890.324659] FAULT_INJECTION: forcing a failure. [ 890.324659] name failslab, interval 1, probability 0, space 0, times 0 [ 890.328861] CPU: 1 PID: 6133 Comm: syz-executor.2 Not tainted 5.10.161 #1 sendmmsg$inet6(r2, &(0x7f0000004b40)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000300)="6650f355a1ebb97ca299761a50dfcab1518da633cc399b688926604e698b9aff127e407b22d5738a20b6df4f7b6f09c3d1522aa59d67852b6135ec10cb7ae159c1eafe4bd6a178b990bb0934dcb355e297d72cb706a7bec175a369107dd9b57e5ec05651a0115101fbe0254272a48c42c2bcca28eac55b0693d1237f6b196ef5b61ac3784d270dba7be2aabe406fa40e46010b3ef62476fe6732a82b607eb7db01db29046492d28379c8424d56877ab7662229b5a859eb536c6e6420ef7b0a3ecbd9026baa1d2966a9274f076f2c3a1459f1cf61ba7aba585e1e2120ec8a8f6988e76734b3d9c8226ced0688373d4bf0f58a4de713", 0xf5}, {&(0x7f0000000400)="f8b2985350c7b9f7efae304d8ec851650d3b5d09ff0d4b47ba2fa93d2d13baa82845a4fc555fffa60e12ca7bed5bb6acc46a6fe5300ab2e1b6e44982e5f000dac623bd0ad8b0c3d9bd18d732e0d89392d26b02144b74275cefcc811aff6c7c3e1ece2154099039b52a1b8a4bfb64edc658799a73437de9c304cb04257d904ec06b306f4ea06f2df0f4d67000784ce1f8b1ebac92e745e60ac852fd6cf92d1272c4cac82ecff7ec84cc3a777ea711e312e3f28189b67fb04473e276e20488f2441c826cd0d191c7d1", 0xc8}], 0x2, &(0x7f0000000500)=[@dontfrag={{0x14}}, @pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @empty}}}}, @hopopts_2292={{0xb, 0x29, 0x36, {0x62, 0x2, '\x00', [@ra, @enc_lim={0x4, 0x1, 0x1}, @jumbo={0xc2, 0x4, 0x9}, @enc_lim={0x4, 0x1, 0x20}, @pad1, @ra={0x5, 0x2, 0x7}]}}}, @tclass={{0x14}}], 0x88}}, {{&(0x7f0000000280)={0xa, 0x4e22, 0x9, @private0={0xfc, 0x0, '\x00', 0x1}, 0x3ff}, 0x1c, &(0x7f0000001ac0)=[{&(0x7f00000005c0)="bb1d9ddc2b3cc4a63de4cc74966b84a0045dd1ac4ac7cfa30444a7319e1245aaa24da405f0bbedfc8070805ef520722cf6abda046ba5370457a6e7f13c9007ff189b6a8dade3222305b9e91ed794e97134d3418a43d04f578497cc77edb8c803ff", 0x61}, {&(0x7f0000000640)="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", 0x1000}, {&(0x7f0000001640)="37b407e4d15595802b8138787fcff467d19ba1d0a19f5680caaeb5b64122bc139ed0e928d8c1b9116411e74dcad7378540c11b9b294292635a294d0749384add2a3ef653f9a25c94ea04d922254d73701b999c4234b1f7b92f314f349475a4297436795a097daf2186a08e206c3956cdb992761e67c4913ca5c8a15a3d4f2934476fb72a1423a7cbf938d19da2d67126e692db7f10458bb259e41a9683932a54e894a86cedb7cc2b97fe2257904d3732f2ce1cf3d2df8542bb321c3fe54cde76739dbde305f16e86f8828cd9b9ef227319fd10b8", 0xd4}, {&(0x7f0000001740)="429a04245159183773c18ae9a9ee631d909badf086fefff98137d6b75e7ee2ef07e350ab9200602e12ca90255994131f598f82f605b7a2523df5c9a05ea956613233c67727104bfae6302c041ab2e39e7921895c6522eb9bd78a00dc542192e1ea4725a20cbe5e6052ce78226d949100cf6b6445dda2c1d4dd7b0e625ef811816486c0c41ffa0c11561ee7acea3156861b1d7c0749da47304ddbdad5f490c0073fb61ca47ad7246f082b08957dd36eed97b13110c98bb48268", 0xb9}, {&(0x7f0000001800)="02e5ccbb7a7f229775e4cd4b3902d35c50d157d29f9964c8a49a10d631d3ca1d95ce7cc463ea3e758710a0c560b6ccd273d6d20f36bb72781bda56934f3dc71f2034cc385dfdfd9cd024b28b0208453c07a85f96503c0fef1b1671b47cca3db99dabdb517397f0797d4aef1ca4f00c8576fa28c7bb9973f2d211f40de50226c93484de988cf2f5b793dd6c5e48251fb6686cf7f58792140cae4824621b804f4cc6f15d52b4328384997e9f0852c30d0bc811095c67e57e677338c6e470ec756c9a0ec15ecd262b8ac3cce7960b9182f334b48d91ace6be3844efee74e3f2bfb84e8a88d750c9d332486c97", 0xeb}, {&(0x7f0000001900)="c403aeb64ad16c519e696e510eaaafc947a4bec065d247c0fe395a01d591", 0x1e}, {&(0x7f0000001940)="bbe5a44260a67f5844bdc3583e67d29f159001c91101d0e9985c1a3f3a4b684c2427137e9d4b03795fe2c1676e7ff32cea3a38680eb5fe5cccb56a048adabff5f23444db973195cf9b3ea796d87195e4c44d4d", 0x53}, {&(0x7f00000019c0)="3457a673ae41c69d1173a9a7557707e971ba4709cb82220f720c0057557f6a83eeb5b2d71ef06a8182bf09ce25f365910f7fce718300df784636d8c63026398f8bb76665c7809723a669f83b2a0eeded6123098298782140287a6b8aaa001140b8911068d366d8af0111cf00ae2d1bee4f1c3141651e258cd531e19d8a15c0c5735de54990ead5a50ff6da6b322801f9da25385534076ee6d0fa19244197351891f3aa27cdb2617927ecb43850c1353dac06dcdb1cd6b30dbc08b1b4f625a6e76744783ec9d5af5c4e7f8a47e787e52f7dd73272a44b8c15253e40b5e71abe5367a7f33607316f998888a9bda925ffc0", 0xf0}], 0x8, &(0x7f0000001b40)=[@pktinfo={{0x24, 0x29, 0x32, {@private0, r5}}}], 0x28}}, {{&(0x7f0000001b80)={0xa, 0x4e24, 0xdf05, @local, 0xaa}, 0x1c, &(0x7f0000002f80)=[{&(0x7f0000001bc0)="df18d2629aaebeaf16d2680d332a57c86a58544ff1c6705ce4d070e62744015b9176ddede7666d8eff35d61f0b1393729d83ece5819ed92f2e77f51d47e4aad4c9d696f87c53130bbb49c51d39ffddef6f3be4d216f6bfbb59439dccd2afc48f0cd40e640d4c2f5d2da7a45911ea37582dbabab8c64d9deed380be1a55a9d5d707d6ef", 0x83}, {&(0x7f0000001c80)="819175a7a28e1e343363b97272d6e790cbec25b2c90cc573780e4e558e981e230388cf1ec27b85b4e9d7b86fb4329a914f74be41", 0x34}, {&(0x7f0000001cc0)="a9ffb933ee9b86effc78021caf3ff949d878d0152fa1d2fc5d6a90a54daf8c8a84b956e993eb73071034daaf4a3b68e0c403bce027a3ac7eca91d2f8dc17a1374bc6f5cd363e5dbc2422", 0x4a}, {&(0x7f0000001d40)="6eaecc41b1c697ad5206b662a1c4ae6f766b35fd9d712d15db550304b3332f640d9d0ea3cda0cb07ce1453b8aa93e22ee38cc61f5dc9a4e69fc016035e8275bfadfe520a9341506cf469314a59d62d878fd10cdfb992fcbd9a270a5ab000095ea40e5120eef80964b8da9817f1b6f4459e5fc05677870ab877cb75109fed6f16c659563871a5774877ce3612dacad5d8e757b6c7dd2c7bb12e", 0x99}, {&(0x7f0000001e00)="3bccebcf3a6c8af2400be42e303c409987859a4cb5b9a3415c9e86e064caa4081c134a26fefdbece8bc3ee13b72fd683cd22efe33c6e8612ceb07a6caeb6061f130b7747b63ef48a1477aa88136eaf8a3fbb37c92630c7cfb59c2a33f54a70dd29c7f869b2fd017fe436461f7e494b3155400ed7735585ec92385f5d9562077433dcf62fd07d4efd93ef56ad3bce12d271ddf0899958513f3a4939d9ed915b3551a3f1b87cb69c2078a15bbcddeca27cd92124f7a0ceeac88e735a22ce8e17f0fa6fa89594c2fc63a724eb500c8cee7ab694d17944cc53537b806ee6519f4005a6f0eccb65aa7254c9150af69ef86a4e3fce6464330d3e000c3a7c0d40f4214a1e95139af5205794b64d675f8345faa7f4950f889c0d1b4f824cdff3923e896ff7b42d3ea5c7a3db998a5941982b1841f7f094084153a694a59399de849063581542c991715aa3ba768722ec429546d20b38bd41547bb26c9963cd38213291b2130edaf945ace4b1a76e0cdf668fdbbf51e7092590fda701391825e1a66d45c33372f04ed0bc2dfebca868002f92c07105d92aa6bc5b0107547d82422143de47ad21272cf2791d55fb1b70dd856b5ced0749800959b402631645d79a1a9910c556c8bb92a56d109c8e2520ac2885f1b8b5a8de1f00c9bf99d4d43ac7a60f91a1ade6f9de17536f21f447873cfba558ea99881ecf572bcad01d6dfbaab7b5fcc9d1b48d12638618d2425ca77077723f7a214b1da26b01ff1027b20b02878e9faaa7fef3b397ee2d09478bb197ce2a557b26ebfacc9e661d1b62a442d00d0e3bb82f66065a62978b18391cdb11acbaa23d22ea1ab1e9282181e7f13951f02acf829ef708f8adde6ef2777d91fd7561cc1938ad5b8fb3e8ed40502e4e70aa0a97f8d39c0e07234ecb33c4272bdc117cf112e622562cbd57cffcae361417b735b1d37c7d20e0e5b0e5167fff0596b1d0ce1e03e4eb4e5cb949d2f1264e6527f54885b4ffb332075b33e69a5d6555e365ca6505659f2ee72b59a2d4ee83b60f30fa2495abd8af9d4ec752882b817595b8e2037f9e7092376892a96a2d2074ce57daa98e8b419b86f44c4272792ad9965a31d5ebf5ac2ee04e4fa6459c7f76ff8e6239eacae0b1656765a7351202178e7508563f7878387fea41a989b67203370f2ffc6c12b75f7611bae6306c9be0c9775c7b8794cb3a67a0979853b52a1c06cd04c0d3368410d140bdd8ce4e51bd96ebd1c417ae7fa505c92df03f5771233bfed1c3ce65ec015657c386caa96fe69bc24c8ee867a44f5bcae270c65d05b06c74d50654afb4c78760114584d12357adfd08bd0c3abe745c971d7e7a4c3726c84383e12cddde30fa416bf040fd05b5f503b59a6dbe25432fae5c6dfebf3f0bc32829fed8f5b370eb1529164b3deeb248cfa2fffdc052940a9f561ccf0b6da3b974008f24a7ca620c54be8ec5da0ba6df2a44e2f30e949a4f8857638749134572a61f889da688529cf1eadecc6648a8fbf04717e2c8e9e17b24013a7b6fdaa9272017b63c38578f8bef0b35f010f26ea88ffac9848ae20f8b41e1d8542c165296c6402e3015a62ec08072daf5fa26a18e4548250bf0d9f012d151e48ada51d84b369578c20b61169332d2757cf1ef3f4e917af7afc8318a677472252a0d7a7cf4d67b7bf5efc106e6e7e31c8da26fb26a0eb2f7f06e619df0a9e2f837be2314817c80a6b414326c53ca8a94fc0b49ac88945cbb8f886d9218e782bb1e8e6eb0bf8dfb88367bc64992fbe120942a9c5087b53a0f212e2271c7ba12d84d6054a5e8faa31f7d1ea03744f0b5d51bd5a11e73879203740ff5271c5626afb51340339c28aff9e2a6419bf6826ff2c0ec9ff6aa3d0c24ed3cd5707ef593bfcc501c58d8f615ddc3ba78873042778965fde56f6109239655adcb8ef81e9976631085c1c582398854c6256803d78353517f06acacc89b2b24dd43877d0f27b87674702530f17f32efeca23e57777886f78df1df4e548dd5f13a43e101d4dc5c2beef4264e7e8de60a6627a89b215ba392c5ee44f45151020fc02929a77e7f36d2b8bf767f6fcf852d757e32ddae81b147887bb9ff5341985434b9373581bacaec6d2f84ab59572a217b89c3e9dc6e4c648e7509730b1ce4efdbcb2114756ba87e9ada08c45cbb8fbfd5f6a9d2d90096a970b701a3f0b8af593b92fcce616f302153fc6961f669bfe1533ff068874767adbac8353651c31db707ea714a52ef6eb1fff7631fd43ce41aa1acc086a80cdffcba0265277af5129d154e8326875f4794d3a09ee46199483d1f0fd8e2b6ac5e506eb665eb0a652d97e86075f15b3a0b9d65c57852cc5039d2ac30df7868edf41ebf1d6c16780962fbd9ce1d6359b2f3f6d1361800650bc90e49caced00c09cc6d1e5d9cb648471271ec76b3e97df9b0d0a918840a35808217b6efeaaa1a597531f95a4ebbc895da76076590032e920b8b9861c7f095cc04a3b64a4d6a08f637bbdbac7e15255106f35205f1385c02985adf0b6ae0ee8711d3b1e2b108f791f94aed4c45177754acfe2072e753b4d13754cc85397e24976cc48ca7e6c759f66b3c6bff84febeb2f8474ee658d8ea4265f51c6b88c331d9f9997e517c6c2b7284994e4f7f185ae45d133c13747a9881593f5160eb60ca9972313e4c9373dc5c7a1c36f2132576650e5833472c2e0966617291a1528d9b0347d4d98457f7604efbf83c5b6fb65ff03e75a71daed50c27b9443b17f5622b56cc1c7361fe5fdae217f0db41982224fb6077d9d7c2ed6a826cddf2df221ff0d19bd89654798a6dd14b2fd655c54ca660a45f5b3e6df9d1d2cfe9a21f8a3f3bfa84c71845bd087cb48a997c78af1b7d6abd3fe6984b2147642126af02fbfca20c5b6d1bfba11393ff955e4823ffbc32f097d1fddb8930882e64b10a64ccb4e6fc82217d535095d46519c0d086848dbfbceca07ec4dd678223e2d96befabde56e9d374d111cf354637a7f46b25de94df16c9d5649f65f2d8d3f11f745714dcd3e9a33309e6e54d7b2e2acaf75204dc187af3aec33a1bf4e20c7ecd199f530a8f3646619723afb37570131c3bc7d8a451b9bb4ebe4bcea9e7cf00faf09f7b43f2430be02267a357e2eb247447a03f70583ef3e26bf68786bf2177eb917925f9bb6c397f86b1ba789ac8d3db9357ca2d841d6983390b46d5c5796eb0f44fa8919ddf32518f3bb7d5e6c5f18f060e3503489df65e9535a916ba6fab5ccf9478142647790709b569582a13d140834cb94343b47d47e3cee51e0d43cf3e77cd2e353cb4084ec1e785a489fd5f5d0b581f9549c17389870e577e28e0f0b12197771a59c35fa3ebcb2fe55eb9debe85ea05d12f5ddc267ac2492b38df9286ffd605cc1cf0e97ab716a85d84d11edf6cb96e8b3180e7c4a6f039991fb283f74f31d12874853f7f56aa0275eb4e48e9cd9e9e12bc877e9447f0fc9af6db662f88c38a0a7d4b5239a03bb8f91c6c684e4a70b8d528505647f397e23cd83b2b75d532000a0acb6f322ffe6a64e2393eaddda49f9c5fcac46cc6b2e0c3defc3a657ce6e56630cbf142089003a623c171ab0c64050782db55da6e3d11c4fda0092ca7fc71615915ba6abf949583f8d260869d67b79d1086be52decba2d3db97f0c41fa66baa14de8d149c5d5953ef5873a6933c1ad496e013638d2ee1567659e7017c96985b8fce898bcf4416d333b27a6c2ad1b2f4851603463b37ec764a80df8dc180e6a7dd8acaf7211bd6dd2bcd3edbaaff9237bdb3c2e7554147308be8832843396e5588b3a26418f6860efe3873537ed4be91e56026be4333118498ce27b4d9797cf4fb90fb4fa6172642d29dcfd255665869204620b7d9052d90cd0d8cdca55f4d8bbecc83602ed8e45d6b030622c8da0f1985fd79336c4bf34d716107584d31af2ed2a52b5c9076665534f219762c558a361fec1ab08ed639eb7624bc614b87a8f84b8dbb78411295f3b0221550cce66cc99f4df72561471a54a570bdf100c26172094906450499443c9baf72841cead3f0c77d62c620e2331fcc5e0967f53ccdb7b3c931a29e4404c71c67e9ee10b29ae0f9862c1fc1785ad143de0e4901a3e6d93bfe1d0cfba48f17891bc063d97bc42a5c5bd1aec50739e320fb0bb5a8d835cfecc50283cfdae5d02dea468f8163ceb817fb3d29726f75aeefefea94ebf5ef1755450311897219703d768dad9ede4bab52d7b67512f0435e226424cfa85b33745909c1d7ce8162b262ececf89614ea7e0ca6902a5168720310eefa56539a03839ec47cd0dd6fc0de9bba4bd4f6ec436cb6503a734d8c115d309a22a139b65f08817126bbeb46d05658de7206d1035dd048a2d5af0f234f6d2fdb98ea83cdf176950f7f2624cbabfd8ee41d9a96a05fc03cceb5cdf8e45c2338d614ef6a015003bcb9c06b56238957e03d0a16ccfa44509308a3a0e0af080168259390ea8113f4f5b3f0ecb456fc53a3a465acb0b840f65ffa51fcd89e776bae79e0e0094525d809e96f6e0b1e5a293b93a19ff2c2accbafff288fb2b0315b2a15ecc22619be5e86a0870c6d8943a861695b14669de9742e588b3e4976e863f01d044e2d858629361dced891e9cd6e2b603fcecf3b93f0281cf1171915b1ee9ae5152f3104697331ae0ba920d776703c8342782b122be8e4c582c003eff358acc26e244e72e03efcb2a0e08b73cfe3fb006d780792207f4ea129ffc019d69e63e4bb17651e8f1b9ccc020387f381ba7035fe60c492e676740e42ec7118181d5f953c6bcb45ce3166682a46445e3a9115524c4044f53770f0d7694e42900fff7b9c9f569e75f28fdd4f80e4b375a3b9237d766077574bb341edd95133cfaba2c36196656f122b4940653f55951cdb131a21fefccadc36ed566cb08f503f3d268845fb96dbc07a6094e1a1c7d3b6784dc31303fc75c0fab7e4b3c04885c85b868770b25db74c7625734c6487e3d88e727fb180dec9f2afe28408cb93dfcbcced693716e8a7040a7fb52a9fc0f2fee6dfd8e1759692ffbd816f6fd87d189686665f26182d6e1a29802de8d60c331c5f30cf3a6f0d02991e3315b228b3d1ced2f1481fd015d33b0679891079f78023cb398a50dd522b509d9cc12df6546bf9f791a96b8c52fac716853af0df205b31f7b3d7aa6a33570fb18582a1dc78d255bb6b2c38f386f7a3fdb9e11692559513e667deeda2715afb453b31b2fe900802e3d294bb68f92d69cde0c2c114fe1cdfcc3987e1fc2c05ced26818f633373af23f14ea2e1068fe1be0f2a617d706b3d9961d64925bc7911f100d6937828176dcb8e07357a4ed7e88b4ef6ad4a0749f821bfe2bed1c6316f743d61fc4483c265a443dec5f918924efcab9ccf376d7b23af408800ad608aa54cfba7edeb95270235a10f4c4a49baf515d4422f67c45075b3fe7cfbb3a7ecb578f57d8b92720831b7f504ed3889d9388c25550e38bb99c9e3cfe5287eea050672b2e957a27920d3211661f9f7f0e5695c3cf4bccd6172be26a3314ece4b76426b0fb4abdb1e20f4e8aa47645cfb8a6384dae38238167eca139b66c99b0fb1817234b5b0b16536f6cb14a4c9a050890ea16e20834b6858489bd5408921c2d8c14df42ef05ae851635fc2ccfc44dc872d40039d1423c779674845566376f545d368bd0ca10661997c2d811ba03e9f93c84afed5cea1c35f71a95db5ee9b71c44c93cf6dd4425d3434b24df60c1528c754241833c5f1ade59016e5e5eea5c5b655adc21257c82c616f0607d4d7ba1b1c925b5649b20a6", 0x1000}, {&(0x7f0000002e00)="711e24f8c1195ca90842f8e23f010d62e2c7578219f2cb427d02a43c410af8118eff01ceb2528f436b475d1c776a84698ba635697096a45be6e158353b1991f311ea479436120e1416323e234aefaeb148ca5a2c1a52d18da6dee321c9e4ff6f7f59dee553d152c46b626060d75236be9381d63cae84361f91ac5bd40296773aa53c9a29ec30592d86d80fff88227f7b1b67bf94e517f4a2991a32ce2609b70de9d3d639f7a4d7245a82daaebb0ecd52e0b08e59be66f85aef6de75d66fb2c7d2ab7fe5d7543f482c0e1a05a7a2438daec2a96c6e3e58512aaffb7f14242b31084abc15cee585a48", 0xe8}, {&(0x7f0000002f00)="6f9755d19915588d6f525a77454d8338fc8335a0ac0dc510a94333d1d9321e9b1ea21d69c1c9e575c9e53fa2109973169857df8329610eb474e62fea0e189dc7ec7967653c4f7a5e9258d6425afc383ad4f429a579710cb10c721bea741565c01288ab3cec0406afeb30e6636c583829ba68524bed99188595", 0x79}], 0x7, &(0x7f0000003000)=[@rthdr_2292={{0x78, 0x29, 0x39, {0x5e, 0xc, 0x2, 0x80, 0x0, [@local, @loopback, @mcast1, @mcast1, @dev={0xfe, 0x80, '\x00', 0x34}, @private0]}}}, @hopopts={{0x180, 0x29, 0x36, {0x2b, 0x2c, '\x00', [@padn={0x1, 0x2, [0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x812d}, @enc_lim={0x4, 0x1, 0x5}, @pad1, @calipso={0x7, 0x8, {0x3, 0x0, 0x0, 0x4d}}, @generic={0x1, 0x55, "d67e1ba64a78fdb0d567dec777510365052d0b65c81656e0feaef62ef4bdb3f46ff96454990465775878af3d536f0e24602d5a827c9cb6e72dc955ef7c8ffcc3b090031618939e151bf879bec8c8f9a380b780c68f"}, @generic={0x80, 0xce, "2ce52a08de0777b83c6c9a2aa808c1cf06005c712c9255fde2cbd269d39bad64bbeebd311e7b21b5bd9b0a1906f6be8852bd3b409fd8b185669f9194ae0a29fe70058c8f6caf501b68bc76b52db4f09b9f877628286389bbd8153a5f8e7ec09cdfb9122ac55c77d8bd569edd7d19f34e795b815ad143a65d619cf904db74e859122c4757dc4f3bf4f0d5c5664db40a5c6df61dd7e3838105a1c8b1a5d89b8f456d774462488733f37eaf4c664388e088f7c28bf60fc8021f7b94280f0d1a62a03d34bf33b4e474c79e79607ac95d"}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @hao={0xc9, 0x10, @mcast2}]}}}, @rthdr_2292={{0x98, 0x29, 0x39, {0x3c, 0x10, 0x1, 0x3, 0x0, [@private0={0xfc, 0x0, '\x00', 0x1}, @private1, @dev={0xfe, 0x80, '\x00', 0x1d}, @remote, @remote, @mcast2, @dev={0xfe, 0x80, '\x00', 0x20}, @rand_addr=' \x01\x00']}}}, @rthdrdstopts={{0x18}}, @hopopts={{0x30, 0x29, 0x36, {0x2c, 0x2, '\x00', [@jumbo={0xc2, 0x4, 0x8}, @enc_lim={0x4, 0x1, 0xe0}, @ra, @pad1, @ra={0x5, 0x2, 0xfff}]}}}, @rthdrdstopts={{0xb8, 0x29, 0x37, {0x1d, 0x13, '\x00', [@enc_lim={0x4, 0x1, 0x4}, @calipso={0x7, 0x40, {0x0, 0xe, 0x1, 0x100, [0x7, 0x1, 0x0, 0x20, 0xffff, 0x1, 0xfff]}}, @hao={0xc9, 0x10, @local}, @hao={0xc9, 0x10, @local}, @calipso={0x7, 0x30, {0x0, 0xa, 0x1, 0x20, [0x81, 0x9a, 0xb3, 0x7fff, 0xa509]}}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}}}], 0x3b8}}, {{&(0x7f0000003400)={0xa, 0x4e20, 0x5, @remote, 0xa074}, 0x1c, &(0x7f0000003600)=[{&(0x7f0000003440)="1a60c87017c19dba7f048f20571a84b941ff75bb8af64ebb2b24e2d8b1cae9fb25ce0220619a81c08b436aa3674077becb818a83a218e7e6e2220bcf924de224df53f7cfe802c4d8431e8db5279923c2acc201f25bfbbb24e067a6691a9735533354ebb476ef94ff0b4c3e0f", 0x6c}, {&(0x7f00000034c0)="2b23c1ba09ef8562add70fb885a4a19702550d72e8a8d80b6f65de409e1796c20d4207a94e125c6d9841b2e81ae848b354e7d701020f0d121dbcfbd5e6cf21bc695877a187f032e093d91588fc630030e1b1d3f74e67f001d9277e7bc9e2461df3a2814d57b02543a8b0db7e98b5f3dd8a75acd01ed816770c01e7517f31ea93502180903925992b09a821d7d82b6a7a7931a4bacafe34551e88f2c3eb11327df734cb05a00ba7060a31c366d7a78a0d02688d65b8446a7f467eb71af1a0b3ea65904ede0f3b", 0xc6}, {&(0x7f00000035c0)}], 0x3, &(0x7f0000003640)=[@hopopts_2292={{0x28, 0x29, 0x36, {0x3c, 0x1, '\x00', [@ra={0x5, 0x2, 0x7f}, @ra, @jumbo={0xc2, 0x4, 0x400}]}}}], 0x28}}, {{0x0, 0x0, &(0x7f0000004780)=[{&(0x7f0000003680)}, {&(0x7f00000036c0)="866043abf7d8d109889d7226d9180c2eed76ed0ee43315d23ca34eb67142ed4907b035dd33237414bf424c6c636309928175b8203d72f6c8cfbf835c25235b5744de73287a3b7925aea7b667bb9c65ec48228f29cd1676dea34b1048a444f0e4ed62caff1a7024c44380b3b2dc29e8a229f1730e8ad05582a89903", 0x7b}, {&(0x7f0000003740)="bd52331ef8fb608d77375fab47", 0xd}, {&(0x7f0000003780)="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", 0x1000}], 0x4, &(0x7f0000004c80)=[@dstopts_2292={{0xa0, 0x29, 0x4, {0x5e, 0x10, '\x00', [@calipso={0x7, 0x28, {0x2, 0x8, 0x2, 0xfff, [0x6, 0xfffffffffffff001, 0x1000, 0x1]}}, @ra={0x5, 0x2, 0x20}, @hao={0xc9, 0x10, @mcast1}, @enc_lim={0x4, 0x1, 0x39}, @calipso={0x7, 0x20, {0x2, 0x6, 0xdd, 0xc0, [0x3, 0x48c5, 0x5]}}, @enc_lim={0x4, 0x1, 0x2}, @ra, @jumbo={0xc2, 0x4, 0x4}, @hao={0xc9, 0x10, @dev={0xfe, 0x80, '\x00', 0x44}}]}}}, @dstopts={{0x118, 0x29, 0x37, {0xff, 0x1f, '\x00', [@pad1, @generic={0x3c, 0xe0, "44dc761175f1783f98d15e0714bb5efca77ddf737efd1fac3044e7fa1e7f9aa263a66ba7bfbb8c130e8c42464dab5ed62a4f35334705313bd3c2c6ebcaf6f875747217196dc0efa5730e0d7dd31227c1bf04777f7d3b8b315fb4aa395da4ef29fa51932bec821a422be052d0dfdeb406f0e99f1703ac434b0b1ef8f60c0b53d5a51f9ca222e56916e4111f636b3aa30e049343e11817d7449900192d6cc392b87e41b5587ad396d6f4d40674b14d36a7ef6595d2a32ababef078a2a8fc24aa33c10af815d898f8398ab669c79b11c04bf34d0345de4662a0e33d0a418a5862c6"}, @ra={0x5, 0x2, 0x2}, @ra={0x5, 0x2, 0xffff}, @hao={0xc9, 0x10, @private1}]}}}, @rthdr={{0x68, 0x29, 0x39, {0x2b, 0xa, 0x0, 0x1, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @mcast1, @ipv4={'\x00', '\xff\xff', @local}, @remote, @mcast1]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x2a80000}}, @hoplimit={{0x14, 0x29, 0x34, 0x8}}, @pktinfo={{0x24, 0x29, 0x32, {@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}}, @rthdr_2292={{0x78, 0x29, 0x39, {0x3a, 0xc, 0x2, 0x9, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @local, @dev={0xfe, 0x80, '\x00', 0x3e}, @loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast1]}}}, @rthdrdstopts={{0x20, 0x29, 0x37, {0x3b, 0x0, '\x00', [@pad1]}}}, @tclass={{0x14, 0x29, 0x43, 0xff}}, @hopopts={{0x48, 0x29, 0x36, {0x3b, 0x6, '\x00', [@calipso={0x7, 0x28, {0x3, 0x8, 0x0, 0x9, [0x100000001, 0x4, 0x6, 0xb8]}}, @enc_lim={0x4, 0x1, 0x81}, @pad1]}}}], 0x370}}], 0x5, 0x4000880) r6 = socket$netlink(0x10, 0x3, 0xf) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r6, 0x8983, &(0x7f0000000200)) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), r2) accept4$packet(r3, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000180)=0x14, 0x800) 02:29:02 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) r4 = fcntl$dupfd(r1, 0x406, r3) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x7f, 0x7, 0x4d, 0x0, 0x0, 0xfd4, 0x80440, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080), 0xe}, 0x18100, 0x401, 0x800, 0x9, 0x1, 0x3ff, 0x4, 0x0, 0x401, 0x0, 0x8}, 0x0, 0x5, r4, 0x0) read(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0xc6) r5 = creat(0x0, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r5, &(0x7f0000000140), 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r0) 02:29:02 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) [ 890.331271] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 890.334703] Call Trace: [ 890.335631] dump_stack+0x107/0x167 [ 890.336852] should_fail.cold+0x5/0xa [ 890.338115] ? create_object.isra.0+0x3a/0xa20 [ 890.339632] should_failslab+0x5/0x20 [ 890.340923] kmem_cache_alloc+0x5b/0x360 [ 890.342182] ? kernel_text_address+0xf2/0x120 [ 890.343707] create_object.isra.0+0x3a/0xa20 [ 890.345052] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 890.346765] kmem_cache_alloc_trace+0x151/0x360 [ 890.348220] ? find_held_lock+0x2c/0x110 [ 890.349653] p9_client_create+0xaf/0x1090 [ 890.351096] ? lock_downgrade+0x6d0/0x6d0 [ 890.352506] ? p9_client_flush+0x430/0x430 [ 890.353946] ? lockdep_init_map_type+0x2c7/0x780 [ 890.355700] ? rcu_read_lock_sched_held+0x3e/0x80 [ 890.357367] ? __raw_spin_lock_init+0x36/0x110 [ 890.358939] v9fs_session_init+0x1dd/0x16a0 [ 890.360328] ? kmem_cache_alloc_trace+0x151/0x360 [ 890.361964] ? v9fs_show_options+0x690/0x690 [ 890.363538] ? kasan_unpoison_shadow+0x33/0x50 [ 890.365177] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 890.366902] v9fs_mount+0x79/0x8f0 [ 890.368210] ? v9fs_write_inode+0x60/0x60 [ 890.369679] legacy_get_tree+0x105/0x220 [ 890.371205] vfs_get_tree+0x8e/0x300 [ 890.372493] path_mount+0x13be/0x20b0 [ 890.373814] ? strncpy_from_user+0x9e/0x470 [ 890.375331] ? finish_automount+0xa40/0xa40 [ 890.376802] ? getname_flags.part.0+0x1dd/0x4f0 [ 890.378578] ? _copy_from_user+0xfb/0x1b0 [ 890.380251] __x64_sys_mount+0x282/0x300 [ 890.381818] ? copy_mnt_ns+0xa00/0xa00 [ 890.383299] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 890.385327] ? syscall_enter_from_user_mode+0x1d/0x50 [ 890.387312] do_syscall_64+0x33/0x40 [ 890.388774] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 890.394117] RIP: 0033:0x7f8ff0aa5b19 [ 890.394644] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 890.398866] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 890.400588] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 890.402448] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 890.404050] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 890.405651] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 890.407652] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 [ 890.413165] FAULT_INJECTION: forcing a failure. [ 890.413165] name failslab, interval 1, probability 0, space 0, times 0 [ 890.414856] CPU: 1 PID: 6131 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 890.415821] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 890.417750] Call Trace: [ 890.418150] dump_stack+0x107/0x167 [ 890.418677] should_fail.cold+0x5/0xa [ 890.419227] ? v9fs_mount+0x5a/0x8f0 [ 890.419768] should_failslab+0x5/0x20 [ 890.420304] kmem_cache_alloc_trace+0x55/0x360 [ 890.420909] ? v9fs_write_inode+0x60/0x60 [ 890.421456] v9fs_mount+0x5a/0x8f0 [ 890.422447] ? v9fs_write_inode+0x60/0x60 [ 890.423600] legacy_get_tree+0x105/0x220 [ 890.424763] vfs_get_tree+0x8e/0x300 [ 890.425835] path_mount+0x13be/0x20b0 [ 890.426921] ? strncpy_from_user+0x9e/0x470 [ 890.428153] ? finish_automount+0xa40/0xa40 [ 890.429389] ? getname_flags.part.0+0x1dd/0x4f0 [ 890.430698] ? _copy_from_user+0xfb/0x1b0 [ 890.431839] __x64_sys_mount+0x282/0x300 [ 890.432956] ? copy_mnt_ns+0xa00/0xa00 [ 890.434045] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 890.435488] ? syscall_enter_from_user_mode+0x1d/0x50 [ 890.436978] do_syscall_64+0x33/0x40 [ 890.438147] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 890.439705] RIP: 0033:0x7f5cd1c4db19 [ 890.440827] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 890.446493] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 890.448907] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 890.451098] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 890.453346] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 890.455526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 890.457757] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 02:29:03 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x10000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:29:03 executing program 6: r0 = syz_open_procfs(0x0, &(0x7f00000000c0)='timerslack_ns\x00') pread64(r0, &(0x7f00000001c0)=""/96, 0x60, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x10010, r1, 0x2eae7000) 02:29:03 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) r4 = fcntl$dupfd(r1, 0x406, r3) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x7f, 0x7, 0x4d, 0x0, 0x0, 0xfd4, 0x80440, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080), 0xe}, 0x18100, 0x401, 0x800, 0x9, 0x1, 0x3ff, 0x4, 0x0, 0x401, 0x0, 0x8}, 0x0, 0x5, r4, 0x0) read(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0xc6) r5 = creat(0x0, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r5, &(0x7f0000000140), 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r0) 02:29:03 executing program 5: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffc}, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) rmdir(&(0x7f0000000140)='./file0\x00') openat(r0, &(0x7f0000000080)='./file0\x00', 0x200000, 0x82) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0xd4d002, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r1, 0x400c620e, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f00000001c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="0000000000653000b58a18240ad7f11d624006d5f10e6b7c61d4dbf1a4c72e7d00fcbc7696c84a3c36e823389b1ebda445fa2cd70e5a1c8915d28af0611735657e81942b57cdc31bb64ec0c540430f4f4b0dd150c083bfddca6ffb1192041799eafc1ecc2bee4a0547afcec0dc2d026462b1f751ee84c349426f6ae7b0e3e6059f1c33f39c8f94ba3a5fb06b5f16c5bd794230fbd3141f1da504dcba695aa161a7"]) r2 = syz_mount_image$nfs(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x5, 0x7, &(0x7f00000006c0)=[{&(0x7f0000000300)="c7050edee98f8279f504bc540ec87d934a3e63da52b50ee5332536620613e31be5a172b39d43078dad4ea5e7", 0x2c, 0x9}, {&(0x7f0000000340)="b3e9220bfa6ddd94d46a9bebdf784c67cdbe5548a0c530ced416ea354364fc402c61d42a790a9c94e6fe32f2d7e2f3718305a10692050c093e51ed55e23a5bd0bbcada13201454c7706746e050b28118d0277456bbfca62a7db34813c0190d6dc6b8622de0edcfd344632925233bf8c9ccb18d45c9d1591edbf3d9bed4ae6aeae693afe197c5f4e058615dedf33d1b2c612ff11312ec18369cb59bfb673c16b6fdc4949b320332778d5ae53af6c79cadcc7ab59397af168cf6f77bb92948e99e407e6680758a29a8aa7e543ae21be14efd03f943124ee5a405ce013ef683f695542f375072a68c75817807c0dcd6075573deccdde94ced79", 0xf8, 0x3f}, {&(0x7f0000000440)="722be02bce0edb3ad5aebf6cb8b34e263c69cc7721441faf24ac0b5e111f51ba64798cfe2ade54d9ac08", 0x2a, 0x5}, {&(0x7f0000000480)="cd508b4de58e38ae2cb0f3d49f69074c50de3c7a2945a45d0f929add6733df16e76429f39f4529879dac5ed147ac6f9deb8f0c0abc6b6ac0c2985f", 0x3b, 0x100000000000000}, {&(0x7f00000004c0)="e9e065497ac2102059c4f5bafb928d799f19fa09f63d2086a6bbd96b56f824072fdc913b47628d0f700fc8f1c3ac4d729d8396b27a5975aa6c118912e4b24036dfece1e7fc46e2f03fc11dc646965f", 0x4f, 0x5}, {&(0x7f0000000540)="2db3f23ece58201928bcffba1002f24173ec257dc9c4b7d31008ea691c8079ec9e3ff9a3a03d9d29d80a13b83394e9145147ad6b2ce8443fd298969720182f45be67f054e76e9f21ec5cafa5832e3f41351979383c7163d7b81c59ab88ba6cd9d36420fe3b49e7f38202e63263a12a9b51d6e84525e749b284b18448944c924795944752074b54dd8c8b2010cf5401aa08a4d51a1c0122e1d1068773afc5727d24ab39146bc4e68b553cd9918254f606fc5c0e", 0xb3, 0x9}, {&(0x7f0000000600)="e3cfde983c51a40391ddca96c18d989982de6ae85ed8787c576286b37e760c79ce9f44d81b98150e2741363d487fa8f49c1a36dec63a72821733caec40c59f0f0a244f0a0d1f81dab90c72aa0b0f67b81e3607af92b462989ed9d17d39b7df1c9c571c6ef0e57f8e1886adbbd8cabf283f871eb87be129b5f6f66835d8d02d0a82a01219cfdfdbeef479e6e27cdceee9248c8f9c", 0x94, 0x5}], 0x1080010, &(0x7f0000000780)={[{'/dev/hwrng\x00'}, {'^@z\'{[(h'}, {'/dev/hwrng\x00'}, {'rpc_pipefs\x00'}, {'/dev/hwrng\x00'}], [{@fowner_gt={'fowner>', 0xee01}}]}) renameat2(r0, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000800)='./file0\x00', 0x1) 02:29:03 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) (fail_nth: 4) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:29:03 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 22) 02:29:03 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:29:03 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 17) [ 890.648897] FAULT_INJECTION: forcing a failure. [ 890.648897] name failslab, interval 1, probability 0, space 0, times 0 [ 890.651534] CPU: 0 PID: 6159 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 890.652662] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 890.653935] Call Trace: [ 890.654506] dump_stack+0x107/0x167 [ 890.655240] should_fail.cold+0x5/0xa [ 890.655831] ? __d_alloc+0x2a/0x990 [ 890.656313] should_failslab+0x5/0x20 [ 890.656825] kmem_cache_alloc+0x5b/0x360 [ 890.657378] __d_alloc+0x2a/0x990 [ 890.657897] ? rwlock_bug.part.0+0x90/0x90 [ 890.658791] d_alloc_parallel+0x111/0x1aa0 [ 890.659788] ? __d_lookup_rcu+0x6b0/0x6b0 [ 890.660361] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 890.661513] ? _raw_spin_unlock_irq+0x1f/0x30 [ 890.662291] ? trace_hardirqs_on+0x5b/0x180 [ 890.662877] ? lockdep_init_map_type+0x2c7/0x780 [ 890.663993] ? _raw_spin_unlock_irq+0x1f/0x30 [ 890.664596] ? lockdep_init_map_type+0x2c7/0x780 [ 890.665494] __lookup_slow+0x193/0x490 [ 890.666042] ? lookup_open.isra.0+0x1230/0x1230 [ 890.666714] ? io_schedule_timeout+0x140/0x140 [ 890.667364] ? inode_permission+0xa4/0x380 [ 890.668116] walk_component+0x41e/0x6a0 [ 890.668673] ? handle_dots.part.0+0x1540/0x1540 [ 890.669356] ? walk_component+0x6a0/0x6a0 [ 890.669954] path_lookupat+0x1ba/0x860 [ 890.670982] filename_lookup+0x19f/0x560 [ 890.671646] ? may_linkat+0x230/0x230 [ 890.672185] ? __check_object_size+0x319/0x440 [ 890.673098] ? strncpy_from_user+0x9e/0x470 [ 890.673906] ? getname_flags.part.0+0x1dd/0x4f0 [ 890.675034] do_readlinkat+0xcd/0x2f0 [ 890.675926] ? cp_compat_stat+0x830/0x830 [ 890.676785] ? fput_many+0x2f/0x1a0 [ 890.677269] ? ksys_write+0x1a9/0x260 [ 890.677819] __x64_sys_readlink+0x74/0xb0 [ 890.678734] ? syscall_enter_from_user_mode+0x1d/0x50 [ 890.680183] do_syscall_64+0x33/0x40 [ 890.680892] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 890.681610] RIP: 0033:0x7fa88322fb19 [ 890.682138] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 890.685828] RSP: 002b:00007fa8807a5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000059 [ 890.686979] RAX: ffffffffffffffda RBX: 00007fa883342f60 RCX: 00007fa88322fb19 [ 890.687956] RDX: 000000000000003f RSI: 00000000200001c0 RDI: 0000000020000180 [ 890.688942] RBP: 00007fa8807a51d0 R08: 0000000000000000 R09: 0000000000000000 [ 890.689961] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 890.690991] R13: 00007fffce6f4cef R14: 00007fa8807a5300 R15: 0000000000022000 [ 890.692328] hpet: Lost 1 RTC interrupts [ 890.729058] FAULT_INJECTION: forcing a failure. [ 890.729058] name failslab, interval 1, probability 0, space 0, times 0 [ 890.730729] CPU: 1 PID: 6166 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 890.731695] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 890.732889] Call Trace: [ 890.733273] dump_stack+0x107/0x167 [ 890.733790] should_fail.cold+0x5/0xa [ 890.734301] ? create_object.isra.0+0x3a/0xa20 [ 890.734912] should_failslab+0x5/0x20 [ 890.735424] kmem_cache_alloc+0x5b/0x360 [ 890.735976] create_object.isra.0+0x3a/0xa20 [ 890.736560] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 890.737247] __kmalloc_track_caller+0x177/0x3c0 [ 890.737876] ? v9fs_session_init+0xa7/0x16a0 [ 890.738450] ? kernel_text_address+0xf2/0x120 [ 890.739040] kstrdup+0x36/0x70 [ 890.739472] v9fs_session_init+0xa7/0x16a0 [ 890.740028] ? find_held_lock+0x2c/0x110 [ 890.740569] ? kmem_cache_alloc_trace+0x151/0x360 [ 890.741200] ? v9fs_show_options+0x690/0x690 [ 890.741825] ? kasan_unpoison_shadow+0x33/0x50 [ 890.742437] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 890.743116] v9fs_mount+0x79/0x8f0 [ 890.743600] ? v9fs_write_inode+0x60/0x60 [ 890.744158] legacy_get_tree+0x105/0x220 [ 890.744773] vfs_get_tree+0x8e/0x300 [ 890.745279] path_mount+0x13be/0x20b0 [ 890.745822] ? strncpy_from_user+0x9e/0x470 [ 890.746402] ? finish_automount+0xa40/0xa40 [ 890.746996] ? getname_flags.part.0+0x1dd/0x4f0 [ 890.747636] ? _copy_from_user+0xfb/0x1b0 [ 890.748213] __x64_sys_mount+0x282/0x300 [ 890.748777] ? copy_mnt_ns+0xa00/0xa00 [ 890.749321] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 890.750050] ? syscall_enter_from_user_mode+0x1d/0x50 [ 890.750779] do_syscall_64+0x33/0x40 02:29:03 executing program 6: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd(r0, &(0x7f0000000080)={[0xfff]}, 0x8) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffb000/0x2000)=nil, &(0x7f00000b0000)=nil, 0x0, 0x0) r1 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000000, 0x20010, r0, 0xbe6a4000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0xca0cc, 0x7, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xfffffffffffffdff, 0xffffffffffffffff, 0x0) bind$802154_dgram(r1, &(0x7f0000000000)={0x24, @long={0x3, 0x0, {0xaaaaaaaaaaaa0002}}}, 0x14) connect$802154_dgram(r1, &(0x7f0000000180)={0x24, @short}, 0x14) sendmmsg$sock(r1, &(0x7f00000021c0)=[{{0x0, 0x0, 0x0}}], 0x324, 0x0) [ 890.751322] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 890.752204] RIP: 0033:0x7f5cd1c4db19 [ 890.752761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 890.755338] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 890.756369] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 890.757341] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 890.758321] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 890.759271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 890.760215] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 890.924082] FAULT_INJECTION: forcing a failure. [ 890.924082] name failslab, interval 1, probability 0, space 0, times 0 [ 890.925919] CPU: 0 PID: 6174 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 890.926924] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 890.928118] Call Trace: [ 890.928507] dump_stack+0x107/0x167 [ 890.929032] should_fail.cold+0x5/0xa [ 890.929572] should_failslab+0x5/0x20 [ 890.930149] __kmalloc_track_caller+0x79/0x3c0 [ 890.930784] ? p9_client_create+0x41d/0x1090 [ 890.931383] kstrdup+0x36/0x70 [ 890.931802] p9_client_create+0x41d/0x1090 [ 890.932651] ? lock_downgrade+0x6d0/0x6d0 [ 890.933710] ? p9_client_flush+0x430/0x430 [ 890.934775] ? lockdep_init_map_type+0x2c7/0x780 [ 890.936226] ? rcu_read_lock_sched_held+0x3e/0x80 [ 890.937546] ? __raw_spin_lock_init+0x36/0x110 [ 890.938821] v9fs_session_init+0x1dd/0x16a0 [ 890.939837] ? kmem_cache_alloc_trace+0x151/0x360 [ 890.940950] ? v9fs_show_options+0x690/0x690 [ 890.942117] ? kasan_unpoison_shadow+0x33/0x50 [ 890.942784] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 890.943455] v9fs_mount+0x79/0x8f0 [ 890.943919] ? v9fs_write_inode+0x60/0x60 [ 890.944508] legacy_get_tree+0x105/0x220 [ 890.945521] vfs_get_tree+0x8e/0x300 [ 890.946294] path_mount+0x13be/0x20b0 [ 890.947438] ? strncpy_from_user+0x9e/0x470 [ 890.948820] ? finish_automount+0xa40/0xa40 [ 890.950090] ? getname_flags.part.0+0x1dd/0x4f0 [ 890.951540] ? _copy_from_user+0xfb/0x1b0 [ 890.952455] __x64_sys_mount+0x282/0x300 [ 890.953083] ? copy_mnt_ns+0xa00/0xa00 [ 890.953707] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 890.954508] ? syscall_enter_from_user_mode+0x1d/0x50 [ 890.955288] do_syscall_64+0x33/0x40 [ 890.955851] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 890.956597] RIP: 0033:0x7f8ff0aa5b19 [ 890.957140] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 890.959922] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 890.961058] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 890.962135] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 890.963179] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 890.964200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 890.965246] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 [ 890.966665] hpet: Lost 2 RTC interrupts 02:29:03 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x20100000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:29:03 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 23) 02:29:03 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r2, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) r4 = fcntl$dupfd(r1, 0x406, r3) perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x7f, 0x7, 0x4d, 0x0, 0x0, 0xfd4, 0x80440, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080), 0xe}, 0x18100, 0x401, 0x800, 0x9, 0x1, 0x3ff, 0x4, 0x0, 0x401, 0x0, 0x8}, 0x0, 0x5, r4, 0x0) read(0xffffffffffffffff, 0x0, 0x0) creat(&(0x7f0000000180)='./file0\x00', 0xc6) r5 = creat(0x0, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, r5, &(0x7f0000000140), 0x0) ioctl$FS_IOC_GETFSLABEL(0xffffffffffffffff, 0x81009431, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r0) 02:29:03 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) (fail_nth: 5) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 891.181023] FAULT_INJECTION: forcing a failure. [ 891.181023] name failslab, interval 1, probability 0, space 0, times 0 [ 891.182745] CPU: 0 PID: 6185 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 891.183645] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 891.184687] Call Trace: [ 891.185044] dump_stack+0x107/0x167 [ 891.185527] should_fail.cold+0x5/0xa [ 891.186065] ? create_object.isra.0+0x3a/0xa20 [ 891.186670] should_failslab+0x5/0x20 [ 891.187182] kmem_cache_alloc+0x5b/0x360 [ 891.187732] create_object.isra.0+0x3a/0xa20 [ 891.188383] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 891.189226] kmem_cache_alloc+0x159/0x360 [ 891.189876] __d_alloc+0x2a/0x990 [ 891.190337] d_alloc_parallel+0x111/0x1aa0 [ 891.190906] ? __d_lookup_rcu+0x6b0/0x6b0 [ 891.191479] ? find_held_lock+0x2c/0x110 [ 891.192023] ? lockdep_init_map_type+0x2c7/0x780 [ 891.192791] ? lockdep_init_map_type+0x2c7/0x780 [ 891.193423] __lookup_slow+0x193/0x490 [ 891.193945] ? do_raw_spin_unlock+0x4f/0x220 [ 891.194399] ? lookup_open.isra.0+0x1230/0x1230 [ 891.194916] ? inode_permission+0xa4/0x380 [ 891.195382] walk_component+0x41e/0x6a0 [ 891.195789] ? handle_dots.part.0+0x1540/0x1540 [ 891.196255] ? walk_component+0x6a0/0x6a0 [ 891.196759] path_lookupat+0x1ba/0x860 [ 891.197152] filename_lookup+0x19f/0x560 [ 891.197640] ? may_linkat+0x230/0x230 [ 891.198158] ? __check_object_size+0x319/0x440 [ 891.198772] ? strncpy_from_user+0x9e/0x470 [ 891.199347] ? getname_flags.part.0+0x1dd/0x4f0 [ 891.199962] do_readlinkat+0xcd/0x2f0 [ 891.200469] ? cp_compat_stat+0x830/0x830 [ 891.201009] ? fput_many+0x2f/0x1a0 [ 891.201492] ? ksys_write+0x1a9/0x260 [ 891.202037] __x64_sys_readlink+0x74/0xb0 [ 891.202608] ? syscall_enter_from_user_mode+0x1d/0x50 [ 891.203306] do_syscall_64+0x33/0x40 [ 891.203819] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 891.204518] RIP: 0033:0x7fa88322fb19 [ 891.205014] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 891.207421] RSP: 002b:00007fa8807a5188 EFLAGS: 00000246 ORIG_RAX: 0000000000000059 [ 891.208430] RAX: ffffffffffffffda RBX: 00007fa883342f60 RCX: 00007fa88322fb19 [ 891.209358] RDX: 000000000000003f RSI: 00000000200001c0 RDI: 0000000020000180 [ 891.210309] RBP: 00007fa8807a51d0 R08: 0000000000000000 R09: 0000000000000000 [ 891.211238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 891.212162] R13: 00007fffce6f4cef R14: 00007fa8807a5300 R15: 0000000000022000 [ 891.213290] hpet: Lost 1 RTC interrupts 02:29:03 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 18) [ 891.279024] FAULT_INJECTION: forcing a failure. [ 891.279024] name failslab, interval 1, probability 0, space 0, times 0 [ 891.280648] CPU: 0 PID: 6189 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 891.281583] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 891.282736] Call Trace: [ 891.283112] dump_stack+0x107/0x167 [ 891.283630] should_fail.cold+0x5/0xa [ 891.284180] ? create_object.isra.0+0x3a/0xa20 [ 891.284818] should_failslab+0x5/0x20 [ 891.285353] kmem_cache_alloc+0x5b/0x360 [ 891.285931] create_object.isra.0+0x3a/0xa20 [ 891.286309] FAULT_INJECTION: forcing a failure. [ 891.286309] name failslab, interval 1, probability 0, space 0, times 0 [ 891.286533] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 891.286555] __kmalloc_track_caller+0x177/0x3c0 [ 891.286577] ? v9fs_session_init+0xa7/0x16a0 [ 891.289983] ? kernel_text_address+0xf2/0x120 [ 891.290601] kstrdup+0x36/0x70 [ 891.291053] v9fs_session_init+0xa7/0x16a0 [ 891.291710] ? find_held_lock+0x2c/0x110 [ 891.292284] ? kmem_cache_alloc_trace+0x151/0x360 [ 891.292941] ? v9fs_show_options+0x690/0x690 [ 891.293556] ? kasan_unpoison_shadow+0x33/0x50 [ 891.294244] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 891.294945] v9fs_mount+0x79/0x8f0 [ 891.295437] ? v9fs_write_inode+0x60/0x60 [ 891.296004] legacy_get_tree+0x105/0x220 [ 891.296578] vfs_get_tree+0x8e/0x300 [ 891.297099] path_mount+0x13be/0x20b0 [ 891.297625] ? strncpy_from_user+0x9e/0x470 [ 891.298237] ? finish_automount+0xa40/0xa40 [ 891.298837] ? getname_flags.part.0+0x1dd/0x4f0 [ 891.299476] ? _copy_from_user+0xfb/0x1b0 [ 891.300074] __x64_sys_mount+0x282/0x300 [ 891.300642] ? copy_mnt_ns+0xa00/0xa00 [ 891.301194] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 891.301940] ? syscall_enter_from_user_mode+0x1d/0x50 [ 891.302644] do_syscall_64+0x33/0x40 [ 891.303168] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 891.303884] RIP: 0033:0x7f5cd1c4db19 [ 891.304404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 891.306888] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 891.307931] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 891.308912] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 891.309923] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 891.311008] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 891.312084] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 891.313206] CPU: 1 PID: 6190 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 891.313346] hpet: Lost 1 RTC interrupts [ 891.314459] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 891.314471] Call Trace: [ 891.316939] dump_stack+0x107/0x167 [ 891.317501] should_fail.cold+0x5/0xa [ 891.318118] should_failslab+0x5/0x20 [ 891.318702] __kmalloc_track_caller+0x79/0x3c0 [ 891.319366] ? p9_client_create+0x41d/0x1090 [ 891.320044] kstrdup+0x36/0x70 [ 891.320582] p9_client_create+0x41d/0x1090 [ 891.321253] ? lock_downgrade+0x6d0/0x6d0 [ 891.321912] ? p9_client_flush+0x430/0x430 [ 891.322502] ? lockdep_init_map_type+0x2c7/0x780 [ 891.323210] ? rcu_read_lock_sched_held+0x3e/0x80 [ 891.324160] ? __raw_spin_lock_init+0x36/0x110 [ 891.324864] v9fs_session_init+0x1dd/0x16a0 [ 891.325538] ? kmem_cache_alloc_trace+0x151/0x360 [ 891.326284] ? v9fs_show_options+0x690/0x690 [ 891.326970] ? kasan_unpoison_shadow+0x33/0x50 [ 891.327619] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 891.328390] v9fs_mount+0x79/0x8f0 [ 891.328929] ? v9fs_write_inode+0x60/0x60 [ 891.329560] legacy_get_tree+0x105/0x220 [ 891.330206] vfs_get_tree+0x8e/0x300 [ 891.330769] path_mount+0x13be/0x20b0 [ 891.331336] ? strncpy_from_user+0x9e/0x470 [ 891.331999] ? finish_automount+0xa40/0xa40 [ 891.332654] ? getname_flags.part.0+0x1dd/0x4f0 [ 891.333345] ? _copy_from_user+0xfb/0x1b0 [ 891.333992] __x64_sys_mount+0x282/0x300 [ 891.334616] ? copy_mnt_ns+0xa00/0xa00 [ 891.335212] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 891.336008] ? syscall_enter_from_user_mode+0x1d/0x50 [ 891.336787] do_syscall_64+0x33/0x40 [ 891.337346] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 891.338058] RIP: 0033:0x7f8ff0aa5b19 [ 891.338602] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 891.341464] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 891.345881] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 891.346905] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 891.347968] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 891.349022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 891.350125] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 [ 905.175883] kmemleak: 1622 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:29:26 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) (fail_nth: 6) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 913.671021] FAULT_INJECTION: forcing a failure. [ 913.671021] name failslab, interval 1, probability 0, space 0, times 0 [ 913.673282] CPU: 1 PID: 6213 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 913.674641] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 913.676266] Call Trace: [ 913.676791] dump_stack+0x107/0x167 [ 913.677514] should_fail.cold+0x5/0xa [ 913.678336] should_failslab+0x5/0x20 [ 913.679090] __kmalloc_track_caller+0x79/0x3c0 [ 913.680001] ? p9_client_create+0x51e/0x1090 [ 913.681039] kmemdup_nul+0x2d/0xa0 [ 913.681755] p9_client_create+0x51e/0x1090 [ 913.682727] ? p9_client_flush+0x430/0x430 [ 913.683586] ? lockdep_init_map_type+0x2c7/0x780 [ 913.684540] ? rcu_read_lock_sched_held+0x3e/0x80 [ 913.685533] ? __raw_spin_lock_init+0x36/0x110 [ 913.686473] v9fs_session_init+0x1dd/0x16a0 [ 913.687357] ? kmem_cache_alloc_trace+0x151/0x360 [ 913.688325] ? v9fs_show_options+0x690/0x690 [ 913.689244] ? kasan_unpoison_shadow+0x33/0x50 [ 913.690192] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 913.691209] v9fs_mount+0x79/0x8f0 [ 913.691931] ? v9fs_write_inode+0x60/0x60 [ 913.692780] legacy_get_tree+0x105/0x220 [ 913.693605] vfs_get_tree+0x8e/0x300 [ 913.694362] path_mount+0x13be/0x20b0 [ 913.695132] ? strncpy_from_user+0x9e/0x470 [ 913.696004] ? finish_automount+0xa40/0xa40 [ 913.696879] ? getname_flags.part.0+0x1dd/0x4f0 [ 913.697817] ? _copy_from_user+0xfb/0x1b0 [ 913.698754] __x64_sys_mount+0x282/0x300 [ 913.699580] ? copy_mnt_ns+0xa00/0xa00 [ 913.700370] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 913.701431] ? syscall_enter_from_user_mode+0x1d/0x50 [ 913.702491] do_syscall_64+0x33/0x40 [ 913.703242] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 913.704262] RIP: 0033:0x7f8ff0aa5b19 [ 913.705018] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 913.708716] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 913.710256] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 913.711691] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 913.713121] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 913.714658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 913.716107] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 02:29:26 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='rpc_pipefs\x00', 0x0, 0x0) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:29:26 executing program 6: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$9p(r0, &(0x7f0000000080)="f4", 0x1) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) write$P9_RATTACH(r1, &(0x7f00000000c0)={0x14, 0x69, 0x1, {0xb9853620df2c2c90, 0x0, 0x3}}, 0x14) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)=ANY=[@ANYBLOB="00000000000000000000000000020000000000587d00"/32]) 02:29:26 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000040)=0x1, 0x4) syz_io_uring_complete(0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, 0x0, 0xffffffed) close_range(r0, r0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r1, 0x0, 0x13, 0x0, &(0x7f0000000340)) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) recvfrom$inet(r2, &(0x7f0000000380)=""/241, 0xf1, 0x2141, &(0x7f00000002c0)={0x2, 0x4e21, @rand_addr=0x64010101}, 0x10) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) setsockopt$inet_group_source_req(r1, 0x0, 0x2b, &(0x7f0000000180)={0x5, {{0x2, 0x4e23, @multicast1}}, {{0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}}}, 0x108) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x34}}, 0x10) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r3, 0x0, 0x27, &(0x7f0000000080)={@broadcast, @dev={0xac, 0x14, 0x14, 0x41}, @remote}, 0xc) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000100), 0x4) 02:29:26 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 24) 02:29:26 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 19) 02:29:26 executing program 5: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) r1 = semget$private(0x0, 0x6, 0x0) semop(r1, &(0x7f0000000080)=[{}, {}], 0x2) semop(0x0, &(0x7f0000000000)=[{0x4, 0xfff}], 0x1) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f00000000c0)=""/4096) semctl$IPC_RMID(r1, 0x0, 0x0) semctl$IPC_RMID(r1, 0x0, 0x0) semop(r1, &(0x7f0000000040)=[{0x4, 0x7, 0x3800}, {0x2, 0x9, 0x800}, {0x0, 0x1}, {0x1, 0x800, 0x800}], 0x4) semctl$IPC_RMID(0x0, 0x0, 0x0) 02:29:26 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8cffffff, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:29:26 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc0ed0000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 913.749309] FAULT_INJECTION: forcing a failure. [ 913.749309] name failslab, interval 1, probability 0, space 0, times 0 [ 913.751718] CPU: 1 PID: 6221 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 913.753140] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 913.754876] Call Trace: [ 913.755436] dump_stack+0x107/0x167 [ 913.756209] should_fail.cold+0x5/0xa [ 913.756986] ? create_object.isra.0+0x3a/0xa20 [ 913.757938] should_failslab+0x5/0x20 [ 913.758737] kmem_cache_alloc+0x5b/0x360 [ 913.759588] create_object.isra.0+0x3a/0xa20 [ 913.760495] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 913.761639] __kmalloc_track_caller+0x177/0x3c0 [ 913.762633] ? v9fs_session_init+0xe9/0x16a0 [ 913.763536] ? kernel_text_address+0xf2/0x120 [ 913.764468] kstrdup+0x36/0x70 [ 913.765136] v9fs_session_init+0xe9/0x16a0 [ 913.766032] ? find_held_lock+0x2c/0x110 [ 913.766875] ? kmem_cache_alloc_trace+0x151/0x360 [ 913.767873] ? v9fs_show_options+0x690/0x690 [ 913.768790] ? kasan_unpoison_shadow+0x33/0x50 [ 913.769735] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 913.770792] v9fs_mount+0x79/0x8f0 [ 913.771529] ? v9fs_write_inode+0x60/0x60 [ 913.772386] legacy_get_tree+0x105/0x220 [ 913.773228] vfs_get_tree+0x8e/0x300 [ 913.774019] path_mount+0x13be/0x20b0 [ 913.774812] ? strncpy_from_user+0x9e/0x470 [ 913.775702] ? finish_automount+0xa40/0xa40 [ 913.776648] ? getname_flags.part.0+0x1dd/0x4f0 [ 913.777606] ? _copy_from_user+0xfb/0x1b0 [ 913.778475] __x64_sys_mount+0x282/0x300 [ 913.779320] ? copy_mnt_ns+0xa00/0xa00 [ 913.780130] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 913.781214] ? syscall_enter_from_user_mode+0x1d/0x50 [ 913.782279] do_syscall_64+0x33/0x40 [ 913.783052] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 913.784097] RIP: 0033:0x7f5cd1c4db19 [ 913.784866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 913.788614] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 913.790198] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 913.791690] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 913.793208] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 913.794685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 913.796143] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 02:29:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwritev(r0, &(0x7f0000001140)=[{&(0x7f0000000080)="f2c0b00a0a73e255b2c6", 0xa}], 0x1, 0xfff, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x8020}) close(r0) r1 = openat(0xffffffffffffffff, 0x0, 0x440900, 0x0) r2 = syz_open_pts(0xffffffffffffffff, 0x24a080) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r1, &(0x7f00000000c0)={0x10002001}) fcntl$setstatus(r3, 0x4, 0x0) pwritev(r3, &(0x7f00000003c0)=[{&(0x7f00000002c0)="d626", 0x2}], 0x1, 0x0, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) sendfile(r4, r3, 0x0, 0xd315) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) sendfile(r1, r5, &(0x7f0000000180)=0x1, 0xe87) 02:29:26 executing program 6: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'lo\x00'}) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = fcntl$dupfd(r2, 0x406, r1) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000000)=[@timestamp, @sack_perm, @timestamp, @timestamp, @timestamp], 0x5) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 913.862026] FAULT_INJECTION: forcing a failure. [ 913.862026] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 913.864715] CPU: 0 PID: 6230 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 913.866164] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 913.867902] Call Trace: [ 913.868468] dump_stack+0x107/0x167 [ 913.869236] should_fail.cold+0x5/0xa [ 913.870094] _copy_to_user+0x2e/0x180 [ 913.870900] simple_read_from_buffer+0xcc/0x160 [ 913.871875] proc_fail_nth_read+0x198/0x230 [ 913.872763] ? proc_sessionid_read+0x230/0x230 [ 913.873686] ? security_file_permission+0x24e/0x570 [ 913.874707] ? perf_trace_initcall_start+0x101/0x380 [ 913.875752] ? proc_sessionid_read+0x230/0x230 [ 913.876680] vfs_read+0x228/0x580 [ 913.877395] ksys_read+0x12d/0x260 [ 913.878123] ? vfs_write+0xa30/0xa30 [ 913.878899] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 913.879970] ? syscall_enter_from_user_mode+0x1d/0x50 [ 913.881023] do_syscall_64+0x33/0x40 [ 913.881790] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 913.882851] RIP: 0033:0x7fa8831e269c [ 913.883612] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 913.887349] RSP: 002b:00007fa880784170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 913.888900] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007fa8831e269c [ 913.890367] RDX: 000000000000000f RSI: 00007fa8807841e0 RDI: 0000000000000004 [ 913.891808] RBP: 00007fa8807841d0 R08: 0000000000000000 R09: 0000000000000000 [ 913.893249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 913.894710] R13: 00007fffce6f4cef R14: 00007fa880784300 R15: 0000000000022000 [ 913.896305] hpet: Lost 1 RTC interrupts 02:29:26 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xf6ffffff, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:29:26 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:29:26 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 25) 02:29:26 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 20) 02:29:26 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0xb6) getsockopt$inet6_opts(r0, 0x29, 0x39, &(0x7f0000000080)=""/45, &(0x7f00000000c0)=0x2d) 02:29:26 executing program 5: semctl$IPC_RMID(0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000000)) r1 = semget$private(0x0, 0x6, 0x0) semop(r1, &(0x7f0000000080)=[{}, {}], 0x2) semop(0x0, &(0x7f0000000000)=[{0x4, 0xfff}], 0x1) semctl$SEM_INFO(r1, 0x1, 0x13, &(0x7f00000000c0)=""/4096) semctl$IPC_RMID(r1, 0x0, 0x0) semctl$IPC_RMID(r1, 0x0, 0x0) semop(r1, &(0x7f0000000040)=[{0x4, 0x7, 0x3800}, {0x2, 0x9, 0x800}, {0x0, 0x1}, {0x1, 0x800, 0x800}], 0x4) semctl$IPC_RMID(0x0, 0x0, 0x0) [ 914.232818] FAULT_INJECTION: forcing a failure. [ 914.232818] name failslab, interval 1, probability 0, space 0, times 0 [ 914.235161] CPU: 0 PID: 6253 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 914.236552] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 914.238254] Call Trace: [ 914.238804] dump_stack+0x107/0x167 [ 914.239549] should_fail.cold+0x5/0xa [ 914.240328] ? create_object.isra.0+0x3a/0xa20 [ 914.241260] should_failslab+0x5/0x20 [ 914.242064] kmem_cache_alloc+0x5b/0x360 [ 914.242905] create_object.isra.0+0x3a/0xa20 [ 914.243808] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 914.244847] __kmalloc_track_caller+0x177/0x3c0 [ 914.245848] ? p9_client_create+0x51e/0x1090 [ 914.246288] FAULT_INJECTION: forcing a failure. [ 914.246288] name failslab, interval 1, probability 0, space 0, times 0 [ 914.246761] kmemdup_nul+0x2d/0xa0 [ 914.246781] p9_client_create+0x51e/0x1090 [ 914.246809] ? p9_client_flush+0x430/0x430 [ 914.251438] ? lockdep_init_map_type+0x2c7/0x780 [ 914.252401] ? rcu_read_lock_sched_held+0x3e/0x80 [ 914.253387] ? __raw_spin_lock_init+0x36/0x110 [ 914.254337] v9fs_session_init+0x1dd/0x16a0 [ 914.255234] ? kmem_cache_alloc_trace+0x151/0x360 [ 914.256215] ? v9fs_show_options+0x690/0x690 [ 914.257134] ? kasan_unpoison_shadow+0x33/0x50 [ 914.258080] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 914.259118] v9fs_mount+0x79/0x8f0 [ 914.259846] ? v9fs_write_inode+0x60/0x60 [ 914.260696] legacy_get_tree+0x105/0x220 [ 914.261531] vfs_get_tree+0x8e/0x300 [ 914.262298] path_mount+0x13be/0x20b0 [ 914.263080] ? strncpy_from_user+0x9e/0x470 [ 914.263961] ? finish_automount+0xa40/0xa40 [ 914.264848] ? getname_flags.part.0+0x1dd/0x4f0 [ 914.265794] ? _copy_from_user+0xfb/0x1b0 [ 914.266667] __x64_sys_mount+0x282/0x300 [ 914.267500] ? copy_mnt_ns+0xa00/0xa00 [ 914.268297] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 914.269366] ? syscall_enter_from_user_mode+0x1d/0x50 [ 914.270434] do_syscall_64+0x33/0x40 [ 914.271190] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 914.272228] RIP: 0033:0x7f8ff0aa5b19 [ 914.272983] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 914.276716] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 914.278282] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 914.279730] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 914.281178] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 914.282630] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 914.284079] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 [ 914.285557] CPU: 1 PID: 6255 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 914.285774] hpet: Lost 2 RTC interrupts [ 914.287027] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 914.289484] Call Trace: [ 914.290030] dump_stack+0x107/0x167 [ 914.290754] should_fail.cold+0x5/0xa [ 914.291505] ? p9_client_create+0xaf/0x1090 [ 914.292355] should_failslab+0x5/0x20 [ 914.293106] kmem_cache_alloc_trace+0x55/0x360 [ 914.294001] ? find_held_lock+0x2c/0x110 [ 914.294802] p9_client_create+0xaf/0x1090 [ 914.295621] ? lock_downgrade+0x6d0/0x6d0 [ 914.296442] ? p9_client_flush+0x430/0x430 [ 914.297279] ? lockdep_init_map_type+0x2c7/0x780 [ 914.298213] ? rcu_read_lock_sched_held+0x3e/0x80 [ 914.299168] ? __raw_spin_lock_init+0x36/0x110 [ 914.300073] v9fs_session_init+0x1dd/0x16a0 [ 914.300936] ? kmem_cache_alloc_trace+0x151/0x360 [ 914.301877] ? v9fs_show_options+0x690/0x690 [ 914.302781] ? kasan_unpoison_shadow+0x33/0x50 [ 914.303681] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 914.304712] v9fs_mount+0x79/0x8f0 [ 914.305425] ? v9fs_write_inode+0x60/0x60 [ 914.306265] legacy_get_tree+0x105/0x220 [ 914.307085] vfs_get_tree+0x8e/0x300 [ 914.307907] path_mount+0x13be/0x20b0 [ 914.308660] ? strncpy_from_user+0x9e/0x470 [ 914.309511] ? finish_automount+0xa40/0xa40 [ 914.310383] ? getname_flags.part.0+0x1dd/0x4f0 [ 914.311298] ? _copy_from_user+0xfb/0x1b0 [ 914.312118] __x64_sys_mount+0x282/0x300 [ 914.312911] ? copy_mnt_ns+0xa00/0xa00 [ 914.313686] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 914.314725] ? syscall_enter_from_user_mode+0x1d/0x50 [ 914.315741] do_syscall_64+0x33/0x40 [ 914.316464] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 914.317464] RIP: 0033:0x7f5cd1c4db19 [ 914.318193] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 914.321773] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 914.323322] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 914.324722] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 914.326110] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 914.327501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 914.328893] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 928.548425] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:29:49 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xffff0000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:29:49 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:29:49 executing program 5: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x3, 0x1) connect$inet(r0, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_opts(r0, 0x0, 0x4, 0x0, 0x0) sendto$inet(r0, &(0x7f0000000100)="e02d", 0x2, 0x0, 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_int(r1, 0x0, 0x13, 0x0, &(0x7f0000000340)) connect$inet(r1, &(0x7f0000000000)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 02:29:49 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000001c0), 0x5}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) pkey_alloc(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x130) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x3, &(0x7f0000ffa000/0x4000)=nil, 0x5) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) mmap$usbmon(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0x0, 0x13, 0xffffffffffffffff, 0x0) 02:29:49 executing program 6: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat2(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x24800, 0x80, 0x1}, 0x18) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x80, 0x8, 0x0, 0x80, 0x0, 0x568, 0x4000, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x4, @perf_config_ext={0x8, 0x2}, 0xa800, 0x55db, 0x8, 0x3, 0xa5, 0x100, 0xef29, 0x0, 0x2, 0x0, 0x16}, 0x0, 0x2, r0, 0x3) r1 = fsopen(&(0x7f0000000040)='proc\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) sendto$packet(r4, &(0x7f00000000c0)="17f7b44a07ddca155790", 0xa, 0x40, 0x0, 0x0) sendfile(r2, r3, &(0x7f0000000000)=0x5, 0x5) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) fcntl$setlease(r5, 0x400, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) 02:29:49 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 21) 02:29:49 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:29:49 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 26) [ 936.940576] FAULT_INJECTION: forcing a failure. [ 936.940576] name failslab, interval 1, probability 0, space 0, times 0 [ 936.942914] CPU: 1 PID: 6287 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 936.944329] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 936.946020] Call Trace: [ 936.946600] dump_stack+0x107/0x167 [ 936.947371] should_fail.cold+0x5/0xa [ 936.948168] ? create_object.isra.0+0x3a/0xa20 [ 936.949202] should_failslab+0x5/0x20 [ 936.949993] kmem_cache_alloc+0x5b/0x360 [ 936.950841] ? kernel_text_address+0xf2/0x120 [ 936.951758] create_object.isra.0+0x3a/0xa20 [ 936.952662] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 936.953711] kmem_cache_alloc_trace+0x151/0x360 [ 936.954690] ? find_held_lock+0x2c/0x110 [ 936.955523] p9_client_create+0xaf/0x1090 [ 936.956374] ? lock_downgrade+0x6d0/0x6d0 [ 936.957231] ? p9_client_flush+0x430/0x430 [ 936.958101] ? lockdep_init_map_type+0x2c7/0x780 [ 936.959085] ? rcu_read_lock_sched_held+0x3e/0x80 [ 936.960082] ? __raw_spin_lock_init+0x36/0x110 [ 936.961031] v9fs_session_init+0x1dd/0x16a0 [ 936.961936] ? kmem_cache_alloc_trace+0x151/0x360 [ 936.962938] ? v9fs_show_options+0x690/0x690 [ 936.963870] ? kasan_unpoison_shadow+0x33/0x50 [ 936.964882] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 936.965929] v9fs_mount+0x79/0x8f0 [ 936.966677] ? v9fs_write_inode+0x60/0x60 [ 936.967535] legacy_get_tree+0x105/0x220 [ 936.968379] vfs_get_tree+0x8e/0x300 [ 936.969155] path_mount+0x13be/0x20b0 [ 936.969949] ? strncpy_from_user+0x9e/0x470 [ 936.970850] ? finish_automount+0xa40/0xa40 [ 936.971742] ? getname_flags.part.0+0x1dd/0x4f0 [ 936.972700] ? _copy_from_user+0xfb/0x1b0 [ 936.973570] __x64_sys_mount+0x282/0x300 [ 936.974449] ? copy_mnt_ns+0xa00/0xa00 [ 936.975265] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 936.976359] ? syscall_enter_from_user_mode+0x1d/0x50 [ 936.977431] do_syscall_64+0x33/0x40 [ 936.978204] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 936.979265] RIP: 0033:0x7f5cd1c4db19 [ 936.980093] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 936.983893] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 936.985456] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 936.986940] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 936.988406] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 936.989866] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 936.991348] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 936.997036] FAULT_INJECTION: forcing a failure. [ 936.997036] name failslab, interval 1, probability 0, space 0, times 0 [ 936.999406] CPU: 1 PID: 6283 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 937.000800] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 937.002504] Call Trace: [ 937.003042] dump_stack+0x107/0x167 [ 937.003789] should_fail.cold+0x5/0xa [ 937.004576] should_failslab+0x5/0x20 [ 937.005351] __kmalloc_track_caller+0x79/0x3c0 [ 937.006285] ? p9_client_create+0x51e/0x1090 [ 937.007196] kmemdup_nul+0x2d/0xa0 [ 937.007920] p9_client_create+0x51e/0x1090 [ 937.008799] ? p9_client_flush+0x430/0x430 [ 937.009679] ? lockdep_init_map_type+0x2c7/0x780 [ 937.010655] ? rcu_read_lock_sched_held+0x3e/0x80 [ 937.011706] ? __raw_spin_lock_init+0x36/0x110 [ 937.012650] v9fs_session_init+0x1dd/0x16a0 [ 937.013546] ? kmem_cache_alloc_trace+0x151/0x360 [ 937.014553] ? v9fs_show_options+0x690/0x690 [ 937.015462] ? kasan_unpoison_shadow+0x33/0x50 [ 937.016395] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 937.017434] v9fs_mount+0x79/0x8f0 [ 937.018163] ? v9fs_write_inode+0x60/0x60 [ 937.019025] legacy_get_tree+0x105/0x220 [ 937.019859] vfs_get_tree+0x8e/0x300 [ 937.020621] path_mount+0x13be/0x20b0 [ 937.021400] ? strncpy_from_user+0x9e/0x470 [ 937.022300] ? finish_automount+0xa40/0xa40 [ 937.023191] ? getname_flags.part.0+0x1dd/0x4f0 [ 937.024141] ? _copy_from_user+0xfb/0x1b0 [ 937.025003] __x64_sys_mount+0x282/0x300 [ 937.025833] ? copy_mnt_ns+0xa00/0xa00 [ 937.026722] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 937.027790] ? syscall_enter_from_user_mode+0x1d/0x50 [ 937.028844] do_syscall_64+0x33/0x40 [ 937.029609] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 937.030667] RIP: 0033:0x7f8ff0aa5b19 [ 937.031428] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 937.035145] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 937.036710] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 937.038181] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 937.039647] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 937.041094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 937.042724] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 [ 950.327758] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:30:10 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:30:10 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xffffff8c, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:30:10 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 22) 02:30:10 executing program 5: openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$BLKGETSIZE(r1, 0x1260, &(0x7f0000000080)) creat(&(0x7f00000000c0)='./file0\x00', 0x11a) creat(&(0x7f0000000100)='./file0\x00', 0x0) 02:30:10 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x8000000000000, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:30:10 executing program 6: write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="0100400000002004000000040000316b733075067cdbffffffffff8007002e2f66696c6531400000000000000000010000000000000000000000f907002e2f66696c6554055a4a31020000000000000000000000000002"], 0x68) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x40, &(0x7f0000000080), 0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r0, 0xf501, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) lsetxattr$security_capability(&(0x7f0000000640)='./file0\x00', &(0x7f00000005c0), &(0x7f0000000600)=@v3={0x3000000, [{0x20d1, 0x80}, {0x3, 0x5}], r2}, 0x18, 0x1) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) connect$inet6(r1, &(0x7f0000000540)={0xa, 0x4e21, 0x9, @loopback, 0xc0000}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x4, @loopback, 0x10000}, 0x1c) sendmsg$inet6(r0, &(0x7f0000000500)={&(0x7f0000000040)={0xa, 0x4e23, 0x200, @local, 0x81}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000100)="7cd8ba69677081fd248775384afc8422c23c761d9f17042e329a6164b972ab34a2ed9b34dff9a8cf73a887f28aa1548694d99caf8c59edd1e1b8ecea6540811c8eb31daaa7c292b88ca3833892c14b86b5271844e63bbbbfb2e2ffea9ce7f912a4e8869b8700d119232276788cd853db352f760c34187bcf64aea214f6a5", 0x7e}, {&(0x7f0000000180)="46f1dc9322ba03a9dfa06c642eb92ae74d4a89c5ae25aa1a593019079f8ff62323080f34890acf83bac357df559e2274e2e0b0a3ec7f22b8fc4b656c89ca80aa56a0becb1aac7d33f7f5f96bd17c420eb48b1f8e4f4b", 0x56}, {&(0x7f0000000200)="e997a8dcaaffa46de2649edf274abfe204fbab2b27ea33c0a1c2f5a07054d4d5749b97b84d319cc7533808fbac851a31f910fea5", 0x34}, {&(0x7f0000000240)="e26c49184a0ab29bd24c31049287bfbcac731dab90d95722eb385f9b04ce1d1077d697341363096869af896e5f1cb21fc71ed47a49056063d349db23112b6fd22f50de66bb9d1053dd0cfdb0894ae320531b4d87248783a3b833c674c8fb4ea1487e4cb7929c0a3e6e3afbb206afaf957459a64a4c3ce3ef68af5ee82b18712674111a071cb47beeef4e8e4603e736554abb485864d684233695d9a265324861dac6928d83a6af59e773f257b073d7e4350f1b625efa9d44ee0cd252aa5431d0a73698d50d6e0e2fbcfd0e8b7533506f063039e74902ca94e60b41e620f88f5eabea5cb610c224c173cae2db7deb0b829a325db24aeaf19a", 0xf8}], 0x4, &(0x7f0000000380)=[@rthdr_2292={{0x18, 0x29, 0x39, {0x2f, 0x0, 0x1, 0xc0}}}, @hopopts_2292={{0x20, 0x29, 0x36, {0x2f, 0x0, '\x00', [@generic={0x8}, @ra={0x5, 0x2, 0x6}]}}}, @rthdrdstopts={{0x90, 0x29, 0x37, {0x36, 0xe, '\x00', [@padn={0x1, 0x2, [0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x1f}, @ra={0x5, 0x2, 0x8b3}, @generic={0x4, 0x42, "97c0a1fa43f5768dbd90a8488d99b84ee7b9c197c91657fa35ab0c1f9671bb658c53ba1e041ded3920fd9d3c3d7d5e465f6110b3c661c59d078c43893123e5ff381e"}, @calipso={0x7, 0x20, {0x0, 0x6, 0x13, 0x3, [0x10001, 0x0, 0x9]}}]}}}, @pktinfo={{0x24, 0x29, 0x32, {@mcast2}}}, @rthdr_2292={{0x68, 0x29, 0x39, {0x89, 0xa, 0x0, 0x0, 0x0, [@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @empty, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @remote, @empty]}}}], 0x158}, 0x0) 02:30:10 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 27) 02:30:10 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000001c0), 0x5}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) pkey_alloc(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x130) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x3, &(0x7f0000ffa000/0x4000)=nil, 0x5) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) mmap$usbmon(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0x0, 0x13, 0xffffffffffffffff, 0x0) 02:30:10 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xfffffff6, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 958.214212] FAULT_INJECTION: forcing a failure. [ 958.214212] name failslab, interval 1, probability 0, space 0, times 0 [ 958.216762] CPU: 0 PID: 6321 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 958.218165] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 958.219861] Call Trace: [ 958.220410] dump_stack+0x107/0x167 [ 958.221158] should_fail.cold+0x5/0xa [ 958.221940] should_failslab+0x5/0x20 [ 958.222744] __kmalloc_track_caller+0x79/0x3c0 [ 958.223673] ? p9_client_create+0x41d/0x1090 [ 958.224571] kstrdup+0x36/0x70 [ 958.225222] p9_client_create+0x41d/0x1090 [ 958.226081] ? lock_downgrade+0x6d0/0x6d0 [ 958.226940] ? p9_client_flush+0x430/0x430 [ 958.227803] ? lockdep_init_map_type+0x2c7/0x780 [ 958.228759] ? rcu_read_lock_sched_held+0x3e/0x80 [ 958.229746] ? __raw_spin_lock_init+0x36/0x110 [ 958.230739] v9fs_session_init+0x1dd/0x16a0 [ 958.231626] ? kmem_cache_alloc_trace+0x151/0x360 [ 958.232616] ? v9fs_show_options+0x690/0x690 [ 958.233527] ? kasan_unpoison_shadow+0x33/0x50 [ 958.234450] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 958.235488] v9fs_mount+0x79/0x8f0 [ 958.236213] ? v9fs_write_inode+0x60/0x60 [ 958.237054] legacy_get_tree+0x105/0x220 [ 958.237883] vfs_get_tree+0x8e/0x300 [ 958.238654] path_mount+0x13be/0x20b0 [ 958.239433] ? strncpy_from_user+0x9e/0x470 [ 958.240309] ? finish_automount+0xa40/0xa40 [ 958.241183] ? getname_flags.part.0+0x1dd/0x4f0 [ 958.242126] ? _copy_from_user+0xfb/0x1b0 [ 958.242990] __x64_sys_mount+0x282/0x300 [ 958.243815] ? copy_mnt_ns+0xa00/0xa00 [ 958.244608] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 958.245691] ? syscall_enter_from_user_mode+0x1d/0x50 [ 958.246745] do_syscall_64+0x33/0x40 [ 958.247502] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 958.248537] RIP: 0033:0x7f5cd1c4db19 [ 958.249294] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 958.253020] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 958.254555] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 958.256001] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 958.257440] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 958.258898] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 958.260332] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 958.261990] hpet: Lost 2 RTC interrupts [ 958.263180] FAULT_INJECTION: forcing a failure. [ 958.263180] name failslab, interval 1, probability 0, space 0, times 0 [ 958.265869] CPU: 1 PID: 6327 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 958.267342] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 958.269390] Call Trace: [ 958.269973] dump_stack+0x107/0x167 [ 958.270808] should_fail.cold+0x5/0xa [ 958.271631] ? create_object.isra.0+0x3a/0xa20 [ 958.272759] should_failslab+0x5/0x20 [ 958.273583] kmem_cache_alloc+0x5b/0x360 [ 958.274587] ? legacy_get_tree+0x105/0x220 [ 958.275634] ? vfs_get_tree+0x8e/0x300 [ 958.276625] create_object.isra.0+0x3a/0xa20 [ 958.277724] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 958.279006] __kmalloc_track_caller+0x177/0x3c0 [ 958.280169] ? parse_opts.part.0+0x8e/0x340 [ 958.281270] kstrdup+0x36/0x70 [ 958.282082] parse_opts.part.0+0x8e/0x340 [ 958.283146] ? p9_fd_show_options+0x1c0/0x1c0 [ 958.284286] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 958.285598] ? quarantine_put+0x8b/0x1a0 [ 958.286624] ? trace_hardirqs_on+0x5b/0x180 [ 958.287686] ? kfree+0xd7/0x390 [ 958.288431] p9_fd_create+0x98/0x4a0 [ 958.289260] ? p9_conn_create+0x510/0x510 [ 958.290177] ? p9_client_create+0x798/0x1090 [ 958.291174] ? kfree+0xd7/0x390 [ 958.291912] ? do_raw_spin_unlock+0x4f/0x220 [ 958.292984] p9_client_create+0x7ff/0x1090 [ 958.294047] ? p9_client_flush+0x430/0x430 [ 958.295119] ? lockdep_init_map_type+0x2c7/0x780 [ 958.296291] ? rcu_read_lock_sched_held+0x3e/0x80 [ 958.297504] ? __raw_spin_lock_init+0x36/0x110 [ 958.298678] v9fs_session_init+0x1dd/0x16a0 [ 958.299757] ? kmem_cache_alloc_trace+0x151/0x360 [ 958.300960] ? v9fs_show_options+0x690/0x690 [ 958.302091] ? kasan_unpoison_shadow+0x33/0x50 [ 958.303263] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 958.304546] v9fs_mount+0x79/0x8f0 [ 958.305446] ? v9fs_write_inode+0x60/0x60 [ 958.306488] legacy_get_tree+0x105/0x220 [ 958.307527] vfs_get_tree+0x8e/0x300 [ 958.308522] path_mount+0x13be/0x20b0 [ 958.309469] ? strncpy_from_user+0x9e/0x470 [ 958.310564] ? finish_automount+0xa40/0xa40 [ 958.311640] ? getname_flags.part.0+0x1dd/0x4f0 [ 958.312794] ? _copy_from_user+0xfb/0x1b0 [ 958.313837] __x64_sys_mount+0x282/0x300 [ 958.314854] ? copy_mnt_ns+0xa00/0xa00 [ 958.315821] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 958.317121] ? syscall_enter_from_user_mode+0x1d/0x50 [ 958.318421] do_syscall_64+0x33/0x40 [ 958.319366] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 958.320631] RIP: 0033:0x7f8ff0aa5b19 [ 958.321551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 958.326253] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 958.328195] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 958.330003] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 958.331831] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 958.333638] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 958.335456] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 [ 975.036249] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:30:37 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xedc000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:30:37 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat2(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0xc043}, 0x18) r1 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x5, 0x3, 0x3, 0x1, 0x0, 0x6, 0x20, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x0, @perf_config_ext={0x8, 0x100}, 0x44012, 0x9, 0x8, 0x4, 0x4, 0x4, 0x800, 0x0, 0x2, 0x0, 0x6}, r1, 0x7, r0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) 02:30:37 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:30:37 executing program 5: creat(&(0x7f0000000000)='./file1\x00', 0x0) r0 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@cache_none}]}}) process_vm_writev(0x0, &(0x7f0000001780)=[{0x0}, {&(0x7f0000000380)=""/157, 0xfffffffffffffef3}, {0x0}, {&(0x7f0000000600)=""/61, 0x3d}, {&(0x7f0000000640)=""/108, 0x6c}, {&(0x7f0000001700)=""/66, 0x42}], 0x6, &(0x7f0000001a80)=[{0x0}, {0x0}, {&(0x7f0000001a00)=""/42, 0x2a}, {&(0x7f0000001a40)=""/55, 0x37}], 0x4, 0x0) r3 = getpgid(0x0) process_vm_writev(r3, &(0x7f0000001780)=[{0x0}, {&(0x7f0000000380)=""/157, 0xfffffffffffffef3}, {0x0}, {&(0x7f0000000600)=""/61, 0x3d}, {&(0x7f0000000640)=""/108, 0x6c}, {&(0x7f0000001700)=""/66, 0x42}], 0x6, &(0x7f0000001a80)=[{0x0}, {0x0}, {&(0x7f0000001a00)=""/42, 0x2a}, {&(0x7f0000001a40)=""/55, 0x37}], 0x4, 0x0) r4 = getpid() prlimit64(r4, 0x0, &(0x7f0000000000), 0x0) r5 = signalfd(r1, &(0x7f0000000340)={[0xfffffffffffffffe]}, 0x8) clone3(&(0x7f0000000500)={0x204000000, &(0x7f0000000080), &(0x7f0000000100), &(0x7f0000000140), {0x17}, &(0x7f0000000280)=""/150, 0x96, &(0x7f0000000440)=""/142, &(0x7f0000000180)=[r0, r4], 0x2, {r5}}, 0x58) preadv(0xffffffffffffffff, &(0x7f0000001f40)=[{&(0x7f0000001e80)=""/181, 0xb5}], 0x1, 0xf5f, 0x0) 02:30:37 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 23) 02:30:37 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 28) 02:30:37 executing program 1: mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f00000001c0), 0x5}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) pkey_alloc(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x130) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x3, &(0x7f0000ffa000/0x4000)=nil, 0x5) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) mmap$usbmon(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0x0, 0x13, 0xffffffffffffffff, 0x0) 02:30:37 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xffff}}, './file1\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 984.987923] FAULT_INJECTION: forcing a failure. [ 984.987923] name failslab, interval 1, probability 0, space 0, times 0 [ 984.990330] CPU: 0 PID: 6352 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 984.991733] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 984.993388] Call Trace: [ 984.993939] dump_stack+0x107/0x167 [ 984.994696] should_fail.cold+0x5/0xa [ 984.995473] ? create_object.isra.0+0x3a/0xa20 [ 984.996439] should_failslab+0x5/0x20 [ 984.997206] kmem_cache_alloc+0x5b/0x360 [ 984.998032] ? lock_downgrade+0x6d0/0x6d0 [ 984.998874] create_object.isra.0+0x3a/0xa20 [ 984.999786] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 985.000813] __kmalloc_track_caller+0x177/0x3c0 [ 985.001746] ? p9_client_create+0x41d/0x1090 [ 985.002639] kstrdup+0x36/0x70 [ 985.003307] p9_client_create+0x41d/0x1090 [ 985.004174] ? lock_downgrade+0x6d0/0x6d0 [ 985.005027] ? p9_client_flush+0x430/0x430 [ 985.005900] ? lockdep_init_map_type+0x2c7/0x780 [ 985.006865] ? rcu_read_lock_sched_held+0x3e/0x80 [ 985.007847] ? __raw_spin_lock_init+0x36/0x110 [ 985.008778] v9fs_session_init+0x1dd/0x16a0 [ 985.009660] ? kmem_cache_alloc_trace+0x151/0x360 [ 985.010633] ? v9fs_show_options+0x690/0x690 [ 985.011552] ? kasan_unpoison_shadow+0x33/0x50 [ 985.012463] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 985.013486] v9fs_mount+0x79/0x8f0 [ 985.014194] ? v9fs_write_inode+0x60/0x60 [ 985.015030] legacy_get_tree+0x105/0x220 [ 985.015854] vfs_get_tree+0x8e/0x300 [ 985.016607] path_mount+0x13be/0x20b0 [ 985.017376] ? strncpy_from_user+0x9e/0x470 [ 985.018246] ? finish_automount+0xa40/0xa40 [ 985.019119] ? getname_flags.part.0+0x1dd/0x4f0 [ 985.020031] ? _copy_from_user+0xfb/0x1b0 [ 985.020866] __x64_sys_mount+0x282/0x300 [ 985.021676] ? copy_mnt_ns+0xa00/0xa00 [ 985.022458] ? rcu_read_lock_sched_held+0x3e/0x80 [ 985.023448] do_syscall_64+0x33/0x40 [ 985.024203] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 985.025217] RIP: 0033:0x7f5cd1c4db19 [ 985.025952] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 985.030351] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 985.032309] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 985.034122] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 985.035940] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 985.037748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 985.039566] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 985.041660] hpet: Lost 2 RTC interrupts 02:30:37 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 985.049256] FAULT_INJECTION: forcing a failure. [ 985.049256] name failslab, interval 1, probability 0, space 0, times 0 [ 985.052459] CPU: 0 PID: 6349 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 985.054217] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 985.056133] Call Trace: [ 985.056670] dump_stack+0x107/0x167 [ 985.057413] should_fail.cold+0x5/0xa [ 985.058187] should_failslab+0x5/0x20 [ 985.059164] __kmalloc_track_caller+0x79/0x3c0 [ 985.060265] ? parse_opts.part.0+0x8e/0x340 [ 985.061324] kstrdup+0x36/0x70 [ 985.062097] parse_opts.part.0+0x8e/0x340 [ 985.063110] ? p9_fd_show_options+0x1c0/0x1c0 [ 985.064204] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 985.065471] ? quarantine_put+0x8b/0x1a0 [ 985.066463] ? trace_hardirqs_on+0x5b/0x180 [ 985.067518] ? kfree+0xd7/0x390 [ 985.068204] p9_fd_create+0x98/0x4a0 [ 985.068970] ? p9_conn_create+0x510/0x510 [ 985.069809] ? p9_client_create+0x798/0x1090 [ 985.070710] ? kfree+0xd7/0x390 [ 985.071395] ? do_raw_spin_unlock+0x4f/0x220 [ 985.072293] p9_client_create+0x7ff/0x1090 [ 985.073160] ? p9_client_flush+0x430/0x430 [ 985.074032] ? lockdep_init_map_type+0x2c7/0x780 [ 985.075007] ? rcu_read_lock_sched_held+0x3e/0x80 [ 985.076000] ? __raw_spin_lock_init+0x36/0x110 [ 985.076956] v9fs_session_init+0x1dd/0x16a0 [ 985.077852] ? kmem_cache_alloc_trace+0x151/0x360 [ 985.078835] ? v9fs_show_options+0x690/0x690 [ 985.079764] ? kasan_unpoison_shadow+0x33/0x50 [ 985.080709] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 985.081741] v9fs_mount+0x79/0x8f0 [ 985.082464] ? v9fs_write_inode+0x60/0x60 [ 985.083309] legacy_get_tree+0x105/0x220 [ 985.084147] vfs_get_tree+0x8e/0x300 [ 985.084918] path_mount+0x13be/0x20b0 [ 985.085710] ? strncpy_from_user+0x9e/0x470 [ 985.086602] ? finish_automount+0xa40/0xa40 [ 985.087502] ? getname_flags.part.0+0x1dd/0x4f0 [ 985.088463] ? _copy_from_user+0xfb/0x1b0 [ 985.089319] __x64_sys_mount+0x282/0x300 [ 985.090143] ? copy_mnt_ns+0xa00/0xa00 [ 985.090947] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 985.092004] ? syscall_enter_from_user_mode+0x1d/0x50 [ 985.093068] do_syscall_64+0x33/0x40 [ 985.093827] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 985.094869] RIP: 0033:0x7f8ff0aa5b19 [ 985.095641] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 985.099376] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 985.100914] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 985.102378] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 985.103839] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 985.105292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 985.106737] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 [ 985.108422] hpet: Lost 3 RTC interrupts [ 985.109510] 9pnet: Insufficient options for proto=fd 02:30:37 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:30:37 executing program 3: ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file1\x00'}) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080), 0x4) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x6, 0x1, 0x0, 0x5, 0x0, 0x1000, 0x102000, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x2, @perf_bp={&(0x7f00000000c0), 0x4}, 0x2000, 0x4, 0xfffffffd, 0x6, 0xa5, 0x800, 0x401, 0x0, 0xffffffc1, 0x0, 0x1}, 0xffffffffffffffff, 0xa, r1, 0xa) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:30:37 executing program 6: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:30:37 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 29) 02:30:37 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x100000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:30:37 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x6, 0xffffffffffffffff) 02:30:37 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000040)=""/175, 0xaf}, {&(0x7f0000000100)=""/153, 0x99}, {&(0x7f00000001c0)=""/155, 0x9b}, {&(0x7f0000000300)=""/112, 0x70}, {&(0x7f0000000280)=""/51, 0x33}, {&(0x7f0000000380)=""/181, 0xb5}, {&(0x7f0000000440)=""/242, 0xf2}, {&(0x7f0000000540)=""/68, 0x44}], 0x8, &(0x7f0000000640)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}, 0x1) connect$bt_sco(r1, &(0x7f0000000740)={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}}, 0x8) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) socket$packet(0x11, 0x3, 0x300) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) r4 = dup2(r3, r0) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x11, 0x10, 0x0, &(0x7f0000003400)) setsockopt$packet_fanout(r2, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x2}, 0x4) [ 985.407504] FAULT_INJECTION: forcing a failure. [ 985.407504] name failslab, interval 1, probability 0, space 0, times 0 [ 985.409803] CPU: 0 PID: 6390 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 985.411187] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 985.412848] Call Trace: [ 985.413388] dump_stack+0x107/0x167 [ 985.414123] should_fail.cold+0x5/0xa [ 985.414917] ? create_object.isra.0+0x3a/0xa20 [ 985.415842] should_failslab+0x5/0x20 [ 985.416611] kmem_cache_alloc+0x5b/0x360 [ 985.417442] create_object.isra.0+0x3a/0xa20 [ 985.418376] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 985.419442] __kmalloc_track_caller+0x177/0x3c0 [ 985.420383] ? match_number+0xaf/0x1d0 [ 985.421186] kmemdup_nul+0x2d/0xa0 [ 985.421908] match_number+0xaf/0x1d0 [ 985.422667] ? match_u64+0x190/0x190 [ 985.423456] ? __kmalloc_track_caller+0x2d4/0x3c0 [ 985.424438] ? memcpy+0x39/0x60 [ 985.425127] parse_opts.part.0+0x1f3/0x340 [ 985.425994] ? p9_fd_show_options+0x1c0/0x1c0 [ 985.426931] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 985.428002] ? trace_hardirqs_on+0x5b/0x180 [ 985.428876] ? kfree+0xd7/0x390 [ 985.429558] p9_fd_create+0x98/0x4a0 [ 985.430319] ? p9_conn_create+0x510/0x510 [ 985.431168] ? p9_client_create+0x798/0x1090 [ 985.432059] ? kfree+0xd7/0x390 [ 985.432731] ? do_raw_spin_unlock+0x4f/0x220 [ 985.433640] p9_client_create+0x7ff/0x1090 [ 985.434509] ? p9_client_flush+0x430/0x430 [ 985.435385] ? lockdep_init_map_type+0x2c7/0x780 [ 985.436342] ? rcu_read_lock_sched_held+0x3e/0x80 [ 985.437331] ? __raw_spin_lock_init+0x36/0x110 [ 985.438267] v9fs_session_init+0x1dd/0x16a0 [ 985.439181] ? kmem_cache_alloc_trace+0x151/0x360 [ 985.440164] ? v9fs_show_options+0x690/0x690 [ 985.441079] ? kasan_unpoison_shadow+0x33/0x50 [ 985.442004] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 985.443047] v9fs_mount+0x79/0x8f0 [ 985.443778] ? v9fs_write_inode+0x60/0x60 [ 985.444641] legacy_get_tree+0x105/0x220 [ 985.445485] vfs_get_tree+0x8e/0x300 [ 985.446258] path_mount+0x13be/0x20b0 [ 985.446282] ? strncpy_from_user+0x9e/0x470 02:30:38 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x5) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 985.446304] ? finish_automount+0xa40/0xa40 [ 985.446326] ? getname_flags.part.0+0x1dd/0x4f0 02:30:38 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x200000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 985.446342] ? _copy_from_user+0xfb/0x1b0 [ 985.446373] __x64_sys_mount+0x282/0x300 [ 985.446394] ? copy_mnt_ns+0xa00/0xa00 [ 985.446417] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 985.446440] ? syscall_enter_from_user_mode+0x1d/0x50 [ 985.446463] do_syscall_64+0x33/0x40 [ 985.446482] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 985.446495] RIP: 0033:0x7f8ff0aa5b19 [ 985.446514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 985.446524] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 985.446544] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 985.446555] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 985.446566] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 985.446576] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 985.446587] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 [ 985.446719] hpet: Lost 1 RTC interrupts [ 997.043236] hpet: Lost 1 RTC interrupts [ 1001.153837] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:31:02 executing program 1: lseek(0xffffffffffffffff, 0x33, 0x4) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)={[{@mpol={'mpol', 0x3d, {'interleave', '', @void}}, 0x22}, {@mpol={'mpol', 0x3d, {'default', '=static'}}}]}) 02:31:02 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:31:02 executing program 6: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:31:02 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 24) 02:31:02 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x6, 0xffffffffffffffff) 02:31:02 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x400000000000, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:31:02 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x700000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:31:02 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 30) [ 1009.683246] FAULT_INJECTION: forcing a failure. [ 1009.683246] name failslab, interval 1, probability 0, space 0, times 0 [ 1009.685652] CPU: 0 PID: 6423 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 1009.686647] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1009.687979] Call Trace: [ 1009.688364] dump_stack+0x107/0x167 [ 1009.688899] should_fail.cold+0x5/0xa [ 1009.689459] should_failslab+0x5/0x20 [ 1009.690010] __kmalloc_track_caller+0x79/0x3c0 [ 1009.690658] ? p9_client_create+0x51e/0x1090 [ 1009.691322] kmemdup_nul+0x2d/0xa0 [ 1009.691843] p9_client_create+0x51e/0x1090 [ 1009.692464] ? p9_client_flush+0x430/0x430 [ 1009.693091] ? lockdep_init_map_type+0x2c7/0x780 [ 1009.693796] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1009.694499] ? __raw_spin_lock_init+0x36/0x110 [ 1009.695185] v9fs_session_init+0x1dd/0x16a0 [ 1009.695876] ? kmem_cache_alloc_trace+0x151/0x360 [ 1009.696610] ? v9fs_show_options+0x690/0x690 [ 1009.697316] ? kasan_unpoison_shadow+0x33/0x50 [ 1009.698021] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1009.698786] v9fs_mount+0x79/0x8f0 [ 1009.699402] ? v9fs_write_inode+0x60/0x60 [ 1009.700059] legacy_get_tree+0x105/0x220 [ 1009.700679] vfs_get_tree+0x8e/0x300 [ 1009.701244] path_mount+0x13be/0x20b0 [ 1009.701814] ? strncpy_from_user+0x9e/0x470 [ 1009.702500] ? finish_automount+0xa40/0xa40 [ 1009.703157] ? getname_flags.part.0+0x1dd/0x4f0 [ 1009.703889] ? _copy_from_user+0xfb/0x1b0 [ 1009.704516] __x64_sys_mount+0x282/0x300 [ 1009.705346] ? copy_mnt_ns+0xa00/0xa00 [ 1009.705928] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1009.706692] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1009.707476] do_syscall_64+0x33/0x40 [ 1009.708023] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1009.708777] RIP: 0033:0x7f5cd1c4db19 [ 1009.709310] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1009.712141] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1009.713324] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 1009.714357] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1009.715373] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 1009.716355] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1009.717339] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 1009.718610] hpet: Lost 1 RTC interrupts [ 1009.722631] tmpfs: Bad value for 'mpol' [ 1009.736087] FAULT_INJECTION: forcing a failure. [ 1009.736087] name failslab, interval 1, probability 0, space 0, times 0 [ 1009.737657] CPU: 0 PID: 6431 Comm: syz-executor.2 Not tainted 5.10.161 #1 02:31:02 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x6, 0xffffffffffffffff) [ 1009.738608] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1009.739728] Call Trace: [ 1009.740039] dump_stack+0x107/0x167 [ 1009.740465] should_fail.cold+0x5/0xa [ 1009.740919] should_failslab+0x5/0x20 [ 1009.741350] __kmalloc_track_caller+0x79/0x3c0 [ 1009.742004] ? match_number+0xaf/0x1d0 [ 1009.742454] kmemdup_nul+0x2d/0xa0 [ 1009.742941] match_number+0xaf/0x1d0 [ 1009.743391] ? match_u64+0x190/0x190 [ 1009.743901] ? __kmalloc_track_caller+0x2d4/0x3c0 [ 1009.744447] ? memcpy+0x39/0x60 [ 1009.744902] parse_opts.part.0+0x1f3/0x340 [ 1009.745388] ? p9_fd_show_options+0x1c0/0x1c0 [ 1009.746009] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1009.746620] ? trace_hardirqs_on+0x5b/0x180 [ 1009.747226] ? kfree+0xd7/0x390 [ 1009.747694] p9_fd_create+0x98/0x4a0 [ 1009.748206] ? p9_conn_create+0x510/0x510 [ 1009.748679] ? p9_client_create+0x798/0x1090 [ 1009.749176] ? kfree+0xd7/0x390 [ 1009.749632] ? do_raw_spin_unlock+0x4f/0x220 [ 1009.750126] p9_client_create+0x7ff/0x1090 [ 1009.750712] ? p9_client_flush+0x430/0x430 [ 1009.751227] ? lockdep_init_map_type+0x2c7/0x780 [ 1009.751872] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1009.752511] ? __raw_spin_lock_init+0x36/0x110 [ 1009.753113] v9fs_session_init+0x1dd/0x16a0 [ 1009.753717] ? kmem_cache_alloc_trace+0x151/0x360 [ 1009.754303] ? v9fs_show_options+0x690/0x690 [ 1009.754918] ? kasan_unpoison_shadow+0x33/0x50 [ 1009.755479] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1009.756208] v9fs_mount+0x79/0x8f0 [ 1009.756625] ? v9fs_write_inode+0x60/0x60 [ 1009.757195] legacy_get_tree+0x105/0x220 [ 1009.757675] vfs_get_tree+0x8e/0x300 [ 1009.758193] path_mount+0x13be/0x20b0 [ 1009.758648] ? strncpy_from_user+0x9e/0x470 [ 1009.759248] ? finish_automount+0xa40/0xa40 [ 1009.759821] ? getname_flags.part.0+0x1dd/0x4f0 [ 1009.760377] ? _copy_from_user+0xfb/0x1b0 [ 1009.760948] __x64_sys_mount+0x282/0x300 [ 1009.761456] ? copy_mnt_ns+0xa00/0xa00 [ 1009.761998] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1009.762632] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1009.763361] do_syscall_64+0x33/0x40 [ 1009.763812] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1009.764421] RIP: 0033:0x7f8ff0aa5b19 [ 1009.764933] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1009.767339] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1009.768325] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 1009.769307] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1009.770289] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1009.771290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1009.772269] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 [ 1009.773438] hpet: Lost 1 RTC interrupts 02:31:02 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x800000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:31:02 executing program 1: ioctl$KDSETLED(0xffffffffffffffff, 0x4b32, 0x519) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a08020000010000010100535007", 0x25, 0xb800}], 0x0, &(0x7f0000000040)) 02:31:02 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x40, 0x1f, 0xff, 0x0, 0x100000001, 0x8000, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp={&(0x7f0000000000), 0xd}, 0x28, 0x9, 0x3f, 0x5, 0x8001, 0x3ff, 0xfff0, 0x0, 0x7, 0x0, 0x3c2bfd1f}, 0xffffffffffffffff, 0xa, r0, 0x3) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f0000000100)={@remote}, 0x14) 02:31:02 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x900000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:31:02 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x6, 0xffffffffffffffff) [ 1009.887579] 9pnet: Insufficient options for proto=fd [ 1009.999158] FAULT_INJECTION: forcing a failure. [ 1009.999158] name failslab, interval 1, probability 0, space 0, times 0 [ 1010.000887] CPU: 1 PID: 6457 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 1010.001791] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1010.002889] Call Trace: [ 1010.003309] dump_stack+0x107/0x167 [ 1010.003851] should_fail.cold+0x5/0xa [ 1010.004396] ? create_object.isra.0+0x3a/0xa20 [ 1010.005046] should_failslab+0x5/0x20 [ 1010.005593] kmem_cache_alloc+0x5b/0x360 [ 1010.006179] create_object.isra.0+0x3a/0xa20 [ 1010.006787] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1010.007498] __kmalloc_track_caller+0x177/0x3c0 [ 1010.008232] ? match_number+0xaf/0x1d0 [ 1010.008952] kmemdup_nul+0x2d/0xa0 [ 1010.009479] match_number+0xaf/0x1d0 [ 1010.010055] ? match_u64+0x190/0x190 [ 1010.010629] ? __kmalloc_track_caller+0x2d4/0x3c0 [ 1010.011355] ? memcpy+0x39/0x60 [ 1010.011858] parse_opts.part.0+0x1f3/0x340 [ 1010.012577] ? p9_fd_show_options+0x1c0/0x1c0 [ 1010.013207] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1010.013980] ? trace_hardirqs_on+0x5b/0x180 [ 1010.014646] ? kfree+0xd7/0x390 [ 1010.015165] p9_fd_create+0x98/0x4a0 [ 1010.015767] ? p9_conn_create+0x510/0x510 [ 1010.016404] ? p9_client_create+0x798/0x1090 [ 1010.017079] ? kfree+0xd7/0x390 [ 1010.017602] ? do_raw_spin_unlock+0x4f/0x220 [ 1010.018293] p9_client_create+0x7ff/0x1090 [ 1010.018901] ? p9_client_flush+0x430/0x430 [ 1010.019522] ? lockdep_init_map_type+0x2c7/0x780 [ 1010.020185] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1010.020867] ? __raw_spin_lock_init+0x36/0x110 [ 1010.021520] v9fs_session_init+0x1dd/0x16a0 [ 1010.022142] ? kmem_cache_alloc_trace+0x151/0x360 [ 1010.022819] ? v9fs_show_options+0x690/0x690 [ 1010.023502] ? kasan_unpoison_shadow+0x33/0x50 [ 1010.024245] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1010.024952] v9fs_mount+0x79/0x8f0 [ 1010.025456] ? v9fs_write_inode+0x60/0x60 [ 1010.026042] legacy_get_tree+0x105/0x220 [ 1010.026616] vfs_get_tree+0x8e/0x300 [ 1010.027146] path_mount+0x13be/0x20b0 [ 1010.027838] ? strncpy_from_user+0x9e/0x470 [ 1010.028444] ? finish_automount+0xa40/0xa40 [ 1010.029069] ? getname_flags.part.0+0x1dd/0x4f0 [ 1010.029777] ? _copy_from_user+0xfb/0x1b0 [ 1010.030416] __x64_sys_mount+0x282/0x300 [ 1010.031022] ? copy_mnt_ns+0xa00/0xa00 [ 1010.031642] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1010.032443] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1010.033212] do_syscall_64+0x33/0x40 [ 1010.033775] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1010.034515] RIP: 0033:0x7f8ff0aa5b19 [ 1010.035085] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1010.037628] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1010.038686] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 1010.039723] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1010.040711] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1010.041727] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1010.042704] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 02:31:02 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 31) 02:31:02 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffff, 0x6}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x3}, 0x0, 0x1000000000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) fcntl$getown(r1, 0x9) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x7, 0x40, 0x3, 0x0, 0x0, 0x1, 0x10, 0x5, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x5, 0xbeb4}, 0x401, 0x1000, 0xfffffff8, 0x1, 0xe65, 0x806, 0x44c, 0x0, 0x401, 0x0, 0x7ff}, 0x0, 0xc, r1, 0xb) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000480)=':,^(\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x10242, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='.\x00', 0x2000003) r4 = inotify_init1(0x0) inotify_add_watch(r4, &(0x7f0000000000)='./file0\x00', 0xa4000004) accept$packet(r2, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000200)=0x14) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f513, &(0x7f0000000240)) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/cpuinfo\x00', 0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) inotify_add_watch(r5, &(0x7f0000000280)='\x00', 0xa2000c05) r6 = dup2(r3, r3) close_range(r6, 0xffffffffffffffff, 0x0) 02:31:02 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa00000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1025.412256] kmemleak: 3 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:31:26 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:31:26 executing program 6: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:31:26 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:31:26 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) linkat(0xffffffffffffff9c, &(0x7f00000003c0)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x400) syz_io_uring_setup(0x57ea, &(0x7f0000000080)={0x0, 0x7f8a, 0x0, 0x2, 0x335}, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000000100)=0x0) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r0, &(0x7f0000000380)=@IORING_OP_STATX={0x15, 0x3, 0x0, 0xffffffffffffffff, &(0x7f0000000280), &(0x7f0000000140)='./file0\x00', 0x0, 0x100, 0x1, {0x0, r1}}, 0xfffffe01) 02:31:26 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 25) 02:31:26 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/proc/self/exe\x00', 0x111480, 0x194) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) io_setup(0x7e6, &(0x7f00000000c0)=0x0) io_submit(r3, 0x2, &(0x7f0000000440)=[0x0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000001c0)="64108d9679db9cd025a440d7a5cd3d3aec6c7100e79f826fce15166cbec951ee52ed64057b3e7ed17432793ca9d2242e4384815cdfe7fc1ce9f11a8385349ff2e44857416cc60bf29406412a8607650e5f1d35fd7c0997736e45b7460762638264fb19fea5d9b8027addddb749e768c59c0834a9e3", 0x75, 0x0, 0x0, 0x0, r1}]) lsetxattr$trusted_overlay_upper(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280), &(0x7f00000002c0)=ANY=[@ANYBLOB="00fb1505973b783ed00000"], 0x15, 0x0) lseek(r2, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x80) 02:31:26 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb00000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:31:26 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 32) [ 1034.175696] FAULT_INJECTION: forcing a failure. [ 1034.175696] name failslab, interval 1, probability 0, space 0, times 0 [ 1034.177339] CPU: 0 PID: 6479 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 1034.178434] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1034.179740] Call Trace: [ 1034.180151] dump_stack+0x107/0x167 [ 1034.180721] should_fail.cold+0x5/0xa [ 1034.181322] ? p9_fd_create+0x161/0x4a0 [ 1034.181928] should_failslab+0x5/0x20 [ 1034.182519] kmem_cache_alloc_trace+0x55/0x360 [ 1034.183230] p9_fd_create+0x161/0x4a0 [ 1034.183841] ? p9_conn_create+0x510/0x510 [ 1034.184517] ? p9_client_create+0x798/0x1090 [ 1034.185183] ? kfree+0xd7/0x390 [ 1034.185689] ? do_raw_spin_unlock+0x4f/0x220 [ 1034.186367] p9_client_create+0x7ff/0x1090 [ 1034.187015] ? p9_client_flush+0x430/0x430 [ 1034.187678] ? lockdep_init_map_type+0x2c7/0x780 [ 1034.188392] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1034.189135] ? __raw_spin_lock_init+0x36/0x110 [ 1034.189850] v9fs_session_init+0x1dd/0x16a0 [ 1034.190567] ? kmem_cache_alloc_trace+0x151/0x360 [ 1034.191330] ? v9fs_show_options+0x690/0x690 [ 1034.192058] ? kasan_unpoison_shadow+0x33/0x50 [ 1034.192768] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1034.193552] v9fs_mount+0x79/0x8f0 [ 1034.194102] ? v9fs_write_inode+0x60/0x60 [ 1034.194752] legacy_get_tree+0x105/0x220 [ 1034.195391] vfs_get_tree+0x8e/0x300 [ 1034.195986] path_mount+0x13be/0x20b0 [ 1034.196585] ? strncpy_from_user+0x9e/0x470 [ 1034.197201] ? finish_automount+0xa40/0xa40 [ 1034.197827] ? getname_flags.part.0+0x1dd/0x4f0 [ 1034.198545] ? _copy_from_user+0xfb/0x1b0 [ 1034.199184] __x64_sys_mount+0x282/0x300 [ 1034.199813] ? copy_mnt_ns+0xa00/0xa00 [ 1034.200411] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1034.201202] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1034.201988] do_syscall_64+0x33/0x40 [ 1034.202565] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1034.203339] RIP: 0033:0x7f8ff0aa5b19 [ 1034.203926] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1034.206679] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1034.207842] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 1034.208911] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1034.209987] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1034.211043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1034.212127] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 [ 1034.213379] hpet: Lost 1 RTC interrupts [ 1034.226072] FAULT_INJECTION: forcing a failure. [ 1034.226072] name failslab, interval 1, probability 0, space 0, times 0 [ 1034.227732] CPU: 1 PID: 6490 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 1034.228664] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1034.229780] Call Trace: [ 1034.230157] dump_stack+0x107/0x167 [ 1034.230675] should_fail.cold+0x5/0xa [ 1034.231718] ? create_object.isra.0+0x3a/0xa20 [ 1034.232842] should_failslab+0x5/0x20 [ 1034.233798] kmem_cache_alloc+0x5b/0x360 [ 1034.234844] create_object.isra.0+0x3a/0xa20 [ 1034.235841] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1034.236535] __kmalloc_track_caller+0x177/0x3c0 [ 1034.237149] ? p9_client_create+0x51e/0x1090 [ 1034.237769] kmemdup_nul+0x2d/0xa0 [ 1034.238234] p9_client_create+0x51e/0x1090 [ 1034.238793] ? p9_client_flush+0x430/0x430 [ 1034.239342] ? lockdep_init_map_type+0x2c7/0x780 [ 1034.239987] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1034.240655] ? __raw_spin_lock_init+0x36/0x110 [ 1034.241345] v9fs_session_init+0x1dd/0x16a0 [ 1034.242027] ? kmem_cache_alloc_trace+0x151/0x360 [ 1034.242749] ? v9fs_show_options+0x690/0x690 [ 1034.243426] ? kasan_unpoison_shadow+0x33/0x50 [ 1034.244114] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1034.244857] v9fs_mount+0x79/0x8f0 [ 1034.245398] ? v9fs_write_inode+0x60/0x60 [ 1034.246041] legacy_get_tree+0x105/0x220 [ 1034.246757] vfs_get_tree+0x8e/0x300 [ 1034.247290] path_mount+0x13be/0x20b0 [ 1034.247880] ? strncpy_from_user+0x9e/0x470 [ 1034.248544] ? finish_automount+0xa40/0xa40 [ 1034.249204] ? getname_flags.part.0+0x1dd/0x4f0 [ 1034.249839] ? _copy_from_user+0xfb/0x1b0 [ 1034.250478] __x64_sys_mount+0x282/0x300 [ 1034.251016] ? copy_mnt_ns+0xa00/0xa00 [ 1034.251601] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1034.252404] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1034.253172] do_syscall_64+0x33/0x40 [ 1034.253726] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1034.255130] RIP: 0033:0x7f5cd1c4db19 [ 1034.256313] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1034.261033] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1034.263432] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 1034.264541] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1034.265607] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 1034.266718] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1034.267830] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 02:31:26 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1000000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:31:26 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:31:26 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2000000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:31:26 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 33) 02:31:26 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:31:26 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)=@ng={0x4, 0x3, "9e913fd7acf77f8c"}, 0xa, 0x2) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 1034.476972] cgroup: fork rejected by pids controller in /syz0 [ 1034.482671] FAULT_INJECTION: forcing a failure. [ 1034.482671] name failslab, interval 1, probability 0, space 0, times 0 [ 1034.486090] CPU: 0 PID: 6516 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 1034.488086] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1034.490684] Call Trace: [ 1034.491513] dump_stack+0x107/0x167 [ 1034.492674] should_fail.cold+0x5/0xa [ 1034.493869] ? create_object.isra.0+0x3a/0xa20 [ 1034.495260] should_failslab+0x5/0x20 [ 1034.496465] kmem_cache_alloc+0x5b/0x360 [ 1034.497771] create_object.isra.0+0x3a/0xa20 [ 1034.499127] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1034.500705] __kmalloc_track_caller+0x177/0x3c0 [ 1034.502153] ? match_number+0xaf/0x1d0 [ 1034.503360] kmemdup_nul+0x2d/0xa0 [ 1034.504470] match_number+0xaf/0x1d0 [ 1034.505628] ? match_u64+0x190/0x190 [ 1034.506785] ? __kmalloc_track_caller+0x2d4/0x3c0 [ 1034.508301] ? memcpy+0x39/0x60 [ 1034.508321] parse_opts.part.0+0x1f3/0x340 02:31:27 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2010000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1034.508337] ? p9_fd_show_options+0x1c0/0x1c0 [ 1034.508356] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1034.508372] ? trace_hardirqs_on+0x5b/0x180 [ 1034.508386] ? kfree+0xd7/0x390 [ 1034.508405] p9_fd_create+0x98/0x4a0 [ 1034.508417] ? p9_conn_create+0x510/0x510 [ 1034.508427] ? p9_client_create+0x798/0x1090 [ 1034.508439] ? kfree+0xd7/0x390 [ 1034.508452] ? do_raw_spin_unlock+0x4f/0x220 [ 1034.508470] p9_client_create+0x7ff/0x1090 [ 1034.508490] ? p9_client_flush+0x430/0x430 [ 1034.508509] ? lockdep_init_map_type+0x2c7/0x780 [ 1034.508522] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1034.508539] ? __raw_spin_lock_init+0x36/0x110 [ 1034.508559] v9fs_session_init+0x1dd/0x16a0 [ 1034.508582] ? kmem_cache_alloc_trace+0x151/0x360 [ 1034.508596] ? v9fs_show_options+0x690/0x690 [ 1034.508623] ? kasan_unpoison_shadow+0x33/0x50 [ 1034.508637] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1034.508653] v9fs_mount+0x79/0x8f0 [ 1034.508668] ? v9fs_write_inode+0x60/0x60 [ 1034.508682] legacy_get_tree+0x105/0x220 [ 1034.508700] vfs_get_tree+0x8e/0x300 [ 1034.508717] path_mount+0x13be/0x20b0 [ 1034.508736] ? strncpy_from_user+0x9e/0x470 [ 1034.508753] ? finish_automount+0xa40/0xa40 [ 1034.508771] ? getname_flags.part.0+0x1dd/0x4f0 [ 1034.508782] ? _copy_from_user+0xfb/0x1b0 [ 1034.508804] __x64_sys_mount+0x282/0x300 [ 1034.508819] ? copy_mnt_ns+0xa00/0xa00 [ 1034.508835] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1034.508851] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1034.508867] do_syscall_64+0x33/0x40 [ 1034.508881] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1034.508891] RIP: 0033:0x7f8ff0aa5b19 [ 1034.508906] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1034.508914] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1034.508929] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 1034.508937] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1034.508945] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1034.508955] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1034.508967] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 [ 1049.594427] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:31:50 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:31:50 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:31:50 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000140)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_SECLEVEL(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000180)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0906000000000000000030000000050033000000000008000200", @ANYRES32=r3, @ANYBLOB="927c9049eb7e19293e5a4a494f87a38d24f822155e77ff3bb4b79d243ad3ddff65d5bb42e92e1a1bcc6bdbdc"], 0x24}}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r5, 0x0, 0x0, 0x8000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x12, r4, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r7 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r7, &(0x7f0000000000)="8f", 0x1, 0x0) fallocate(r7, 0x20, 0x0, 0x7fffffff000) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x12, r6, 0x0) r8 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x7, 0x40000) ioctl$TCSETSW(r8, 0x5403, &(0x7f0000000100)={0x3, 0x73, 0xffff, 0x2, 0xf, "343c81a2cd841337ebd2387b63cbf7cf00e1d1"}) 02:31:50 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8cffffff00000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:31:50 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 26) 02:31:50 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) fcntl$dupfd(r0, 0x0, r0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:31:50 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 34) [ 1058.432653] FAULT_INJECTION: forcing a failure. [ 1058.432653] name failslab, interval 1, probability 0, space 0, times 0 [ 1058.434615] CPU: 0 PID: 6551 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 1058.436134] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1058.437315] Call Trace: [ 1058.437694] dump_stack+0x107/0x167 [ 1058.438267] should_fail.cold+0x5/0xa [ 1058.438832] ? p9_client_prepare_req.part.0+0x3a/0xb30 [ 1058.439589] should_failslab+0x5/0x20 [ 1058.440154] kmem_cache_alloc+0x5b/0x360 [ 1058.440742] p9_client_prepare_req.part.0+0x3a/0xb30 [ 1058.441490] p9_client_rpc+0x220/0x1210 [ 1058.442121] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1058.442907] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 1058.444670] ? pipe_poll+0x21b/0x7f0 [ 1058.445239] ? p9_fd_close+0x4a0/0x4a0 [ 1058.446395] ? anon_pipe_buf_release+0x280/0x280 [ 1058.447871] ? p9_fd_poll+0x1e0/0x2c0 [ 1058.449051] ? p9_fd_create+0x357/0x4a0 [ 1058.450242] ? p9_conn_create+0x510/0x510 [ 1058.451484] ? p9_client_create+0x798/0x1090 [ 1058.452885] ? kfree+0xd7/0x390 [ 1058.453988] ? do_raw_spin_unlock+0x4f/0x220 [ 1058.455372] p9_client_create+0xa76/0x1090 [ 1058.456674] ? p9_client_flush+0x430/0x430 [ 1058.457940] ? lockdep_init_map_type+0x2c7/0x780 [ 1058.459393] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1058.461028] ? __raw_spin_lock_init+0x36/0x110 [ 1058.462446] v9fs_session_init+0x1dd/0x16a0 [ 1058.463772] ? kmem_cache_alloc_trace+0x151/0x360 [ 1058.465256] ? v9fs_show_options+0x690/0x690 [ 1058.466631] ? kasan_unpoison_shadow+0x33/0x50 [ 1058.468134] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1058.469692] v9fs_mount+0x79/0x8f0 [ 1058.470776] ? v9fs_write_inode+0x60/0x60 [ 1058.472083] legacy_get_tree+0x105/0x220 [ 1058.473340] vfs_get_tree+0x8e/0x300 [ 1058.474445] path_mount+0x13be/0x20b0 [ 1058.475543] ? strncpy_from_user+0x9e/0x470 [ 1058.476804] ? finish_automount+0xa40/0xa40 [ 1058.478007] ? getname_flags.part.0+0x1dd/0x4f0 [ 1058.479281] ? _copy_from_user+0xfb/0x1b0 [ 1058.480446] __x64_sys_mount+0x282/0x300 [ 1058.481571] ? copy_mnt_ns+0xa00/0xa00 [ 1058.482725] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1058.484307] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1058.485772] do_syscall_64+0x33/0x40 [ 1058.486791] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1058.488207] RIP: 0033:0x7f8ff0aa5b19 [ 1058.489188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1058.494204] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1058.496300] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 1058.497897] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1058.498828] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1058.499720] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1058.500705] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 [ 1058.501847] hpet: Lost 4 RTC interrupts 02:31:50 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f00000000c0)={0xa, &(0x7f0000000080)=[{0x7, 0x3}, {0x595, 0x6}, {0x7}, {0x5, 0x80}, {0x3, 0xd6}, {0x100, 0x9}, {0x7, 0x7}, {0x8000, 0x1}, {0x0, 0x6}, {0x0, 0x8}]}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000040)=0x1d) r3 = dup2(r2, 0xffffffffffffffff) write(r2, &(0x7f0000000000)="cd656d69f282f46caedc9da09676f7d5fb29e8f4e5806ac5ea118e763750a91ce6ccb5e3206389", 0x27) syz_io_uring_setup(0x21, &(0x7f0000000080), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000000), &(0x7f0000002a40)) getsockopt$bt_l2cap_L2CAP_CONNINFO(r3, 0x6, 0x2, &(0x7f00000004c0), &(0x7f0000000500)=0x6) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) eventfd(0xb6) r5 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) io_uring_register$IORING_REGISTER_FILES(r3, 0x2, &(0x7f0000000240)=[r0], 0x1) preadv(r1, &(0x7f0000000200)=[{&(0x7f0000000100)=""/85, 0x55}, {&(0x7f0000000180)=""/92, 0x5c}, {&(0x7f00000002c0)=""/251, 0xfb}, {&(0x7f00000003c0)=""/222, 0xde}], 0x4, 0x0, 0x6) unshare(0x48020200) 02:31:51 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xf6ffffff00000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1058.540761] FAULT_INJECTION: forcing a failure. [ 1058.540761] name failslab, interval 1, probability 0, space 0, times 0 [ 1058.542546] CPU: 1 PID: 6556 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 1058.543461] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1058.545079] Call Trace: [ 1058.545480] dump_stack+0x107/0x167 [ 1058.546094] should_fail.cold+0x5/0xa [ 1058.546694] should_failslab+0x5/0x20 [ 1058.547423] __kmalloc_track_caller+0x79/0x3c0 [ 1058.548096] ? parse_opts.part.0+0x8e/0x340 [ 1058.548735] kstrdup+0x36/0x70 [ 1058.549222] parse_opts.part.0+0x8e/0x340 [ 1058.549836] ? p9_fd_show_options+0x1c0/0x1c0 [ 1058.550540] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1058.551288] ? quarantine_put+0x8b/0x1a0 [ 1058.551897] ? trace_hardirqs_on+0x5b/0x180 [ 1058.552525] ? kfree+0xd7/0x390 [ 1058.553017] p9_fd_create+0x98/0x4a0 [ 1058.553565] ? p9_conn_create+0x510/0x510 [ 1058.554157] ? p9_client_create+0x798/0x1090 [ 1058.554784] ? kfree+0xd7/0x390 [ 1058.555323] ? do_raw_spin_unlock+0x4f/0x220 [ 1058.555989] p9_client_create+0x7ff/0x1090 [ 1058.556610] ? p9_client_flush+0x430/0x430 [ 1058.557239] ? lockdep_init_map_type+0x2c7/0x780 [ 1058.557935] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1058.558645] ? __raw_spin_lock_init+0x36/0x110 [ 1058.559318] v9fs_session_init+0x1dd/0x16a0 [ 1058.560336] ? kmem_cache_alloc_trace+0x151/0x360 [ 1058.561051] ? v9fs_show_options+0x690/0x690 [ 1058.561725] ? kasan_unpoison_shadow+0x33/0x50 [ 1058.562413] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1058.563164] v9fs_mount+0x79/0x8f0 [ 1058.563689] ? v9fs_write_inode+0x60/0x60 [ 1058.564318] legacy_get_tree+0x105/0x220 [ 1058.564940] vfs_get_tree+0x8e/0x300 [ 1058.565513] path_mount+0x13be/0x20b0 [ 1058.566095] ? strncpy_from_user+0x9e/0x470 [ 1058.566740] ? finish_automount+0xa40/0xa40 [ 1058.567363] ? getname_flags.part.0+0x1dd/0x4f0 [ 1058.568058] ? _copy_from_user+0xfb/0x1b0 [ 1058.568645] __x64_sys_mount+0x282/0x300 [ 1058.569181] ? copy_mnt_ns+0xa00/0xa00 [ 1058.572113] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1058.573724] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1058.575491] do_syscall_64+0x33/0x40 [ 1058.576455] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1058.577685] RIP: 0033:0x7f5cd1c4db19 [ 1058.578590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1058.587920] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1058.589069] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 1058.590099] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1058.591211] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 02:31:51 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:31:51 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xffff000000000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1058.591219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1058.591228] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 1058.591379] 9pnet: Insufficient options for proto=fd 02:31:51 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:31:51 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 27) 02:31:51 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xffffffff00000000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:31:51 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') [ 1058.783924] FAULT_INJECTION: forcing a failure. [ 1058.783924] name failslab, interval 1, probability 0, space 0, times 0 [ 1058.783940] CPU: 1 PID: 6581 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 1058.783947] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1058.783952] Call Trace: [ 1058.783969] dump_stack+0x107/0x167 02:31:51 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 35) [ 1058.783986] should_fail.cold+0x5/0xa [ 1058.784000] ? create_object.isra.0+0x3a/0xa20 [ 1058.784016] should_failslab+0x5/0x20 [ 1058.784028] kmem_cache_alloc+0x5b/0x360 [ 1058.784040] ? legacy_get_tree+0x105/0x220 [ 1058.784052] ? vfs_get_tree+0x8e/0x300 [ 1058.784067] create_object.isra.0+0x3a/0xa20 [ 1058.784080] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1058.784098] __kmalloc_track_caller+0x177/0x3c0 [ 1058.784108] ? parse_opts.part.0+0x8e/0x340 [ 1058.784127] kstrdup+0x36/0x70 [ 1058.784140] parse_opts.part.0+0x8e/0x340 [ 1058.784154] ? p9_fd_show_options+0x1c0/0x1c0 [ 1058.784173] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1058.784184] ? quarantine_put+0x8b/0x1a0 [ 1058.784196] ? trace_hardirqs_on+0x5b/0x180 [ 1058.784210] ? kfree+0xd7/0x390 [ 1058.784230] p9_fd_create+0x98/0x4a0 [ 1058.784242] ? p9_conn_create+0x510/0x510 [ 1058.784251] ? p9_client_create+0x798/0x1090 [ 1058.784267] ? kfree+0xd7/0x390 [ 1058.784278] ? do_raw_spin_unlock+0x4f/0x220 [ 1058.784296] p9_client_create+0x7ff/0x1090 [ 1058.784316] ? p9_client_flush+0x430/0x430 [ 1058.784335] ? lockdep_init_map_type+0x2c7/0x780 [ 1058.784348] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1058.784365] ? __raw_spin_lock_init+0x36/0x110 [ 1058.784386] v9fs_session_init+0x1dd/0x16a0 [ 1058.784420] ? kmem_cache_alloc_trace+0x151/0x360 [ 1058.784439] ? v9fs_show_options+0x690/0x690 [ 1058.784473] ? kasan_unpoison_shadow+0x33/0x50 [ 1058.784492] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1058.784513] v9fs_mount+0x79/0x8f0 [ 1058.784533] ? v9fs_write_inode+0x60/0x60 [ 1058.784549] legacy_get_tree+0x105/0x220 [ 1058.784570] vfs_get_tree+0x8e/0x300 [ 1058.784588] path_mount+0x13be/0x20b0 [ 1058.784605] ? strncpy_from_user+0x9e/0x470 [ 1058.784620] ? finish_automount+0xa40/0xa40 [ 1058.784635] ? getname_flags.part.0+0x1dd/0x4f0 [ 1058.784647] ? _copy_from_user+0xfb/0x1b0 [ 1058.784667] __x64_sys_mount+0x282/0x300 [ 1058.784681] ? copy_mnt_ns+0xa00/0xa00 [ 1058.784698] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1058.784713] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1058.784729] do_syscall_64+0x33/0x40 [ 1058.784743] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1058.784752] RIP: 0033:0x7f5cd1c4db19 [ 1058.784765] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1058.784772] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1058.784787] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 1058.784794] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1058.784802] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 1058.784809] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1058.784817] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 1058.889119] FAULT_INJECTION: forcing a failure. [ 1058.889119] name failslab, interval 1, probability 0, space 0, times 0 [ 1058.889139] CPU: 0 PID: 6593 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 1058.889147] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1058.889151] Call Trace: [ 1058.889171] dump_stack+0x107/0x167 [ 1058.889185] should_fail.cold+0x5/0xa [ 1058.889200] ? create_object.isra.0+0x3a/0xa20 [ 1058.889215] should_failslab+0x5/0x20 [ 1058.889228] kmem_cache_alloc+0x5b/0x360 [ 1058.889240] ? p9_fd_show_options+0x1c0/0x1c0 [ 1058.889254] create_object.isra.0+0x3a/0xa20 [ 1058.889266] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1058.889282] kmem_cache_alloc_trace+0x151/0x360 [ 1058.889301] p9_fd_create+0x161/0x4a0 [ 1058.889314] ? p9_conn_create+0x510/0x510 [ 1058.889324] ? p9_client_create+0x798/0x1090 [ 1058.889335] ? kfree+0xd7/0x390 [ 1058.889348] ? do_raw_spin_unlock+0x4f/0x220 [ 1058.889370] p9_client_create+0x7ff/0x1090 [ 1058.889387] ? p9_client_flush+0x430/0x430 [ 1058.889405] ? lockdep_init_map_type+0x2c7/0x780 [ 1058.889417] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1058.889433] ? __raw_spin_lock_init+0x36/0x110 [ 1058.889457] v9fs_session_init+0x1dd/0x16a0 [ 1058.889482] ? kmem_cache_alloc_trace+0x151/0x360 [ 1058.889495] ? v9fs_show_options+0x690/0x690 [ 1058.889520] ? kasan_unpoison_shadow+0x33/0x50 [ 1058.889533] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1058.889550] v9fs_mount+0x79/0x8f0 [ 1058.889563] ? v9fs_write_inode+0x60/0x60 [ 1058.889578] legacy_get_tree+0x105/0x220 [ 1058.889598] vfs_get_tree+0x8e/0x300 [ 1058.889614] path_mount+0x13be/0x20b0 [ 1058.889631] ? strncpy_from_user+0x9e/0x470 [ 1058.889645] ? finish_automount+0xa40/0xa40 [ 1058.889660] ? getname_flags.part.0+0x1dd/0x4f0 [ 1058.889672] ? _copy_from_user+0xfb/0x1b0 [ 1058.889692] __x64_sys_mount+0x282/0x300 [ 1058.889706] ? copy_mnt_ns+0xa00/0xa00 [ 1058.889723] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1058.889740] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1058.889757] do_syscall_64+0x33/0x40 [ 1058.889769] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1058.889778] RIP: 0033:0x7f8ff0aa5b19 [ 1058.889790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1058.889797] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1058.889811] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 1058.889818] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1058.889825] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1058.889833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1058.889841] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 [ 1074.304547] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:32:15 executing program 6: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:32:15 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000100), 0x10000, 0x0) write$P9_RSTAT(r0, &(0x7f0000000280)={0x51, 0x7d, 0x2, {0x0, 0x4a, 0x1ff, 0x1ff, {0x2, 0x4, 0x6}, 0x1200000, 0x7, 0x4, 0x9443, 0xb, '/dev/hwrng\x00', 0x2, '\'^', 0x0, '', 0xa, '%*]2[!)\'\x92*'}}, 0x51) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@loopback}, 0x14) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'syzkaller0\x00'}) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) setsockopt$inet6_udp_encap(r2, 0x11, 0x64, &(0x7f0000000080)=0x5, 0x4) 02:32:15 executing program 1: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:32:15 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:32:15 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:32:15 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 28) 02:32:15 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 36) 02:32:15 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1083.157472] FAULT_INJECTION: forcing a failure. [ 1083.157472] name failslab, interval 1, probability 0, space 0, times 0 [ 1083.159517] CPU: 1 PID: 6614 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 1083.160542] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1083.161717] Call Trace: [ 1083.162137] dump_stack+0x107/0x167 [ 1083.162705] should_fail.cold+0x5/0xa [ 1083.163023] FAULT_INJECTION: forcing a failure. [ 1083.163023] name failslab, interval 1, probability 0, space 0, times 0 [ 1083.163305] should_failslab+0x5/0x20 [ 1083.167643] __kmalloc_track_caller+0x79/0x3c0 [ 1083.168348] ? match_number+0xaf/0x1d0 [ 1083.169010] kmemdup_nul+0x2d/0xa0 [ 1083.169648] match_number+0xaf/0x1d0 [ 1083.170173] ? match_u64+0x190/0x190 [ 1083.170750] ? __kmalloc_track_caller+0x2d4/0x3c0 [ 1083.171437] ? memcpy+0x39/0x60 [ 1083.171876] parse_opts.part.0+0x1f3/0x340 [ 1083.172526] ? p9_fd_show_options+0x1c0/0x1c0 [ 1083.173119] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1083.173798] ? trace_hardirqs_on+0x5b/0x180 [ 1083.174389] ? kfree+0xd7/0x390 [ 1083.175186] p9_fd_create+0x98/0x4a0 [ 1083.176205] ? p9_conn_create+0x510/0x510 [ 1083.176742] ? p9_client_create+0x798/0x1090 [ 1083.177314] ? kfree+0xd7/0x390 [ 1083.177744] ? do_raw_spin_unlock+0x4f/0x220 [ 1083.178308] p9_client_create+0x7ff/0x1090 [ 1083.178861] ? p9_client_flush+0x430/0x430 [ 1083.179419] ? lockdep_init_map_type+0x2c7/0x780 [ 1083.180027] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1083.180714] ? __raw_spin_lock_init+0x36/0x110 [ 1083.181329] v9fs_session_init+0x1dd/0x16a0 [ 1083.181906] ? kmem_cache_alloc_trace+0x151/0x360 [ 1083.182543] ? v9fs_show_options+0x690/0x690 [ 1083.183122] ? kasan_unpoison_shadow+0x33/0x50 [ 1083.183716] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1083.184411] v9fs_mount+0x79/0x8f0 [ 1083.184886] ? v9fs_write_inode+0x60/0x60 [ 1083.185432] legacy_get_tree+0x105/0x220 [ 1083.185967] vfs_get_tree+0x8e/0x300 [ 1083.186464] path_mount+0x13be/0x20b0 [ 1083.186966] ? strncpy_from_user+0x9e/0x470 [ 1083.187537] ? finish_automount+0xa40/0xa40 [ 1083.188107] ? getname_flags.part.0+0x1dd/0x4f0 [ 1083.188900] ? _copy_from_user+0xfb/0x1b0 [ 1083.189460] __x64_sys_mount+0x282/0x300 [ 1083.189988] ? copy_mnt_ns+0xa00/0xa00 [ 1083.190518] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1083.191204] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1083.191878] do_syscall_64+0x33/0x40 [ 1083.192436] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1083.193100] RIP: 0033:0x7f5cd1c4db19 [ 1083.193599] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1083.195948] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1083.196961] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 1083.197876] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1083.198902] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 1083.199822] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1083.200879] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 1083.204406] CPU: 0 PID: 6618 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 1083.205361] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1083.206437] Call Trace: [ 1083.206810] dump_stack+0x107/0x167 [ 1083.207293] should_fail.cold+0x5/0xa [ 1083.207813] ? p9_client_prepare_req.part.0+0x3a/0xb30 [ 1083.208564] should_failslab+0x5/0x20 [ 1083.209075] kmem_cache_alloc+0x5b/0x360 [ 1083.209626] p9_client_prepare_req.part.0+0x3a/0xb30 [ 1083.210302] p9_client_rpc+0x220/0x1210 [ 1083.210854] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1083.211562] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 1083.212319] ? pipe_poll+0x21b/0x7f0 [ 1083.212826] ? p9_fd_close+0x4a0/0x4a0 [ 1083.213360] ? anon_pipe_buf_release+0x280/0x280 [ 1083.214014] ? p9_fd_poll+0x1e0/0x2c0 [ 1083.214539] ? p9_fd_create+0x357/0x4a0 [ 1083.215071] ? p9_conn_create+0x510/0x510 [ 1083.215629] ? p9_client_create+0x798/0x1090 [ 1083.220954] ? kfree+0xd7/0x390 [ 1083.221729] ? do_raw_spin_unlock+0x4f/0x220 [ 1083.222677] p9_client_create+0xa76/0x1090 [ 1083.223800] ? p9_client_flush+0x430/0x430 [ 1083.224720] ? lockdep_init_map_type+0x2c7/0x780 [ 1083.225309] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1083.225928] ? __raw_spin_lock_init+0x36/0x110 [ 1083.226561] v9fs_session_init+0x1dd/0x16a0 [ 1083.227114] ? kmem_cache_alloc_trace+0x151/0x360 [ 1083.228487] ? v9fs_show_options+0x690/0x690 [ 1083.229575] ? kasan_unpoison_shadow+0x33/0x50 [ 1083.230904] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1083.232182] v9fs_mount+0x79/0x8f0 [ 1083.233084] ? v9fs_write_inode+0x60/0x60 [ 1083.234108] legacy_get_tree+0x105/0x220 [ 1083.235295] vfs_get_tree+0x8e/0x300 [ 1083.236213] path_mount+0x13be/0x20b0 [ 1083.237169] ? strncpy_from_user+0x9e/0x470 [ 1083.237866] ? finish_automount+0xa40/0xa40 [ 1083.238589] ? getname_flags.part.0+0x1dd/0x4f0 [ 1083.239850] ? _copy_from_user+0xfb/0x1b0 [ 1083.240975] __x64_sys_mount+0x282/0x300 [ 1083.241556] ? copy_mnt_ns+0xa00/0xa00 [ 1083.242154] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1083.242884] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1083.244498] do_syscall_64+0x33/0x40 [ 1083.245462] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1083.247051] RIP: 0033:0x7f8ff0aa5b19 [ 1083.248020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1083.253564] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1083.255593] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 1083.257500] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1083.258866] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1083.260448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1083.261542] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 [ 1083.262903] hpet: Lost 3 RTC interrupts [ 1083.316965] 9pnet: Insufficient options for proto=fd 02:32:15 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:32:15 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x7, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:32:15 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 29) 02:32:15 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) lsetxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f0000000100)=ANY=[@ANYBLOB="041114efd532c45372933dd36533216f749d677d6298a27edc55c545cdd69962"], 0x13, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:32:16 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 37) [ 1083.517542] FAULT_INJECTION: forcing a failure. [ 1083.517542] name failslab, interval 1, probability 0, space 0, times 0 [ 1083.519131] CPU: 1 PID: 6641 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 1083.520041] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1083.521162] Call Trace: [ 1083.521528] dump_stack+0x107/0x167 [ 1083.522009] should_fail.cold+0x5/0xa [ 1083.522512] ? create_object.isra.0+0x3a/0xa20 [ 1083.523109] should_failslab+0x5/0x20 [ 1083.523599] kmem_cache_alloc+0x5b/0x360 [ 1083.524136] create_object.isra.0+0x3a/0xa20 [ 1083.524750] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1083.525414] __kmalloc_track_caller+0x177/0x3c0 [ 1083.526021] ? match_number+0xaf/0x1d0 [ 1083.526540] kmemdup_nul+0x2d/0xa0 [ 1083.527007] match_number+0xaf/0x1d0 [ 1083.527489] ? match_u64+0x190/0x190 [ 1083.527969] ? __kmalloc_track_caller+0x2d4/0x3c0 [ 1083.528827] ? memcpy+0x39/0x60 [ 1083.529382] parse_opts.part.0+0x1f3/0x340 [ 1083.529931] ? p9_fd_show_options+0x1c0/0x1c0 [ 1083.530522] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1083.531225] ? trace_hardirqs_on+0x5b/0x180 [ 1083.531805] ? kfree+0xd7/0x390 [ 1083.532437] p9_fd_create+0x98/0x4a0 [ 1083.533465] ? p9_conn_create+0x510/0x510 [ 1083.534558] ? p9_client_create+0x798/0x1090 [ 1083.535747] ? kfree+0xd7/0x390 [ 1083.536756] ? do_raw_spin_unlock+0x4f/0x220 [ 1083.537943] p9_client_create+0x7ff/0x1090 [ 1083.539092] ? p9_client_flush+0x430/0x430 [ 1083.540063] ? lockdep_init_map_type+0x2c7/0x780 [ 1083.541274] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1083.542487] ? __raw_spin_lock_init+0x36/0x110 [ 1083.543430] v9fs_session_init+0x1dd/0x16a0 [ 1083.548632] ? kmem_cache_alloc_trace+0x151/0x360 [ 1083.549950] ? v9fs_show_options+0x690/0x690 [ 1083.551134] ? kasan_unpoison_shadow+0x33/0x50 [ 1083.552417] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1083.553776] v9fs_mount+0x79/0x8f0 [ 1083.554727] ? v9fs_write_inode+0x60/0x60 [ 1083.555855] legacy_get_tree+0x105/0x220 [ 1083.557135] vfs_get_tree+0x8e/0x300 [ 1083.558162] path_mount+0x13be/0x20b0 [ 1083.559209] ? strncpy_from_user+0x9e/0x470 [ 1083.560612] ? finish_automount+0xa40/0xa40 [ 1083.561768] ? getname_flags.part.0+0x1dd/0x4f0 [ 1083.562993] ? _copy_from_user+0xfb/0x1b0 [ 1083.564110] __x64_sys_mount+0x282/0x300 [ 1083.565452] ? copy_mnt_ns+0xa00/0xa00 [ 1083.565472] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 02:32:16 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') [ 1083.565488] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1083.565506] do_syscall_64+0x33/0x40 [ 1083.565520] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1083.565531] RIP: 0033:0x7f5cd1c4db19 02:32:16 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) [ 1083.565547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1083.565554] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1083.565570] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 1083.565578] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1083.565586] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 1083.565594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1083.565601] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 1083.782011] FAULT_INJECTION: forcing a failure. [ 1083.782011] name failslab, interval 1, probability 0, space 0, times 0 [ 1083.784013] CPU: 1 PID: 6750 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 1083.785089] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1083.787707] Call Trace: [ 1083.788239] dump_stack+0x107/0x167 [ 1083.788724] should_fail.cold+0x5/0xa [ 1083.789786] ? create_object.isra.0+0x3a/0xa20 [ 1083.790966] should_failslab+0x5/0x20 [ 1083.792069] kmem_cache_alloc+0x5b/0x360 [ 1083.793222] create_object.isra.0+0x3a/0xa20 [ 1083.794041] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1083.794752] __kmalloc+0x16e/0x3f0 [ 1083.795252] p9_fcall_init+0x97/0x210 [ 1083.795786] p9_client_prepare_req.part.0+0x8c/0xb30 [ 1083.796725] p9_client_rpc+0x220/0x1210 [ 1083.797320] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1083.798051] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 1083.799088] ? pipe_poll+0x21b/0x7f0 [ 1083.800075] ? p9_fd_close+0x4a0/0x4a0 [ 1083.801238] ? anon_pipe_buf_release+0x280/0x280 [ 1083.802671] ? p9_fd_poll+0x1e0/0x2c0 [ 1083.803585] ? p9_fd_create+0x357/0x4a0 [ 1083.804754] ? p9_conn_create+0x510/0x510 [ 1083.805380] ? p9_client_create+0x798/0x1090 [ 1083.806466] ? kfree+0xd7/0x390 [ 1083.807276] ? do_raw_spin_unlock+0x4f/0x220 [ 1083.808437] p9_client_create+0xa76/0x1090 [ 1083.809697] ? p9_client_flush+0x430/0x430 [ 1083.810411] ? lockdep_init_map_type+0x2c7/0x780 [ 1083.811835] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1083.812762] ? __raw_spin_lock_init+0x36/0x110 [ 1083.813452] v9fs_session_init+0x1dd/0x16a0 [ 1083.814777] ? kmem_cache_alloc_trace+0x151/0x360 [ 1083.815604] ? v9fs_show_options+0x690/0x690 [ 1083.816302] ? kasan_unpoison_shadow+0x33/0x50 [ 1083.817588] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1083.818371] v9fs_mount+0x79/0x8f0 [ 1083.819413] ? v9fs_write_inode+0x60/0x60 [ 1083.820719] legacy_get_tree+0x105/0x220 [ 1083.821932] vfs_get_tree+0x8e/0x300 [ 1083.823094] path_mount+0x13be/0x20b0 [ 1083.824308] ? strncpy_from_user+0x9e/0x470 [ 1083.825787] ? finish_automount+0xa40/0xa40 [ 1083.827109] ? getname_flags.part.0+0x1dd/0x4f0 [ 1083.828578] ? _copy_from_user+0xfb/0x1b0 [ 1083.829902] __x64_sys_mount+0x282/0x300 [ 1083.831230] ? copy_mnt_ns+0xa00/0xa00 [ 1083.832433] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1083.834028] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1083.835577] do_syscall_64+0x33/0x40 [ 1083.836713] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1083.838292] RIP: 0033:0x7f8ff0aa5b19 [ 1083.839409] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1083.845138] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1083.847466] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 1083.849630] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1083.851793] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1083.854006] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1083.856353] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 [ 1099.268432] kmemleak: 4 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:32:40 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:32:40 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:32:40 executing program 1: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:32:40 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:32:40 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x8, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:32:40 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 30) 02:32:40 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 38) [ 1107.936062] FAULT_INJECTION: forcing a failure. 02:32:40 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000300)={0x45, 0x7d, 0x1, {0x0, 0x3e, 0xffff, 0x8, {0x1, 0x3, 0x7}, 0x1248000, 0x3f, 0x1, 0x2e, 0x1, '\x00', 0x3, ',&:', 0x1, '&', 0x6, '\xff\xff\xff\xff\xff\xff'}}, 0x45) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000080)=0x14) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000680)={'erspan0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB='syztnl1\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="0008001400000006007f298278e0000002ac14ccaa41251b7089446980dde15cc54cf6300f24ac1e01010a01011affffffff9404010000"]}) sendto$packet(r0, &(0x7f00000000c0)="50a482b944f317c5cdf9a98790b84dc217ff862c9dfbce4c616edfa9203ba7cbf4469de0bc9cdd4e644330a0f20061b9b155fd4e1010374280c3d7eef3aaf811372e69438866b045c955eb2197567ee5218eff3f78c941573374305c255d181f2e5d7371427bd443a5550dd3f454952e0da506b42170f5d7b90f739f7bffa5db2e16e477abb4cbc5638cb2ea3cbd64074f029b8dc48570fd60c1a98e799576936b5d59a052056225e78a134d57e7", 0xae, 0x0, &(0x7f00000006c0)={0x11, 0x1c, r1, 0x1, 0x2, 0x6, @broadcast}, 0x14) [ 1107.936062] name failslab, interval 1, probability 0, space 0, times 0 [ 1107.937782] CPU: 0 PID: 6771 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 1107.938779] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1107.939936] Call Trace: [ 1107.940681] dump_stack+0x107/0x167 [ 1107.941210] should_fail.cold+0x5/0xa [ 1107.942354] ? p9_fcall_init+0x97/0x210 [ 1107.942892] should_failslab+0x5/0x20 [ 1107.943419] __kmalloc+0x72/0x3f0 [ 1107.943963] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1107.944806] p9_fcall_init+0x97/0x210 [ 1107.945368] p9_client_prepare_req.part.0+0xf4/0xb30 [ 1107.946154] p9_client_rpc+0x220/0x1210 [ 1107.946791] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1107.947613] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 1107.948447] ? pipe_poll+0x21b/0x7f0 [ 1107.949014] ? p9_fd_close+0x4a0/0x4a0 [ 1107.949604] ? anon_pipe_buf_release+0x280/0x280 [ 1107.950329] ? p9_fd_poll+0x1e0/0x2c0 [ 1107.950917] ? p9_fd_create+0x357/0x4a0 [ 1107.951054] FAULT_INJECTION: forcing a failure. [ 1107.951054] name failslab, interval 1, probability 0, space 0, times 0 [ 1107.951518] ? p9_conn_create+0x510/0x510 [ 1107.951530] ? p9_client_create+0x798/0x1090 [ 1107.951543] ? kfree+0xd7/0x390 [ 1107.951556] ? do_raw_spin_unlock+0x4f/0x220 [ 1107.951575] p9_client_create+0xa76/0x1090 [ 1107.951597] ? p9_client_flush+0x430/0x430 [ 1107.957311] ? lockdep_init_map_type+0x2c7/0x780 [ 1107.958012] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1107.958740] ? __raw_spin_lock_init+0x36/0x110 [ 1107.959467] v9fs_session_init+0x1dd/0x16a0 [ 1107.960147] ? kmem_cache_alloc_trace+0x151/0x360 [ 1107.960911] ? v9fs_show_options+0x690/0x690 [ 1107.961603] ? kasan_unpoison_shadow+0x33/0x50 [ 1107.962310] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1107.963083] v9fs_mount+0x79/0x8f0 [ 1107.963630] ? v9fs_write_inode+0x60/0x60 [ 1107.964262] legacy_get_tree+0x105/0x220 [ 1107.964912] vfs_get_tree+0x8e/0x300 [ 1107.965443] path_mount+0x13be/0x20b0 [ 1107.966025] ? strncpy_from_user+0x9e/0x470 [ 1107.966662] ? finish_automount+0xa40/0xa40 [ 1107.967322] ? getname_flags.part.0+0x1dd/0x4f0 [ 1107.968018] ? _copy_from_user+0xfb/0x1b0 [ 1107.968675] __x64_sys_mount+0x282/0x300 [ 1107.969303] ? copy_mnt_ns+0xa00/0xa00 [ 1107.969901] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1107.970700] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1107.971482] do_syscall_64+0x33/0x40 [ 1107.972054] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1107.972949] RIP: 0033:0x7f8ff0aa5b19 [ 1107.973495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1107.976186] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1107.977335] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 1107.978413] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1107.979487] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1107.980586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1107.981645] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 [ 1107.982744] CPU: 1 PID: 6773 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 1107.983049] hpet: Lost 2 RTC interrupts [ 1107.983926] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1107.985916] Call Trace: [ 1107.986319] dump_stack+0x107/0x167 [ 1107.986847] should_fail.cold+0x5/0xa [ 1107.987405] should_failslab+0x5/0x20 [ 1107.987938] __kmalloc_track_caller+0x79/0x3c0 [ 1107.988674] ? match_number+0xaf/0x1d0 [ 1107.989247] ? kfree+0xd7/0x390 [ 1107.989709] kmemdup_nul+0x2d/0xa0 [ 1107.990202] match_number+0xaf/0x1d0 [ 1107.990710] ? match_u64+0x190/0x190 [ 1107.991200] ? __kmalloc_track_caller+0x2d4/0x3c0 [ 1107.991831] ? memcpy+0x39/0x60 [ 1107.992273] parse_opts.part.0+0x1f3/0x340 [ 1107.992837] ? p9_fd_show_options+0x1c0/0x1c0 [ 1107.993497] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1107.994833] ? trace_hardirqs_on+0x5b/0x180 [ 1107.995436] ? kfree+0xd7/0x390 [ 1107.995962] p9_fd_create+0x98/0x4a0 [ 1107.996511] ? p9_conn_create+0x510/0x510 [ 1107.997051] ? p9_client_create+0x798/0x1090 [ 1107.997624] ? kfree+0xd7/0x390 [ 1107.998077] ? do_raw_spin_unlock+0x4f/0x220 [ 1107.998681] p9_client_create+0x7ff/0x1090 [ 1107.999266] ? p9_client_flush+0x430/0x430 [ 1107.999837] ? lockdep_init_map_type+0x2c7/0x780 [ 1108.000447] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1108.001948] ? __raw_spin_lock_init+0x36/0x110 [ 1108.002659] v9fs_session_init+0x1dd/0x16a0 [ 1108.004003] ? kmem_cache_alloc_trace+0x151/0x360 [ 1108.004752] ? v9fs_show_options+0x690/0x690 [ 1108.005455] ? kasan_unpoison_shadow+0x33/0x50 [ 1108.006173] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1108.007742] v9fs_mount+0x79/0x8f0 [ 1108.008292] ? v9fs_write_inode+0x60/0x60 [ 1108.008953] legacy_get_tree+0x105/0x220 [ 1108.009596] vfs_get_tree+0x8e/0x300 [ 1108.010186] path_mount+0x13be/0x20b0 02:32:40 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') [ 1108.011478] ? strncpy_from_user+0x9e/0x470 [ 1108.011496] ? finish_automount+0xa40/0xa40 [ 1108.011513] ? getname_flags.part.0+0x1dd/0x4f0 [ 1108.011526] ? _copy_from_user+0xfb/0x1b0 [ 1108.011550] __x64_sys_mount+0x282/0x300 [ 1108.011567] ? copy_mnt_ns+0xa00/0xa00 [ 1108.011586] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1108.011602] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1108.011620] do_syscall_64+0x33/0x40 [ 1108.011636] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1108.011647] RIP: 0033:0x7f5cd1c4db19 [ 1108.011662] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 02:32:40 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 39) [ 1108.011670] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 02:32:40 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 31) 02:32:40 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000280)=""/199, 0xc7}, {&(0x7f0000000100)=""/104, 0x68}, {&(0x7f0000000380)=""/175, 0xaf}], 0x3, &(0x7f0000000440)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x108}, 0x100) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 1108.011686] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 1108.011694] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 02:32:40 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(0xffffffffffffffff, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') [ 1108.011703] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 1108.011711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1108.011719] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 1108.012027] 9pnet: Insufficient options for proto=fd [ 1108.198316] FAULT_INJECTION: forcing a failure. [ 1108.198316] name failslab, interval 1, probability 0, space 0, times 0 [ 1108.198334] CPU: 1 PID: 6815 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 1108.198341] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1108.198345] Call Trace: [ 1108.198369] dump_stack+0x107/0x167 [ 1108.198385] should_fail.cold+0x5/0xa [ 1108.198399] ? p9_fcall_init+0x97/0x210 02:32:40 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x820c1, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x880, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:32:40 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 40) [ 1108.198416] should_failslab+0x5/0x20 [ 1108.198428] __kmalloc+0x72/0x3f0 [ 1108.198442] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1108.198458] p9_fcall_init+0x97/0x210 [ 1108.198474] p9_client_prepare_req.part.0+0xf4/0xb30 [ 1108.198493] p9_client_rpc+0x220/0x1210 [ 1108.198508] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1108.198528] ? p9_client_prepare_req.part.0+0xb30/0xb30 02:32:40 executing program 6: lsetxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={'L-', 0x9}, 0x16, 0x1) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80003}, 0x208}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000000)=0x2) io_setup(0x3e7, &(0x7f0000000580)=0x0) r3 = dup2(0xffffffffffffffff, 0xffffffffffffffff) io_submit(r2, 0x7, &(0x7f0000000a40)=[&(0x7f0000000080)={0x4004800, 0x500, 0x0, 0x0, 0x0, r0, 0x0}]) r4 = mmap$IORING_OFF_SQ_RING(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2, 0x1010, r3, 0x0) syz_io_uring_submit(r4, 0x0, &(0x7f0000000200)=@IORING_OP_OPENAT2={0x1c, 0x0, 0x0, r3, &(0x7f0000000180)={0x102, 0x0, 0x5}, &(0x7f00000001c0)='./file0\x00', 0x18, 0x0, 0x23456}, 0x2) ioctl$BINDER_FREEZE(0xffffffffffffffff, 0x400c620e, 0x0) recvmmsg$unix(r3, &(0x7f0000001f40)=[{{&(0x7f0000000840), 0x6e, &(0x7f0000000900)=[{&(0x7f0000000a80)=""/4096, 0x1000}, {&(0x7f00000008c0)=""/47, 0x2f}], 0x2, &(0x7f0000000940)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f0000001a80), 0x6e, &(0x7f0000001bc0)=[{&(0x7f0000000a00)}, {&(0x7f0000001b00)=""/129, 0x81}], 0x2, &(0x7f0000001c00)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x38}}, {{&(0x7f0000001c40), 0x6e, &(0x7f0000001cc0)=[{&(0x7f0000001e00)=""/200, 0xc8}], 0x1}}, {{&(0x7f0000001d00), 0x6e, &(0x7f0000001f00)}}], 0x4, 0x0, &(0x7f0000002040)) r7 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r7, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r7, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r7, &(0x7f0000002200)=ANY=[@ANYBLOB="c25ef0aa6a31ea74f078f8fd81b04aaafdb89b660fbe62f77443c7a44ec9e08fe9fe64cf7a46c31f1d6bf3fe39d6be74a3fd4669fae821e9845b0d8dff4beddc0a28c7a9ee791cfd2ef1a864e1ee8ca04864ba2639ed"], 0x5bc) write$binfmt_elf64(r7, &(0x7f0000002280)=ANY=[@ANYBLOB="e8cf700a7c8460f2cc49a28f5e0f4d3128118f8a4bd6ca4a22e2174ab05a3e03c8ce3ea66c16ce7f76382638fbf1d8d5415ad591dfdf2729b13604257e427fa4eba63cc03b4895c65d0b10a129fcb31cd75e9c499ef96b28272c1d6a93f903a62410bb3596e33c8fa245700807ef2701e52771ce3ccc54ec0a137bd5642177debc875146", @ANYRESDEC=r6], 0xfdef) io_submit(r2, 0x8, &(0x7f00000021c0)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x5, 0x80, r0, &(0x7f0000000280)="52ba16eb8483303f08e88bfa1d3a7d05053b652fbdb6a3fa6a0fd9f83cef8acdae1a992619d6c50015abd91701fb7e01361e028305feed601721a51ebacf6db72cc13fc137d8826e518d56f1a3dc325b262abaf7696bfffcc630438812031e46254fec321e", 0x65, 0x2, 0x0, 0x1}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x6, 0xffffffffffffffff, &(0x7f0000000380)="8daad876ce0c412fb77d20842ef984bcba55070380d31477acbb5a9c67b3787b2eb6702e0114cd1ca6cb53413c66c96aa52e60663ee5249d4acc300de9b3d086ef3a30faad4e2360f17b90357b04915f", 0x50, 0x1, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0xfa, r0, &(0x7f0000000480)="a15427c12db556bdd18a833ca79b627dda315066b00e00a57dfc5eb1eeba90ff85416c0b3fab8e698a877156a215cb95b62ba5e193d7bf4f6a43305ac18c979dc6905a4a512c212ea05507001769ebf8cd7f343dd9dc", 0x56, 0x4}, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1, 0xfe01, 0xffffffffffffffff, &(0x7f00000005c0)="b1015f7dce7cad1fb04c30e640b83d8a40995eaa7a9255c4f3f5ef041d363ac3084051a58dc934f82d8d8b7fdd9a07f043def2fd8ba78637da8cdbce2a0f48c2e68ddab44afe6b4882ed1c824d71e9808be72b72dd3f243c74e4990a3bb29f9690d32de0f99271b97a8f7be56e414048eea3dd6b66a23b09a076e7165a889d1c472c9db036e1157eb289d8a629511031170ee898d09374c4c9bb4784e887340f19b506e6b050d0c04f", 0xa9, 0x5, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x1, 0x5, r3, &(0x7f0000000680)="6e17c3b83047eb5f4b8c7e38b676b1603b2e48e3b2e9e0a312", 0x19, 0x9, 0x0, 0x3, r3}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x3, 0x2, r3, &(0x7f0000000700)="4683ca0a4b2d2d367da5c8f1d328b8352c820585d4", 0x15, 0x8e9, 0x0, 0x2, r3}, &(0x7f0000002080)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000780)="79f62dfd7a5bfc50a81deb4e791dfbd6a93b24daa886b92552a669a272d2514071a3d4bc5e60b1d06e294af4059260b8376101e463b787e29917fb9d283e1872cc61ca7f2de556761fe10a7346393d57b6810d18c0e1bb1d2d9af7263d6d3838ec3d706d0984bd4bad849e22e263dcfd8354339281408160de0b7fd9ff5dbc1059e165c2f2383337bc16831615e224070c4277f820fb8daf0f8bf0c345afc572318a1b711a71feb795937b399f", 0xad, 0xffffffffffffffae, 0x0, 0x1, r5}, &(0x7f0000002180)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f00000020c0)="06edc9574902c150adcf70b5fd70356e27bb4081f4b6e42c257c98d6c9f8cd7902e216dcc6c8537ab41529c7961d8151021368aafe6d8512414dbd8817bbf50808960a4f609966053522c5215d22739cd68ee0ef6ef2f12257af1b784ae94bec89f526d672b6c629acca9c587bad4685f19d46d733ff2d83228441930d62c7503b0725bf83529901afe178d908f8b88638be4fc8984635aea686a472b92f8fce0cd4fac0b73df05e3dd35a79d15ebca6d01a19d639a16e3d2c7e8aad5e8eb3", 0xbf, 0x2, 0x0, 0x2, r7}]) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000040)={r1, 0xffffffffffffff7f, 0x8, 0x4}) pipe2$9p(&(0x7f0000000240), 0x4000) [ 1108.198547] ? pipe_poll+0x21b/0x7f0 [ 1108.198559] ? p9_fd_close+0x4a0/0x4a0 [ 1108.198573] ? anon_pipe_buf_release+0x280/0x280 [ 1108.198589] ? p9_fd_poll+0x1e0/0x2c0 [ 1108.198607] ? p9_fd_create+0x357/0x4a0 [ 1108.198619] ? p9_conn_create+0x510/0x510 02:32:40 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 32) [ 1108.198629] ? p9_client_create+0x798/0x1090 [ 1108.198642] ? kfree+0xd7/0x390 [ 1108.198654] ? do_raw_spin_unlock+0x4f/0x220 [ 1108.198674] p9_client_create+0xa76/0x1090 [ 1108.198698] ? p9_client_flush+0x430/0x430 [ 1108.198720] ? lockdep_init_map_type+0x2c7/0x780 [ 1108.198733] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1108.198752] ? __raw_spin_lock_init+0x36/0x110 [ 1108.198775] v9fs_session_init+0x1dd/0x16a0 [ 1108.198803] ? kmem_cache_alloc_trace+0x151/0x360 [ 1108.198820] ? v9fs_show_options+0x690/0x690 [ 1108.198852] ? kasan_unpoison_shadow+0x33/0x50 [ 1108.198868] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1108.198888] v9fs_mount+0x79/0x8f0 [ 1108.198906] ? v9fs_write_inode+0x60/0x60 [ 1108.198922] legacy_get_tree+0x105/0x220 [ 1108.198942] vfs_get_tree+0x8e/0x300 [ 1108.198958] path_mount+0x13be/0x20b0 [ 1108.198976] ? strncpy_from_user+0x9e/0x470 [ 1108.198991] ? finish_automount+0xa40/0xa40 [ 1108.199007] ? getname_flags.part.0+0x1dd/0x4f0 [ 1108.199020] ? _copy_from_user+0xfb/0x1b0 [ 1108.199043] __x64_sys_mount+0x282/0x300 [ 1108.199059] ? copy_mnt_ns+0xa00/0xa00 [ 1108.199077] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1108.199092] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1108.199109] do_syscall_64+0x33/0x40 [ 1108.199124] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1108.199133] RIP: 0033:0x7f8ff0aa5b19 [ 1108.199146] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1108.199153] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1108.199169] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 1108.199177] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1108.199185] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1108.199193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1108.199201] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 [ 1108.221443] FAULT_INJECTION: forcing a failure. [ 1108.221443] name failslab, interval 1, probability 0, space 0, times 0 [ 1108.221459] CPU: 1 PID: 6827 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 1108.221467] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1108.221471] Call Trace: [ 1108.221489] dump_stack+0x107/0x167 [ 1108.221505] should_fail.cold+0x5/0xa [ 1108.221520] ? create_object.isra.0+0x3a/0xa20 [ 1108.221537] should_failslab+0x5/0x20 [ 1108.221550] kmem_cache_alloc+0x5b/0x360 [ 1108.221567] create_object.isra.0+0x3a/0xa20 [ 1108.221580] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1108.221598] __kmalloc_track_caller+0x177/0x3c0 [ 1108.221610] ? match_number+0xaf/0x1d0 [ 1108.221629] kmemdup_nul+0x2d/0xa0 [ 1108.221642] match_number+0xaf/0x1d0 [ 1108.221655] ? match_u64+0x190/0x190 [ 1108.221668] ? __kmalloc_track_caller+0x2d4/0x3c0 [ 1108.221684] ? memcpy+0x39/0x60 [ 1108.221703] parse_opts.part.0+0x1f3/0x340 [ 1108.221719] ? p9_fd_show_options+0x1c0/0x1c0 [ 1108.221739] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1108.221754] ? trace_hardirqs_on+0x5b/0x180 [ 1108.221769] ? kfree+0xd7/0x390 [ 1108.221789] p9_fd_create+0x98/0x4a0 [ 1108.221802] ? p9_conn_create+0x510/0x510 [ 1108.221813] ? p9_client_create+0x798/0x1090 [ 1108.221825] ? kfree+0xd7/0x390 [ 1108.221837] ? do_raw_spin_unlock+0x4f/0x220 [ 1108.221855] p9_client_create+0x7ff/0x1090 [ 1108.221877] ? p9_client_flush+0x430/0x430 [ 1108.221897] ? lockdep_init_map_type+0x2c7/0x780 [ 1108.221911] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1108.221928] ? __raw_spin_lock_init+0x36/0x110 [ 1108.221951] v9fs_session_init+0x1dd/0x16a0 [ 1108.221975] ? kmem_cache_alloc_trace+0x151/0x360 [ 1108.221991] ? v9fs_show_options+0x690/0x690 [ 1108.222021] ? kasan_unpoison_shadow+0x33/0x50 [ 1108.222036] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1108.222053] v9fs_mount+0x79/0x8f0 [ 1108.222069] ? v9fs_write_inode+0x60/0x60 [ 1108.222083] legacy_get_tree+0x105/0x220 [ 1108.222101] vfs_get_tree+0x8e/0x300 [ 1108.222117] path_mount+0x13be/0x20b0 [ 1108.222135] ? strncpy_from_user+0x9e/0x470 [ 1108.222151] ? finish_automount+0xa40/0xa40 [ 1108.222168] ? getname_flags.part.0+0x1dd/0x4f0 [ 1108.222179] ? _copy_from_user+0xfb/0x1b0 [ 1108.222209] __x64_sys_mount+0x282/0x300 [ 1108.222224] ? copy_mnt_ns+0xa00/0xa00 [ 1108.222240] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1108.222256] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1108.222273] do_syscall_64+0x33/0x40 [ 1108.222287] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1108.222296] RIP: 0033:0x7f5cd1c4db19 [ 1108.222309] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1108.222316] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1108.222332] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 1108.222341] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1108.222350] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 1108.222358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1108.222367] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 1108.348341] FAULT_INJECTION: forcing a failure. [ 1108.348341] name failslab, interval 1, probability 0, space 0, times 0 [ 1108.348451] CPU: 1 PID: 6894 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 1108.348459] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1108.348464] Call Trace: [ 1108.348520] dump_stack+0x107/0x167 [ 1108.348539] should_fail.cold+0x5/0xa [ 1108.348560] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1108.348577] should_failslab+0x5/0x20 [ 1108.348592] kmem_cache_alloc+0x5b/0x360 [ 1108.348613] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1108.348634] idr_get_free+0x4b5/0x8f0 [ 1108.348666] idr_alloc_u32+0x170/0x2d0 [ 1108.348687] ? __fprop_inc_percpu_max+0x130/0x130 [ 1108.348705] ? p9_client_prepare_req.part.0+0x20a/0xb30 [ 1108.348726] ? lock_release+0x6b0/0x6b0 [ 1108.348746] idr_alloc+0xc2/0x130 [ 1108.348760] ? idr_alloc_u32+0x2d0/0x2d0 [ 1108.348774] ? rwlock_bug.part.0+0x90/0x90 [ 1108.348800] p9_client_prepare_req.part.0+0x625/0xb30 [ 1108.348821] p9_client_rpc+0x220/0x1210 [ 1108.348835] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1108.348858] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 1108.348877] ? pipe_poll+0x21b/0x7f0 [ 1108.348890] ? p9_fd_close+0x4a0/0x4a0 [ 1108.348902] ? anon_pipe_buf_release+0x280/0x280 [ 1108.348918] ? p9_fd_poll+0x1e0/0x2c0 [ 1108.348939] ? p9_fd_create+0x357/0x4a0 [ 1108.348952] ? p9_conn_create+0x510/0x510 [ 1108.348963] ? p9_client_create+0x798/0x1090 [ 1108.348976] ? kfree+0xd7/0x390 [ 1108.348990] ? do_raw_spin_unlock+0x4f/0x220 [ 1108.349010] p9_client_create+0xa76/0x1090 [ 1108.349033] ? p9_client_flush+0x430/0x430 [ 1108.349055] ? lockdep_init_map_type+0x2c7/0x780 [ 1108.349069] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1108.349088] ? __raw_spin_lock_init+0x36/0x110 [ 1108.349112] v9fs_session_init+0x1dd/0x16a0 [ 1108.349138] ? kmem_cache_alloc_trace+0x151/0x360 [ 1108.349155] ? v9fs_show_options+0x690/0x690 [ 1108.349187] ? kasan_unpoison_shadow+0x33/0x50 [ 1108.349202] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1108.349221] v9fs_mount+0x79/0x8f0 [ 1108.349239] ? v9fs_write_inode+0x60/0x60 [ 1108.349254] legacy_get_tree+0x105/0x220 [ 1108.349274] vfs_get_tree+0x8e/0x300 [ 1108.349292] path_mount+0x13be/0x20b0 [ 1108.349311] ? strncpy_from_user+0x9e/0x470 [ 1108.349328] ? finish_automount+0xa40/0xa40 [ 1108.349345] ? getname_flags.part.0+0x1dd/0x4f0 [ 1108.349359] ? _copy_from_user+0xfb/0x1b0 [ 1108.349385] __x64_sys_mount+0x282/0x300 [ 1108.349401] ? copy_mnt_ns+0xa00/0xa00 [ 1108.349419] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1108.349436] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1108.349455] do_syscall_64+0x33/0x40 [ 1108.349471] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1108.349481] RIP: 0033:0x7f8ff0aa5b19 [ 1108.349495] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1108.349503] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1108.349519] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 1108.349529] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1108.349537] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1108.349546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1108.349555] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 [ 1108.485192] FAULT_INJECTION: forcing a failure. [ 1108.485192] name failslab, interval 1, probability 0, space 0, times 0 [ 1108.485210] CPU: 1 PID: 6901 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 1108.485217] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1108.485222] Call Trace: [ 1108.485244] dump_stack+0x107/0x167 [ 1108.485262] should_fail.cold+0x5/0xa [ 1108.485278] ? p9_fd_create+0x161/0x4a0 [ 1108.485296] should_failslab+0x5/0x20 [ 1108.485311] kmem_cache_alloc_trace+0x55/0x360 [ 1108.485335] p9_fd_create+0x161/0x4a0 [ 1108.485348] ? p9_conn_create+0x510/0x510 [ 1108.485359] ? p9_client_create+0x798/0x1090 [ 1108.485371] ? kfree+0xd7/0x390 [ 1108.485386] ? do_raw_spin_unlock+0x4f/0x220 [ 1108.485403] p9_client_create+0x7ff/0x1090 [ 1108.485423] ? p9_client_flush+0x430/0x430 [ 1108.485445] ? lockdep_init_map_type+0x2c7/0x780 [ 1108.485458] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1108.485475] ? __raw_spin_lock_init+0x36/0x110 [ 1108.485498] v9fs_session_init+0x1dd/0x16a0 [ 1108.485523] ? kmem_cache_alloc_trace+0x151/0x360 [ 1108.485537] ? v9fs_show_options+0x690/0x690 [ 1108.485566] ? kasan_unpoison_shadow+0x33/0x50 [ 1108.485580] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1108.485599] v9fs_mount+0x79/0x8f0 [ 1108.485615] ? v9fs_write_inode+0x60/0x60 [ 1108.485631] legacy_get_tree+0x105/0x220 [ 1108.485649] vfs_get_tree+0x8e/0x300 [ 1108.485665] path_mount+0x13be/0x20b0 [ 1108.485683] ? strncpy_from_user+0x9e/0x470 [ 1108.485699] ? finish_automount+0xa40/0xa40 [ 1108.485716] ? getname_flags.part.0+0x1dd/0x4f0 [ 1108.485730] ? _copy_from_user+0xfb/0x1b0 [ 1108.485751] __x64_sys_mount+0x282/0x300 [ 1108.485766] ? copy_mnt_ns+0xa00/0xa00 [ 1108.485784] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1108.485801] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1108.485817] do_syscall_64+0x33/0x40 [ 1108.485831] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1108.485841] RIP: 0033:0x7f5cd1c4db19 [ 1108.485854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1108.485862] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1108.485878] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 1108.485886] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1108.485894] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 1108.485902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1108.485910] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 1123.661584] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1124.393016] hpet: Lost 1 RTC interrupts 02:33:05 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x3f, 0x3f, 0x5, 0x9, 0x0, 0x409fddf7, 0x90000, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x1, @perf_bp, 0x414, 0x8, 0x1d4d800, 0x3, 0x80000000, 0x1, 0x20c2, 0x0, 0x5, 0x0, 0x101}, 0x0, 0x10, 0xffffffffffffffff, 0xb) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:33:05 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 41) 02:33:05 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, 0x0) 02:33:05 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x9, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:33:05 executing program 6: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) r3 = socket(0x10, 0x5, 0x98) sendfile(r2, r3, 0x0, 0x100) fcntl$setstatus(r1, 0x4, 0x42400) close(r0) 02:33:05 executing program 1: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:33:05 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:33:05 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 33) [ 1132.623254] FAULT_INJECTION: forcing a failure. [ 1132.623254] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.625184] CPU: 1 PID: 6918 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 1132.626145] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1132.627374] Call Trace: [ 1132.627817] dump_stack+0x107/0x167 [ 1132.628361] should_fail.cold+0x5/0xa [ 1132.628968] ? create_object.isra.0+0x3a/0xa20 [ 1132.629640] should_failslab+0x5/0x20 [ 1132.630234] kmem_cache_alloc+0x5b/0x360 [ 1132.630863] ? p9_fd_show_options+0x1c0/0x1c0 [ 1132.631572] create_object.isra.0+0x3a/0xa20 [ 1132.632271] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1132.633078] kmem_cache_alloc_trace+0x151/0x360 [ 1132.633818] p9_fd_create+0x161/0x4a0 [ 1132.634408] ? p9_conn_create+0x510/0x510 [ 1132.635062] ? p9_client_create+0x798/0x1090 [ 1132.635735] ? kfree+0xd7/0x390 [ 1132.636245] ? do_raw_spin_unlock+0x4f/0x220 [ 1132.636988] p9_client_create+0x7ff/0x1090 [ 1132.637665] ? p9_client_flush+0x430/0x430 [ 1132.638330] ? lockdep_init_map_type+0x2c7/0x780 [ 1132.639213] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1132.639954] ? __raw_spin_lock_init+0x36/0x110 [ 1132.640671] v9fs_session_init+0x1dd/0x16a0 [ 1132.641396] ? kmem_cache_alloc_trace+0x151/0x360 [ 1132.642154] ? v9fs_show_options+0x690/0x690 [ 1132.642835] ? kasan_unpoison_shadow+0x33/0x50 [ 1132.643520] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1132.644335] v9fs_mount+0x79/0x8f0 [ 1132.645068] ? v9fs_write_inode+0x60/0x60 [ 1132.645705] legacy_get_tree+0x105/0x220 [ 1132.646321] vfs_get_tree+0x8e/0x300 [ 1132.646883] path_mount+0x13be/0x20b0 [ 1132.647536] ? strncpy_from_user+0x9e/0x470 [ 1132.648206] ? finish_automount+0xa40/0xa40 [ 1132.648875] ? getname_flags.part.0+0x1dd/0x4f0 [ 1132.649557] ? _copy_from_user+0xfb/0x1b0 [ 1132.650195] __x64_sys_mount+0x282/0x300 [ 1132.650800] ? copy_mnt_ns+0xa00/0xa00 [ 1132.651391] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1132.652190] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1132.652996] do_syscall_64+0x33/0x40 [ 1132.653556] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1132.654397] RIP: 0033:0x7f5cd1c4db19 [ 1132.655012] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1132.657865] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1132.659019] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 1132.660097] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1132.661195] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 1132.662269] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1132.663293] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 1132.670440] FAULT_INJECTION: forcing a failure. [ 1132.670440] name failslab, interval 1, probability 0, space 0, times 0 [ 1132.672249] CPU: 1 PID: 6917 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 1132.673323] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1132.674584] Call Trace: [ 1132.674992] dump_stack+0x107/0x167 [ 1132.675503] should_fail.cold+0x5/0xa [ 1132.676062] ? create_object.isra.0+0x3a/0xa20 [ 1132.676721] should_failslab+0x5/0x20 [ 1132.677298] kmem_cache_alloc+0x5b/0x360 [ 1132.677872] create_object.isra.0+0x3a/0xa20 [ 1132.678519] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1132.679321] __kmalloc+0x16e/0x3f0 [ 1132.679832] p9_fcall_init+0x97/0x210 [ 1132.680368] p9_client_prepare_req.part.0+0xf4/0xb30 [ 1132.681158] ? trace_hardirqs_on+0x5b/0x180 [ 1132.681759] p9_client_rpc+0x220/0x1210 [ 1132.682323] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 1132.683062] ? write_comp_data+0x13/0x80 [ 1132.683669] ? pipe_poll+0x21b/0x7f0 [ 1132.684195] ? p9_fd_close+0x4a0/0x4a0 [ 1132.684786] ? anon_pipe_buf_release+0x280/0x280 [ 1132.685517] ? p9_fd_poll+0x1e0/0x2c0 [ 1132.686108] ? p9_fd_create+0x357/0x4a0 [ 1132.686712] ? p9_conn_create+0x510/0x510 [ 1132.687350] ? p9_client_create+0x798/0x1090 [ 1132.688079] ? kfree+0xd7/0x390 [ 1132.688625] ? do_raw_spin_unlock+0x4f/0x220 [ 1132.689347] p9_client_create+0xa76/0x1090 [ 1132.690014] ? p9_client_flush+0x430/0x430 [ 1132.690676] ? lockdep_init_map_type+0x2c7/0x780 [ 1132.691419] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1132.692169] ? __raw_spin_lock_init+0x36/0x110 [ 1132.692899] v9fs_session_init+0x1dd/0x16a0 [ 1132.693585] ? kmem_cache_alloc_trace+0x151/0x360 [ 1132.694344] ? v9fs_show_options+0x690/0x690 [ 1132.695040] ? kasan_unpoison_shadow+0x33/0x50 [ 1132.696269] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1132.697072] v9fs_mount+0x79/0x8f0 [ 1132.697614] ? v9fs_write_inode+0x60/0x60 [ 1132.698196] legacy_get_tree+0x105/0x220 [ 1132.698765] vfs_get_tree+0x8e/0x300 [ 1132.699333] path_mount+0x13be/0x20b0 [ 1132.699935] ? strncpy_from_user+0x9e/0x470 [ 1132.700614] ? finish_automount+0xa40/0xa40 [ 1132.701262] ? getname_flags.part.0+0x1dd/0x4f0 [ 1132.701927] ? _copy_from_user+0xfb/0x1b0 [ 1132.702653] __x64_sys_mount+0x282/0x300 [ 1132.703303] ? copy_mnt_ns+0xa00/0xa00 [ 1132.703916] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1132.704723] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1132.705524] do_syscall_64+0x33/0x40 [ 1132.706099] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1132.706901] RIP: 0033:0x7f8ff0aa5b19 [ 1132.707486] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1132.710334] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1132.711497] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 1132.713126] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1132.715201] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1132.716286] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1132.717467] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 02:33:05 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, 0x0) 02:33:05 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000080)) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000000), 0x906058, &(0x7f0000000080)=ANY=[]) 02:33:05 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x40}, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xfffffffffffffffa, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) pidfd_getfd(0xffffffffffffffff, r0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readlink(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)=""/85, 0x55) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/247, 0xf7) 02:33:05 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, 0x0) 02:33:05 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200001, 0x48) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4, 0x80000000) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000180)) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x800005, 0xffffffff, 0x8000, 0x2, 0xfffffffb}) unshare(0x48020200) 02:33:05 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() prlimit64(r1, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x30, 0x3, 0x2, 0x7, 0x0, 0x5b0, 0x10400, 0xa, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0xa6, 0x5}, 0x5c000, 0x7ff, 0x7, 0x7, 0x6, 0x8, 0x8000, 0x0, 0x16800000, 0x0, 0x6}, r1, 0x3, r0, 0xb) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = getpgrp(r1) prlimit64(r2, 0xb, &(0x7f0000000000)={0x7, 0x4}, &(0x7f0000000100)) 02:33:05 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xa, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:33:05 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 34) 02:33:05 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') (fail_nth: 1) [ 1133.088632] FAULT_INJECTION: forcing a failure. [ 1133.088632] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1133.090640] CPU: 0 PID: 7056 Comm: syz-executor.5 Not tainted 5.10.161 #1 [ 1133.091623] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1133.092712] Call Trace: [ 1133.093155] dump_stack+0x107/0x167 [ 1133.093723] should_fail.cold+0x5/0xa [ 1133.094318] strncpy_from_user+0x34/0x470 [ 1133.094908] removexattr+0x88/0x130 [ 1133.095399] ? vfs_removexattr+0x250/0x250 [ 1133.095974] ? lock_acquire+0x197/0x490 [ 1133.096513] ? __x64_sys_fremovexattr+0x101/0x1e0 [ 1133.097177] ? lock_release+0x6b0/0x6b0 [ 1133.097710] ? wait_for_completion+0x270/0x270 [ 1133.099118] ? __fget_files+0x296/0x480 [ 1133.100138] ? __mnt_want_write+0x196/0x280 [ 1133.101264] __x64_sys_fremovexattr+0x16f/0x1e0 [ 1133.102452] do_syscall_64+0x33/0x40 [ 1133.103344] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1133.104690] RIP: 0033:0x7fa63fa8cb19 [ 1133.105934] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1133.111815] RSP: 002b:00007fa63d002188 EFLAGS: 00000246 ORIG_RAX: 00000000000000c7 [ 1133.114033] RAX: ffffffffffffffda RBX: 00007fa63fb9ff60 RCX: 00007fa63fa8cb19 [ 1133.115464] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 1133.116421] RBP: 00007fa63d0021d0 R08: 0000000000000000 R09: 0000000000000000 [ 1133.118198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1133.120035] R13: 00007ffed6cf012f R14: 00007fa63d002300 R15: 0000000000022000 [ 1133.122266] hpet: Lost 1 RTC interrupts [ 1133.142180] FAULT_INJECTION: forcing a failure. [ 1133.142180] name failslab, interval 1, probability 0, space 0, times 0 [ 1133.145414] CPU: 0 PID: 7059 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 1133.147218] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1133.149348] Call Trace: [ 1133.150128] dump_stack+0x107/0x167 [ 1133.151056] should_fail.cold+0x5/0xa [ 1133.151976] ? p9_client_prepare_req.part.0+0x3a/0xb30 [ 1133.153070] should_failslab+0x5/0x20 [ 1133.153581] kmem_cache_alloc+0x5b/0x360 [ 1133.154132] p9_client_prepare_req.part.0+0x3a/0xb30 [ 1133.154936] p9_client_rpc+0x220/0x1210 [ 1133.155462] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1133.156157] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 1133.156446] FAULT_INJECTION: forcing a failure. [ 1133.156446] name failslab, interval 1, probability 0, space 0, times 0 [ 1133.156958] ? pipe_poll+0x21b/0x7f0 [ 1133.156972] ? p9_fd_close+0x4a0/0x4a0 [ 1133.156983] ? anon_pipe_buf_release+0x280/0x280 [ 1133.157004] ? p9_fd_poll+0x1e0/0x2c0 [ 1133.157023] ? p9_fd_create+0x357/0x4a0 [ 1133.157036] ? p9_conn_create+0x510/0x510 [ 1133.161554] ? p9_client_create+0x798/0x1090 [ 1133.162099] ? kfree+0xd7/0x390 [ 1133.162521] ? do_raw_spin_unlock+0x4f/0x220 [ 1133.163062] p9_client_create+0xa76/0x1090 [ 1133.163600] ? p9_client_flush+0x430/0x430 [ 1133.164118] ? lockdep_init_map_type+0x2c7/0x780 [ 1133.164690] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1133.165331] ? __raw_spin_lock_init+0x36/0x110 [ 1133.165905] v9fs_session_init+0x1dd/0x16a0 [ 1133.166419] ? kmem_cache_alloc_trace+0x151/0x360 [ 1133.166985] ? v9fs_show_options+0x690/0x690 [ 1133.167505] ? kasan_unpoison_shadow+0x33/0x50 [ 1133.168050] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1133.168656] v9fs_mount+0x79/0x8f0 [ 1133.169109] ? v9fs_write_inode+0x60/0x60 [ 1133.169595] legacy_get_tree+0x105/0x220 [ 1133.170082] vfs_get_tree+0x8e/0x300 [ 1133.170529] path_mount+0x13be/0x20b0 [ 1133.171086] ? strncpy_from_user+0x9e/0x470 [ 1133.171595] ? finish_automount+0xa40/0xa40 [ 1133.172120] ? getname_flags.part.0+0x1dd/0x4f0 [ 1133.172676] ? _copy_from_user+0xfb/0x1b0 [ 1133.173220] __x64_sys_mount+0x282/0x300 [ 1133.173726] ? copy_mnt_ns+0xa00/0xa00 [ 1133.174225] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1133.174928] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1133.175570] do_syscall_64+0x33/0x40 [ 1133.176036] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1133.176655] RIP: 0033:0x7f5cd1c4db19 [ 1133.177126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1133.179455] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1133.180459] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 1133.181387] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1133.182307] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 1133.183224] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1133.184201] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 1133.185235] CPU: 1 PID: 7062 Comm: syz-executor.2 Not tainted 5.10.161 #1 [ 1133.185401] hpet: Lost 2 RTC interrupts [ 1133.186290] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1133.186301] Call Trace: [ 1133.188287] dump_stack+0x107/0x167 02:33:05 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 42) [ 1133.188792] should_fail.cold+0x5/0xa [ 1133.189353] ? radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1133.190343] should_failslab+0x5/0x20 [ 1133.190877] kmem_cache_alloc+0x5b/0x360 [ 1133.191426] radix_tree_node_alloc.constprop.0+0x1e3/0x300 [ 1133.192177] idr_get_free+0x4b5/0x8f0 [ 1133.192703] idr_alloc_u32+0x170/0x2d0 [ 1133.193357] ? __fprop_inc_percpu_max+0x130/0x130 [ 1133.194011] ? p9_client_prepare_req.part.0+0x20a/0xb30 [ 1133.194726] ? lock_release+0x6b0/0x6b0 [ 1133.195274] idr_alloc+0xc2/0x130 [ 1133.195740] ? idr_alloc_u32+0x2d0/0x2d0 [ 1133.196275] ? rwlock_bug.part.0+0x90/0x90 [ 1133.197065] p9_client_prepare_req.part.0+0x625/0xb30 [ 1133.197772] p9_client_rpc+0x220/0x1210 [ 1133.198294] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1133.199014] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 1133.199717] ? pipe_poll+0x21b/0x7f0 [ 1133.200218] ? p9_fd_close+0x4a0/0x4a0 [ 1133.200737] ? anon_pipe_buf_release+0x280/0x280 [ 1133.201713] ? p9_fd_poll+0x1e0/0x2c0 [ 1133.202225] ? p9_fd_create+0x357/0x4a0 [ 1133.202760] ? p9_conn_create+0x510/0x510 [ 1133.203307] ? p9_client_create+0x798/0x1090 [ 1133.203882] ? kfree+0xd7/0x390 [ 1133.204336] ? do_raw_spin_unlock+0x4f/0x220 [ 1133.205049] p9_client_create+0xa76/0x1090 [ 1133.205749] ? p9_client_flush+0x430/0x430 [ 1133.206306] ? lockdep_init_map_type+0x2c7/0x780 [ 1133.206948] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1133.207587] ? __raw_spin_lock_init+0x36/0x110 [ 1133.208200] v9fs_session_init+0x1dd/0x16a0 [ 1133.208921] ? kmem_cache_alloc_trace+0x151/0x360 [ 1133.209593] ? v9fs_show_options+0x690/0x690 [ 1133.210294] ? kasan_unpoison_shadow+0x33/0x50 [ 1133.210895] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1133.211589] v9fs_mount+0x79/0x8f0 [ 1133.212082] ? v9fs_write_inode+0x60/0x60 [ 1133.212671] legacy_get_tree+0x105/0x220 [ 1133.214348] vfs_get_tree+0x8e/0x300 [ 1133.214892] path_mount+0x13be/0x20b0 [ 1133.215439] ? strncpy_from_user+0x9e/0x470 [ 1133.216056] ? finish_automount+0xa40/0xa40 [ 1133.216672] ? getname_flags.part.0+0x1dd/0x4f0 [ 1133.221359] ? _copy_from_user+0xfb/0x1b0 [ 1133.221935] __x64_sys_mount+0x282/0x300 [ 1133.222474] ? copy_mnt_ns+0xa00/0xa00 [ 1133.223006] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1133.223701] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1133.224403] do_syscall_64+0x33/0x40 [ 1133.225777] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1133.226450] RIP: 0033:0x7f8ff0aa5b19 [ 1133.226945] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1133.229426] RSP: 002b:00007f8fee01b188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1133.230416] RAX: ffffffffffffffda RBX: 00007f8ff0bb8f60 RCX: 00007f8ff0aa5b19 [ 1133.231345] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1133.232267] RBP: 00007f8fee01b1d0 R08: 0000000020000280 R09: 0000000000000000 [ 1133.233461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1133.234494] R13: 00007ffc2f987dcf R14: 00007f8fee01b300 R15: 0000000000022000 [ 1134.105988] hpet: Lost 44 RTC interrupts [ 1151.053201] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:33:32 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200001, 0x48) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4, 0x80000000) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000180)) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x800005, 0xffffffff, 0x8000, 0x2, 0xfffffffb}) unshare(0x48020200) 02:33:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) pread64(r0, &(0x7f0000000000)=""/41, 0x29, 0x1) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:33:32 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:33:32 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:33:32 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 35) 02:33:32 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') (fail_nth: 2) 02:33:32 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xb, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:33:32 executing program 1: sendmsg$NL80211_CMD_GET_STATION(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)={0x24, 0x0, 0x400, 0x70bd28, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_VLAN_ID={0x6, 0x11a, 0x3}, @NL80211_ATTR_STA_CAPABILITY={0x6}]}, 0x24}}, 0x30) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f0000000040)='.\x00', 0x2000003) r3 = inotify_init1(0x0) r4 = inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0xa4000004) inotify_rm_watch(r2, r4) r5 = dup2(r0, r0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/if_inet6\x00') readv(r8, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0) sendmsg$nl_generic(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000002c0)={0x24, 0x18, 0xc21, 0x0, 0x0, {0x2}, [@typed={0xfe, 0x500, 0x0, 0x0, @u32}, @typed={0x8, 0x5, 0x0, 0x0, @uid=0xee01}]}, 0x24}}, 0x0) r9 = syz_open_pts(r5, 0x80000) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r7, 0xc018937a, &(0x7f00000014c0)={{0x1, 0x1, 0x18, r9, {0x7}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f0000000100)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) close_range(r6, r10, 0x2) [ 1160.111337] FAULT_INJECTION: forcing a failure. [ 1160.111337] name failslab, interval 1, probability 0, space 0, times 0 [ 1160.114048] CPU: 1 PID: 7181 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 1160.115027] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1160.117413] Call Trace: [ 1160.117816] dump_stack+0x107/0x167 [ 1160.118650] should_fail.cold+0x5/0xa [ 1160.119360] ? create_object.isra.0+0x3a/0xa20 [ 1160.120372] should_failslab+0x5/0x20 [ 1160.120923] kmem_cache_alloc+0x5b/0x360 [ 1160.121817] create_object.isra.0+0x3a/0xa20 [ 1160.122510] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1160.123353] kmem_cache_alloc+0x159/0x360 [ 1160.123962] p9_client_prepare_req.part.0+0x3a/0xb30 [ 1160.124703] p9_client_rpc+0x220/0x1210 [ 1160.125407] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1160.126856] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 1160.128330] ? pipe_poll+0x21b/0x7f0 [ 1160.129390] ? p9_fd_close+0x4a0/0x4a0 [ 1160.130474] ? anon_pipe_buf_release+0x280/0x280 [ 1160.131786] ? p9_fd_poll+0x1e0/0x2c0 [ 1160.132848] ? p9_fd_create+0x357/0x4a0 [ 1160.133958] ? p9_conn_create+0x510/0x510 [ 1160.135101] ? p9_client_create+0x798/0x1090 [ 1160.136308] ? kfree+0xd7/0x390 [ 1160.137253] ? do_raw_spin_unlock+0x4f/0x220 [ 1160.138512] p9_client_create+0xa76/0x1090 [ 1160.139823] ? p9_client_flush+0x430/0x430 [ 1160.140989] ? lockdep_init_map_type+0x2c7/0x780 [ 1160.142332] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1160.143701] ? __raw_spin_lock_init+0x36/0x110 [ 1160.145018] v9fs_session_init+0x1dd/0x16a0 [ 1160.146279] ? kmem_cache_alloc_trace+0x151/0x360 [ 1160.147696] ? v9fs_show_options+0x690/0x690 [ 1160.148962] ? kasan_unpoison_shadow+0x33/0x50 [ 1160.150330] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1160.151817] v9fs_mount+0x79/0x8f0 [ 1160.152825] ? v9fs_write_inode+0x60/0x60 [ 1160.154023] legacy_get_tree+0x105/0x220 [ 1160.155353] vfs_get_tree+0x8e/0x300 [ 1160.156460] path_mount+0x13be/0x20b0 [ 1160.157559] ? strncpy_from_user+0x9e/0x470 [ 1160.158846] ? finish_automount+0xa40/0xa40 [ 1160.160192] ? getname_flags.part.0+0x1dd/0x4f0 [ 1160.161636] ? _copy_from_user+0xfb/0x1b0 [ 1160.162945] __x64_sys_mount+0x282/0x300 [ 1160.164213] ? copy_mnt_ns+0xa00/0xa00 [ 1160.165459] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1160.167102] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1160.168720] do_syscall_64+0x33/0x40 [ 1160.169901] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1160.171646] RIP: 0033:0x7f5cd1c4db19 [ 1160.172799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1160.178638] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1160.181028] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 1160.183310] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1160.185692] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 1160.188017] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1160.190280] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 1160.204994] FAULT_INJECTION: forcing a failure. [ 1160.204994] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 1160.209255] CPU: 1 PID: 7187 Comm: syz-executor.5 Not tainted 5.10.161 #1 [ 1160.211436] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1160.214065] Call Trace: [ 1160.214933] dump_stack+0x107/0x167 [ 1160.216041] should_fail.cold+0x5/0xa [ 1160.217371] __alloc_pages_nodemask+0x182/0x680 [ 1160.218888] ? __alloc_pages_slowpath.constprop.0+0x2220/0x2220 [ 1160.220734] ? fault_dirty_shared_page+0x3f0/0x3f0 [ 1160.222260] ? count_memcg_event_mm.part.0+0x110/0x2a0 [ 1160.223969] alloc_pages_current+0x187/0x280 [ 1160.225354] __pmd_alloc+0x37/0x5e0 [ 1160.226520] handle_mm_fault+0x1ae0/0x3520 [ 1160.227849] ? __lock_acquire+0x1657/0x5b00 [ 1160.229264] ? __pmd_alloc+0x5e0/0x5e0 [ 1160.230519] ? vmacache_find+0x55/0x2a0 [ 1160.231747] ? vmacache_update+0xce/0x140 [ 1160.233202] do_user_addr_fault+0x56e/0xc00 [ 1160.234545] exc_page_fault+0xa2/0x1a0 [ 1160.235793] asm_exc_page_fault+0x1e/0x30 [ 1160.237133] RIP: 0010:strncpy_from_user+0x257/0x470 [ 1160.238696] Code: 74 1d 00 48 83 ed 08 bf 07 00 00 00 48 83 c3 08 48 89 ee e8 8b 6a 44 ff 48 83 fd 07 0f 86 d0 01 00 00 e8 0c 71 44 ff 45 31 ff <4d> 8b 34 1c 31 ff 44 89 fe e8 4b 6a 44 ff 45 85 ff 0f 84 52 ff ff [ 1160.244548] RSP: 0018:ffff88801a91fd28 EFLAGS: 00050246 [ 1160.246258] RAX: 000000000000004c RBX: 0000000000000000 RCX: ffffc90001405000 [ 1160.248656] RDX: 0000000000040000 RSI: ffffffff81fbbdd4 RDI: 0000000000000007 [ 1160.250883] RBP: 0000000000000100 R08: 0000000000000001 R09: ffff88801a91fe8f [ 1160.253206] R10: 0000000000000007 R11: 0000000000000001 R12: 00000000200000c0 [ 1160.255440] R13: ffff88801a91fd90 R14: 00000000200001c0 R15: 0000000000000000 [ 1160.257772] ? strncpy_from_user+0x254/0x470 [ 1160.259141] ? strncpy_from_user+0x254/0x470 [ 1160.260533] removexattr+0x88/0x130 [ 1160.261694] ? vfs_removexattr+0x250/0x250 [ 1160.263006] ? lock_acquire+0x197/0x490 [ 1160.264878] ? __x64_sys_fremovexattr+0x101/0x1e0 [ 1160.266395] ? lock_release+0x6b0/0x6b0 [ 1160.267587] ? wait_for_completion+0x270/0x270 [ 1160.268987] ? __fget_files+0x296/0x480 [ 1160.270214] ? __mnt_want_write+0x196/0x280 [ 1160.271521] __x64_sys_fremovexattr+0x16f/0x1e0 [ 1160.272965] do_syscall_64+0x33/0x40 [ 1160.274139] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1160.275741] RIP: 0033:0x7fa63fa8cb19 [ 1160.276906] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1160.282653] RSP: 002b:00007fa63d002188 EFLAGS: 00000246 ORIG_RAX: 00000000000000c7 [ 1160.285000] RAX: ffffffffffffffda RBX: 00007fa63fb9ff60 RCX: 00007fa63fa8cb19 [ 1160.287165] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 1160.289417] RBP: 00007fa63d0021d0 R08: 0000000000000000 R09: 0000000000000000 [ 1160.291622] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1160.293847] R13: 00007ffed6cf012f R14: 00007fa63d002300 R15: 0000000000022000 02:33:33 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x10, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:33:33 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x3, 0x0, 0xda1d}) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:33:33 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:33:33 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:33:33 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 36) 02:33:33 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') (fail_nth: 3) 02:33:33 executing program 6: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_MAC_ACL(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x38, r0, 0x10, 0x70bd27, 0x25dfdbfc, {{}, {@void, @val={0xc, 0x99, {0x7, 0x65}}}}, [@NL80211_ATTR_ACL_POLICY={0x8, 0xa5, 0x1}, @NL80211_ATTR_MAC_ADDRS={0x10, 0xa6, 0x0, 0x1, [{0xa}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x4000010}, 0x1) syz_read_part_table(0x0, 0x1, &(0x7f0000001500)=[{0x0, 0x0, 0x20000000}]) [ 1161.034008] FAULT_INJECTION: forcing a failure. [ 1161.034008] name failslab, interval 1, probability 0, space 0, times 0 [ 1161.035591] CPU: 0 PID: 7409 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 1161.036513] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1161.037636] Call Trace: [ 1161.038006] dump_stack+0x107/0x167 [ 1161.038518] should_fail.cold+0x5/0xa [ 1161.039108] ? p9_fcall_init+0x97/0x210 [ 1161.039731] should_failslab+0x5/0x20 [ 1161.040314] __kmalloc+0x72/0x3f0 [ 1161.040847] p9_fcall_init+0x97/0x210 [ 1161.041443] p9_client_prepare_req.part.0+0x8c/0xb30 [ 1161.042204] p9_client_rpc+0x220/0x1210 [ 1161.042819] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1161.043624] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 1161.044457] ? pipe_poll+0x21b/0x7f0 [ 1161.045072] ? p9_fd_close+0x4a0/0x4a0 [ 1161.045672] ? anon_pipe_buf_release+0x280/0x280 [ 1161.046388] ? p9_fd_poll+0x1e0/0x2c0 [ 1161.046981] ? p9_fd_create+0x357/0x4a0 [ 1161.047617] ? p9_conn_create+0x510/0x510 [ 1161.048280] ? p9_client_create+0x798/0x1090 [ 1161.048948] ? kfree+0xd7/0x390 [ 1161.049551] ? do_raw_spin_unlock+0x4f/0x220 [ 1161.050238] p9_client_create+0xa76/0x1090 [ 1161.050921] ? p9_client_flush+0x430/0x430 [ 1161.051584] ? lockdep_init_map_type+0x2c7/0x780 [ 1161.052348] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1161.053098] ? __raw_spin_lock_init+0x36/0x110 [ 1161.053846] v9fs_session_init+0x1dd/0x16a0 [ 1161.054531] ? kmem_cache_alloc_trace+0x151/0x360 [ 1161.055266] ? v9fs_show_options+0x690/0x690 [ 1161.055993] ? kasan_unpoison_shadow+0x33/0x50 [ 1161.056697] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1161.057790] v9fs_mount+0x79/0x8f0 [ 1161.058311] ? v9fs_write_inode+0x60/0x60 [ 1161.058880] legacy_get_tree+0x105/0x220 [ 1161.059567] vfs_get_tree+0x8e/0x300 [ 1161.060172] path_mount+0x13be/0x20b0 [ 1161.061506] ? strncpy_from_user+0x9e/0x470 [ 1161.062195] ? finish_automount+0xa40/0xa40 [ 1161.062876] ? getname_flags.part.0+0x1dd/0x4f0 [ 1161.063618] ? _copy_from_user+0xfb/0x1b0 [ 1161.064271] __x64_sys_mount+0x282/0x300 [ 1161.064894] ? copy_mnt_ns+0xa00/0xa00 [ 1161.065558] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1161.066415] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1161.067197] do_syscall_64+0x33/0x40 [ 1161.067791] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1161.068599] RIP: 0033:0x7f5cd1c4db19 [ 1161.069218] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1161.074385] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1161.075559] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 1161.076696] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1161.077803] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 1161.078889] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1161.079963] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 1161.081276] hpet: Lost 2 RTC interrupts [ 1161.125324] FAULT_INJECTION: forcing a failure. [ 1161.125324] name failslab, interval 1, probability 0, space 0, times 0 [ 1161.127695] CPU: 0 PID: 7413 Comm: syz-executor.5 Not tainted 5.10.161 #1 [ 1161.128727] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1161.130029] Call Trace: [ 1161.130450] dump_stack+0x107/0x167 [ 1161.131038] should_fail.cold+0x5/0xa [ 1161.131642] ? __pmd_alloc+0x94/0x5e0 [ 1161.132242] should_failslab+0x5/0x20 [ 1161.132826] kmem_cache_alloc+0x5b/0x360 [ 1161.133495] __pmd_alloc+0x94/0x5e0 [ 1161.134066] handle_mm_fault+0x1ae0/0x3520 [ 1161.134755] ? __lock_acquire+0x1657/0x5b00 [ 1161.135408] ? __pmd_alloc+0x5e0/0x5e0 [ 1161.136022] ? vmacache_find+0x55/0x2a0 [ 1161.136661] ? vmacache_update+0xce/0x140 [ 1161.137317] do_user_addr_fault+0x56e/0xc00 [ 1161.138007] exc_page_fault+0xa2/0x1a0 [ 1161.138628] asm_exc_page_fault+0x1e/0x30 [ 1161.139318] RIP: 0010:strncpy_from_user+0x257/0x470 [ 1161.140010] Code: 74 1d 00 48 83 ed 08 bf 07 00 00 00 48 83 c3 08 48 89 ee e8 8b 6a 44 ff 48 83 fd 07 0f 86 d0 01 00 00 e8 0c 71 44 ff 45 31 ff <4d> 8b 34 1c 31 ff 44 89 fe e8 4b 6a 44 ff 45 85 ff 0f 84 52 ff ff [ 1161.142702] RSP: 0018:ffff8880451c7d28 EFLAGS: 00050246 [ 1161.143519] RAX: 000000000000004c RBX: 0000000000000000 RCX: ffffc90001405000 [ 1161.144606] RDX: 0000000000040000 RSI: ffffffff81fbbdd4 RDI: 0000000000000007 [ 1161.145703] RBP: 0000000000000100 R08: 0000000000000001 R09: ffff8880451c7e8f [ 1161.146785] R10: 0000000000000007 R11: 0000000000000001 R12: 00000000200000c0 [ 1161.147885] R13: ffff8880451c7d90 R14: 00000000200001c0 R15: 0000000000000000 [ 1161.148997] ? strncpy_from_user+0x254/0x470 [ 1161.149689] ? strncpy_from_user+0x254/0x470 [ 1161.150370] removexattr+0x88/0x130 [ 1161.150930] ? vfs_removexattr+0x250/0x250 [ 1161.151537] ? lock_acquire+0x197/0x490 [ 1161.152131] ? __x64_sys_fremovexattr+0x101/0x1e0 [ 1161.152870] ? lock_release+0x6b0/0x6b0 [ 1161.153485] ? wait_for_completion+0x270/0x270 [ 1161.154196] ? __fget_files+0x296/0x480 [ 1161.154817] ? __mnt_want_write+0x196/0x280 [ 1161.155490] __x64_sys_fremovexattr+0x16f/0x1e0 [ 1161.156212] do_syscall_64+0x33/0x40 [ 1161.156790] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1161.157598] RIP: 0033:0x7fa63fa8cb19 [ 1161.158171] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1161.160975] RSP: 002b:00007fa63d002188 EFLAGS: 00000246 ORIG_RAX: 00000000000000c7 [ 1161.162163] RAX: ffffffffffffffda RBX: 00007fa63fb9ff60 RCX: 00007fa63fa8cb19 [ 1161.163224] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 1161.164301] RBP: 00007fa63d0021d0 R08: 0000000000000000 R09: 0000000000000000 [ 1161.165421] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1161.166499] R13: 00007ffed6cf012f R14: 00007fa63d002300 R15: 0000000000022000 [ 1161.167765] hpet: Lost 1 RTC interrupts [ 1172.621485] hpet: Lost 1 RTC interrupts [ 1172.665471] hpet: Lost 1 RTC interrupts 02:33:50 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:33:50 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0/file0\x00', 0x4180c0, 0x115) r2 = socket$packet(0x11, 0x2, 0x300) fstat(r2, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x5}}, './file0\x00'}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r5, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(0xffffffffffffffff, 0xf507, 0x0) r7 = getpid() prlimit64(r7, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f000000a700)={{0x1, 0x1, 0x18, r0, {r5, r3}}, './file0/file0\x00'}) getgroups(0x9, &(0x7f000000a740)=[r3, 0x0, r3, r3, r3, r6, r6, r6, r3]) sendmsg$unix(r1, &(0x7f000000a840)={&(0x7f0000000380)=@file={0x1, './file0/file0\x00'}, 0x6e, &(0x7f0000000140)=[{&(0x7f0000000400)="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", 0x1000}, {&(0x7f0000001400)="61b79bedf7edc6eaaf557c43282ecc1cdf40d9dcd0d218c1724ee7491f56c6f387771488bfad8998994020a37225b0b36c2ff8bc4c6d86603e5a21856d211324a93a095db6425e890f5f60eec9a412939d8923952ca88fd64a9481a690402dc2eb6c77dbfecdebde25148e823186561fb80565a7", 0x74}], 0x2, &(0x7f000000a780)=[@cred={{0x20, 0x1, 0x2, {r7, r5}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff}}}, @rights={{0x24, 0x1, 0x1, [r8, r0, 0xffffffffffffffff, r2, r2]}}, @cred={{0x1c, 0x1, 0x2, {r7, r9, r10}}}], 0x88, 0x898}, 0x0) getgroups(0x3, &(0x7f0000001540)=[0xee00, 0x0, 0x0]) write$P9_RSTATu(r4, &(0x7f00000000c0)={0x4d, 0x7d, 0x1, {{0x0, 0x38, 0x3, 0x6, {0x19654cb00bc2501e, 0x3, 0x6}, 0x40000, 0x6, 0x4, 0xfc30, 0x2, '#.', 0x1, '\x00', 0x1, '\x00', 0x1, '\x00'}, 0x0, '', r5, 0x0, 0xee00}}, 0x4d) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xfe, 0x2, 0x8, 0x7, 0x0, 0x9, 0x20000, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x200, 0xfff}, 0x4, 0x4c, 0x40, 0x5, 0x3509, 0x8d5, 0xc2, 0x0, 0x10000, 0x0, 0x10000}, 0x0, 0x9, 0xffffffffffffffff, 0x8) 02:33:50 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x700, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:33:50 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) (fail_nth: 37) 02:33:50 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:33:50 executing program 6: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x40000, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000100)) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f00000000c0)={0x4, 0x1, 0x1, 0xffffffffffffff80, 0x1ff, 0x2}) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000080)) read(r4, &(0x7f0000000140)=""/20, 0x14) ioctl$BINDER_FREEZE(r4, 0x400c620e, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}, 0x1c) sendfile(r3, r2, 0x0, 0x7ffffff9) 02:33:50 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') (fail_nth: 4) 02:33:50 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r1, 0x400c620e, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0xe21, 0x4, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1}, 0x1c) listen(r0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) sendmsg$inet(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000100)='A', 0x6}], 0x1}, 0x0) getsockopt$IP_VS_SO_GET_INFO(r0, 0x0, 0x481, &(0x7f0000000040), &(0x7f0000000140)=0xc) [ 1178.403443] TCP: request_sock_TCP: Possible SYN flooding on port 20000. Sending cookies. Check SNMP counters. [ 1178.434310] FAULT_INJECTION: forcing a failure. [ 1178.434310] name failslab, interval 1, probability 0, space 0, times 0 [ 1178.438102] CPU: 0 PID: 7444 Comm: syz-executor.5 Not tainted 5.10.161 #1 [ 1178.440186] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.442716] Call Trace: [ 1178.443506] dump_stack+0x107/0x167 [ 1178.444586] should_fail.cold+0x5/0xa [ 1178.445762] ? create_object.isra.0+0x3a/0xa20 [ 1178.447185] should_failslab+0x5/0x20 [ 1178.447738] kmem_cache_alloc+0x5b/0x360 [ 1178.448327] create_object.isra.0+0x3a/0xa20 [ 1178.448973] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1178.449735] kmem_cache_alloc+0x159/0x360 [ 1178.450352] __pmd_alloc+0x94/0x5e0 [ 1178.450898] handle_mm_fault+0x1ae0/0x3520 [ 1178.451582] ? __lock_acquire+0x1657/0x5b00 [ 1178.452168] ? __pmd_alloc+0x5e0/0x5e0 [ 1178.452759] ? vmacache_find+0x55/0x2a0 [ 1178.453320] ? vmacache_update+0xce/0x140 [ 1178.453947] do_user_addr_fault+0x56e/0xc00 [ 1178.454608] exc_page_fault+0xa2/0x1a0 [ 1178.455173] asm_exc_page_fault+0x1e/0x30 [ 1178.455778] RIP: 0010:strncpy_from_user+0x257/0x470 [ 1178.456509] Code: 74 1d 00 48 83 ed 08 bf 07 00 00 00 48 83 c3 08 48 89 ee e8 8b 6a 44 ff 48 83 fd 07 0f 86 d0 01 00 00 e8 0c 71 44 ff 45 31 ff <4d> 8b 34 1c 31 ff 44 89 fe e8 4b 6a 44 ff 45 85 ff 0f 84 52 ff ff [ 1178.459263] RSP: 0018:ffff8880469cfd28 EFLAGS: 00050246 [ 1178.460056] RAX: 000000000000004c RBX: 0000000000000000 RCX: ffffc90001405000 [ 1178.461116] RDX: 0000000000040000 RSI: ffffffff81fbbdd4 RDI: 0000000000000007 [ 1178.462206] RBP: 0000000000000100 R08: 0000000000000001 R09: ffff8880469cfe8f [ 1178.463221] R10: 0000000000000007 R11: 0000000000000001 R12: 00000000200000c0 [ 1178.464260] R13: ffff8880469cfd90 R14: 00000000200001c0 R15: 0000000000000000 [ 1178.465321] ? strncpy_from_user+0x254/0x470 [ 1178.465965] ? strncpy_from_user+0x254/0x470 [ 1178.466610] removexattr+0x88/0x130 [ 1178.467125] ? vfs_removexattr+0x250/0x250 [ 1178.467727] ? lock_acquire+0x197/0x490 [ 1178.468297] ? __x64_sys_fremovexattr+0x101/0x1e0 [ 1178.468982] ? lock_release+0x6b0/0x6b0 [ 1178.469563] ? wait_for_completion+0x270/0x270 [ 1178.470221] ? __fget_files+0x296/0x480 [ 1178.470804] ? __mnt_want_write+0x196/0x280 [ 1178.471462] __x64_sys_fremovexattr+0x16f/0x1e0 [ 1178.472126] do_syscall_64+0x33/0x40 [ 1178.472679] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1178.473435] RIP: 0033:0x7fa63fa8cb19 [ 1178.473988] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.476676] RSP: 002b:00007fa63d002188 EFLAGS: 00000246 ORIG_RAX: 00000000000000c7 [ 1178.477790] RAX: ffffffffffffffda RBX: 00007fa63fb9ff60 RCX: 00007fa63fa8cb19 [ 1178.478778] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000003 [ 1178.479777] RBP: 00007fa63d0021d0 R08: 0000000000000000 R09: 0000000000000000 [ 1178.480783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1178.481738] R13: 00007ffed6cf012f R14: 00007fa63d002300 R15: 0000000000022000 [ 1178.482894] hpet: Lost 2 RTC interrupts [ 1178.502401] FAULT_INJECTION: forcing a failure. [ 1178.502401] name failslab, interval 1, probability 0, space 0, times 0 [ 1178.504074] CPU: 0 PID: 7442 Comm: syz-executor.4 Not tainted 5.10.161 #1 [ 1178.505053] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1178.506180] Call Trace: [ 1178.506550] dump_stack+0x107/0x167 [ 1178.507035] should_fail.cold+0x5/0xa [ 1178.507564] ? create_object.isra.0+0x3a/0xa20 [ 1178.508174] should_failslab+0x5/0x20 [ 1178.508692] kmem_cache_alloc+0x5b/0x360 [ 1178.509260] create_object.isra.0+0x3a/0xa20 [ 1178.509856] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1178.510543] kmem_cache_alloc+0x159/0x360 [ 1178.511094] p9_client_prepare_req.part.0+0x3a/0xb30 [ 1178.511783] p9_client_rpc+0x220/0x1210 [ 1178.512330] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1178.513000] ? p9_client_prepare_req.part.0+0xb30/0xb30 [ 1178.513732] ? pipe_poll+0x21b/0x7f0 [ 1178.515229] ? p9_fd_close+0x4a0/0x4a0 [ 1178.515713] ? anon_pipe_buf_release+0x280/0x280 [ 1178.516236] ? p9_fd_poll+0x1e0/0x2c0 [ 1178.516729] ? p9_fd_create+0x357/0x4a0 [ 1178.517134] ? p9_conn_create+0x510/0x510 [ 1178.517625] ? p9_client_create+0x798/0x1090 [ 1178.518210] ? kfree+0xd7/0x390 [ 1178.518659] ? do_raw_spin_unlock+0x4f/0x220 [ 1178.519253] p9_client_create+0xa76/0x1090 [ 1178.519814] ? p9_client_flush+0x430/0x430 [ 1178.520377] ? lockdep_init_map_type+0x2c7/0x780 [ 1178.521009] ? rcu_read_lock_sched_held+0x3e/0x80 [ 1178.521666] ? __raw_spin_lock_init+0x36/0x110 [ 1178.522269] v9fs_session_init+0x1dd/0x16a0 [ 1178.522848] ? kmem_cache_alloc_trace+0x151/0x360 [ 1178.523502] ? v9fs_show_options+0x690/0x690 [ 1178.524106] ? kasan_unpoison_shadow+0x33/0x50 [ 1178.524721] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1178.525418] v9fs_mount+0x79/0x8f0 [ 1178.525897] ? v9fs_write_inode+0x60/0x60 [ 1178.526427] legacy_get_tree+0x105/0x220 [ 1178.526982] vfs_get_tree+0x8e/0x300 [ 1178.527493] path_mount+0x13be/0x20b0 [ 1178.528011] ? strncpy_from_user+0x9e/0x470 [ 1178.528521] ? finish_automount+0xa40/0xa40 [ 1178.528951] ? getname_flags.part.0+0x1dd/0x4f0 [ 1178.529499] ? _copy_from_user+0xfb/0x1b0 [ 1178.529979] __x64_sys_mount+0x282/0x300 [ 1178.530457] ? copy_mnt_ns+0xa00/0xa00 [ 1178.530878] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1178.531429] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1178.532035] do_syscall_64+0x33/0x40 [ 1178.532498] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 1178.533008] RIP: 0033:0x7f5cd1c4db19 [ 1178.533401] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1178.535836] RSP: 002b:00007f5ccf1c3188 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 1178.536849] RAX: ffffffffffffffda RBX: 00007f5cd1d60f60 RCX: 00007f5cd1c4db19 [ 1178.537811] RDX: 00000000200000c0 RSI: 0000000020000040 RDI: 0000000000000000 [ 1178.538753] RBP: 00007f5ccf1c31d0 R08: 0000000020000280 R09: 0000000000000000 [ 1178.539706] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1178.540676] R13: 00007ffc7c4e04bf R14: 00007f5ccf1c3300 R15: 0000000000022000 [ 1178.542708] hpet: Lost 1 RTC interrupts 02:33:51 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f0000000000)='./file0\x00', 0x99) mount(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='debugfs\x00', 0xc0ed0000, 0x0) 02:33:51 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') (fail_nth: 5) 02:33:51 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:33:51 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x5, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:33:51 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:33:51 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:33:51 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:33:51 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000000)={0x2}, 0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000080)={0x3, 0x1000}, 0x4) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) r2 = accept4$packet(r1, 0x0, &(0x7f0000000140), 0x80000) setsockopt$packet_int(r2, 0x107, 0x8, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_config_ext, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clock_gettime(0x0, &(0x7f0000001880)) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}, r5}, 0x14) r6 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r6, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}, r7}, 0x14) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1400}, 0xc, &(0x7f0000000100)={&(0x7f0000000580)={0x1110, r3, 0x0, 0x70bd2c, 0x25dfdbfe, {}, [@ETHTOOL_A_PRIVFLAGS_FLAGS={0x68, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x34, 0x3, 0x0, 0x1, [{0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xe808}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '*\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xf85}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_BITS={0x30, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x7, 0x2, '&[\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '\xa0+)\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @ETHTOOL_A_PRIVFLAGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvtap0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r7}]}, @ETHTOOL_A_PRIVFLAGS_FLAGS={0x1044, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_VALUE={0x21, 0x4, "0d5a3ae7c87e002edb96e9d3ea59f172813fe943eeb58b6f34de1d562a"}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x400}, @ETHTOOL_A_BITSET_MASK={0x1004, 0x5, "476c62e3262f42a11cfe882b6e5c9356ba87d916540b50f230d6fca48cb58a4bb80603a2f90622faad7b977a381067bce04f968d00b47c9b5ffe86e8b3e2d41f3ccf8097c9e1989a41ce9d8e81387ac765a46945567cdbd052a08716c9179493888f8b845f0b562af396a8520f8f568f6c5746abf0afa9af9f115b76c201b4aab3c04fd8ce0ba7db2dd32b80370411180754d4a3423eeab1d0f55ad9ddbc84558618610e4eaad766873fe241e1b211082b4547ae6c8e560a0eb5e18c4cc0f556db07ba34f002749b854a5cb9a40d6f1edc0114246e84da847844e921bfbced68558708193030ae8f75dfa2aec7932733753ad6687ffafd5ac50df44323bb589e7f9177fee6b0ec297ea68fac73c4681cfee752100687c0cdb851c31de75302bc4e0b589580342c3bce52e04e650809441751fba8a8dbcb49343a8bea29101c3646cd35706c180f7ea5cbda5817460306c6c51ee72f20a1498cbf14fd4e5378de52c9a7072bc8efd2add56535c20381a7fc61ad35532938566e8c8db3988873ebc607407e9a0d433c9fbf011b376e42e6428e4fd30a3a8e5769371b11115a3ad77d2456916e403a35145c4a900e236725e5c195e7c7bbf38faccc4ce77b800bafb9ca40c99d034863be30e7677b2dfd2b5e5f477fef99f741bc2fe42e9098352c34d6c3ab082f9c6551e9a42fc274636ec8c1c064599a96ffdc0ed8f85e14f1ec0ee8c140c5f2af40dbe620b8b147f119ee58a4db5c3e1e958c80a1a24bf78c6d1cb8d5dac6de462fb23ceb0c86b6c0e6356c19b2d067fdab3bfc2e773739f3633689d33b91ecc981d4a36e6a07803a12c6452741611e28ff43b24ddd6205e84b7228a9441771c1be4715eb825ae1aa32652ce0fc137bbb1fa8a979f1ea4d4f39ad0004a63b7624e6d10606c6c3ff44533a5c94413317a9a23a25a7b5fd0b8d7eb5c22518b4a3d4cf2606c69c4a8b219f7be769ac0d49118dd59b7313a8a3b6efb47145f5f21ee5e625551e5b76d21077060076307846b2e87419a6a9682fd7b1ecae38168a97752515e8b01c32a1b13c81087905e9f2e06c5bacc282ec47c9e9862acf0e0e31011e3ebf4fb9aa6f1c1c3155962dce1cfdbef6bc736d78a69ecd20a98d95ddd0d9a4e0e93946afbb15696e31dd445ea162bf749c5eaac8731f156d3d854ae37ef7728addabf60b5f6d699d0df252368e468f8fc9e79226601eb9a33e440df14e48a6a6d35ec1a2cb22e732c539b0cbd73f7a0f0b33d2d65c9ef93ebec1603140b7897289f7dffaf492668ba9a8ad8207bf58205df030d6e0368b216fcd005942954f6d157dbffc01125344d3aa553856ec618f3a0314f0c269746923ef9475fc1cbe623bd13617294ab35162a6991f2b745473b309b6e4eabdd67e477e103ebc8351a77634de17aa151a3f3b81425018eede5d31f9c1776c792f60d79ae7462428f4c9a53dd0a5546cafab1c1196c901c1aeea8ba6cb3ab51fd6e6711e3431177fbbeedd24ee9a76d2fd2c68287c2ed51296d3c517cadee5e84a3f32dce574fb07b4a818cb211e2ce2e8d62da1dfe5797dd38063d6090afc4b7b515e4db744e5cf2275af8298d918790d124719a04b10e3d5264775aab82e383e9f089f008e1106f1b7fa17b9899642d465577092c72eebf286a0012f19ed57c8f05ee439994c8894fc8ec7f8b011f2fcd048b02f1f8241d901bbf2e0c4e44c857cee18c1c7fa1434767abd5ef69af4cfa049200210301cc568dc2cbb836762f7b35509e10f4311455b797accb5283df7331288b228e85ebe774e2c32eaa529cbdc655436e625e814e423ce434c990cf516ca84a73157b1fe903db9e5735c432120f01204b4afe8e70308e61d9e4a2d25d65da2977be3fff4d595878c1d7227bfab647eb313a3fa287e83e14a6c8f216952b937c6d7546862616b9ab868e8166812a53cb010e697bb93d01d807927197dd1e88c1cd441a4c5dfe91dfa3f78e599b69fdcf77125b4c3be608d2566ce98a7707d4dfea1f1d17a8d16a5e02da8abaf11eaa15310bea176d031960c8f8657f5d5e2b01ac8e0db175de421ee58cfcb953b1456a27d6729e8ac607c95abe7cb7f4ab59ee3980674233faa4c93ba9593338d62a95143c7ba8e4e60bb27b015cdeda15c038be8ce9c31a34ba951adebb35f660113e2f4be37cbd3f40e2833fcf86e9f86bb8d8cd287774fe838be06b60d7518055ef9a44e1614396173d10ebe0f9583c68a312f29045b9b0cbecb075b21ac6c556ee053fe35a66b0a739f36338c67fa2ca7cfcb02825759784459b7e6be8241eca17eea004932089e3b400cd497c285243c06b2d2948246399c573698fe00eef01dbd3354fd92a303d7b87112751101de1b0bcc84bc8889d62b6c0a4e18d7d94c62c1faa9a67a935937c40d0f9182ddb3ca87cd8e9221daa63aa109db02a953239af500970351c7e07dfb06d1dcdedd55b5a2b3613d4f30220b34c3e4256b87eab52df59ff82c1e5763d62afd69f88afef4717f2fba402e508fd41508debe4c85969dd7706399c06a435a639fe884a81730336436983987c6d5d30d8081745cb7488287a007fef10c462e59fb86adbe39086f2ac0137ef0661df73871b6c3eb8ca79975416f5fd515d974f3455354bff50796c8b2bcacf5973c5d4560ff69cc4f628df5b416677b27bc91f2c3dbd54cc694d3d69bfeda6fc283af9c50f5b7b39729f1b69ab9988a2d573aa164bed45d908898a03348d3282b8ff42b98d120767f922fafc7ac3b0b6a2097fc2cb86b9111123a16620c07e52e11a0ac2477a3281a64db6d654a25f2f727b4c92358d491e0406e37a45de23ae5dabc73eb6a937dba4c27c76824fbb0be4771035b8c95e8d4e9571fc6198542c338917ed6ad7be32c52043020a58a71c55c1f5b6cfdb4a0fca05f7db388c07ee1589c292e352499febaad9b8d1f4599035b81bad8ffcc2afb9ae089fcc447a83ea001c4ed2e140f688a4b36e44e62deab8dce0d065e5720ee189068127212ab7f668760a7a4ba55d2d8fc55007e90a103c0705a3dce9ef088dcef607c2c654fb3e6c3470038f4dbabbf3821ecaf373ce393926eabe5797e3dc8591abaf654a549f85f96c2102b29cb71db97d6dab3dd9bcbc628b700cc4d1e4e5e31311f05b350c4d77ebbaff958328ffd3a5f9415a6216e1e7443e6fdc8642016ad01e7915f8e4e5e4cc72347c4af9e74c2343700e6119d4bcfe9fd6c7299c519ab83f0add1dc2a52bf1b3365e24a95e300c640addf7a8746a010588b2faeb31f93c3428031ab6766fb5e1551d73bf1a1f680044fa0fbdc5f6d060c12794fa06d0ed8dd4f67a4381f65e04487b6df29907f8129e29e0c14cafe2de5b81204da0a7af1247db26e80a3d7ecc4abddb68bf001cbab327cefdac926482c4cd186053d32ed39055676d6cdf0dbb22b56380a6490687a1d7296e23fbeceaef72de41aeaf8346a9f9e59dacc03246fd00526d73e9a891acc697ebeeca4e917cf2030623a8e5382cf4b1af910272721cd1bb0ac431248989a2d70e1b69b5990fbbfec066598383a04d729d00b6e6afb9994f156d6b1669a72bfb7c9efc20a9c81d84c473fa70b075f2b7506c9e4a00974ec04c875e157befb18f274267e7786c477f584ac450dce25dcf11a346a18b480a593892185dde83577585f308a5333a73217a9284653633f347bb84f4ad89a8accc67667d533d38e0daf163b7af2762d5ba037485699076ba6d69d93a0aca9c9e565090a2b207b95420f8ddc0fd5a065a77e1509a3898c2a14d58b03f85b6dc64b8c33a1cb5132d308b1f891a6f0a8dc27f118946154af235c1298a62cece2be60b72f51ce4696494b2c28e8d2627b90be1eb63f500d9bc64cd0051e9449a36ca2f92cb73a0ce324d30c8a534ef5c61155f89f0dc03eade84e143329b7d44d6ca77f242752487076e76bbb3eb753e479d75d4b7191a8ba3fbcb8165fb2d335c54c4a28de1581bfe5fbf73c2e81e56c57923a62faa6005d724bdccaf2e12e71def706f2bf0bda2274464b0f8f7751157ce5c6a937226c6e48c3c6b7acf8ad9bf856d08b6c5d7e544950d2c7873848440c2392e021ebc5e1a56a3701d556ae575877f183380e9747e7e52e1d3da3f837d87899849cce6da1ad41aa76893b242678a0991f0c89a8d92d25f034f80a056de615ebf94279a9a19a7840d05e71ea775fbc508198158a374d2f71dd97d412a5f5c23ac2aa43f2c449b7cccfffd4960d59464a0eb70bfc4018b526992c67c09675f2a8375fa474113a9aaad97b2f00211c49605d30753a5c207f3053f1f765cb7b50c2691d5cbce80ed0c237bf632623eaa0ae9be5faac7424be7aa4ba48c9a256f6af84b73297510bfff5076356a2b288073f7e75423f9a8be32d93654b722931cbfd6c8bf746def99e17567dfa73eba96e3b9d5a9dbcdf2dff8db679b7942f74449e0f337765de80bf579cac2742bc3011ec08c179aac1fa98de5e804ddd73ce4efc9dc945ddbd24d8006287555779dc6b01ba0979b6a31805a1da00dc6ecc589049c26660ede70ea9dd407fd1a48f3aad8b53ce764d38ae498e7c4b50e717d3fff498d7321df6dd24cd057d437ddc8b5acb45edcbbe88075845a8ded474fbb4d75c53b141982654ee402a9287d486e101264903b1d74719eb933b806bd7dd480d62f4be84255eb93317d780deda232c3380133864f305343af8ab0a21deb6e20857eeebf39672c1f4c4983804ec3644502366bec316bb25178a4855591cb30881a74c3eb3f028e89f17574a3a99dfd1b1f025bed468bdc66559560dd0deedc206b9ad2e0258fc9ce515ec684cec5a7cbe6d7c24b4364ad977fc861d91949a4f6b73e7aec1d71d0dd762d140aebfbc6ad541bba9a46751046fe88fdad96bd45fa31439dd76e8ff67dfbc4dd3ad786622291bb61fe4b43737e0716479c715b1b3cd8dad3f9457f3a3e64b64d2f9a73f8fc4822ca76e7a04dc0c420aa8767a555424de67135b6c6bc9b1cecee303fbed9c4ef768dd5a1ac64b4523393597f5bb9bcdfa68c2ac5272c05abcf1ac6be2379a988efb0a48bc738d2a10aeab9383cfe567f52a572a283cbd0009f87fa02e37fd2c160efae833af27e78ef000f99a6128ec87830b33d45056cff00578567a39fc68ded7c2791011a719f3084fb005142f931b0d817bbc778d899d19b934f4c88d71a19fa8db777cba168acf3532ef43512b4224afbc06414ace7f5fdcbf441da18ee9e92aee5c62003a6bc81cb3d8f1886842ccb3f08361ef1bc565894dc514439b406ed69a5615fef495360468ddecabc0384f2e85c235f68e7d1d8cbc8446c2a0d54e26e955528b8144ccb2b06c768e8c624c72852c9edddc6eca6000ef57c156dfe8e1cafe85716b8cceab52cf547de6105dc9ca41286f2985a30ada2730682721c9df10e401bc4ed607419382b6368e31662d283e9a975b2f8df2296f0e29b1ace3f515b22f9502a9e8ccf49ce30f597fc84f920e879e68122078d4807c624f358a34e37bee3cea0b71715034c3465f5d9d5ce7d7c944bff073e729d33247afa753727481f0b18634a73a98ead6d0e45f8d923e4d38717eafc3d421683393759101e8c6782b59d517d4b9f9734c9f49da289d1b1745021792b602b692a9a2788d01a01bad49c74972d336673a871bfc486f712f96f2fb13e0fe83f1c359aa183d5d0365d09cadf3149aaf2156d3b13687840ffd076329ee53857b716cd74ccf480cf0dad6300dc56b48a3ccd54ffad58fbc5fc9c965642eb85f7c23b8f17d"}, @ETHTOOL_A_BITSET_MASK={0x5, 0x5, 'y'}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x2}]}]}, 0x1110}}, 0x4000085) 02:33:51 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0xff}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTATFS(0xffffffffffffffff, &(0x7f0000000080)={0x43, 0x9, 0x1, {0x6, 0x0, 0x3ffc0000000000, 0x8001, 0x5, 0x1f, 0xdd94, 0x3, 0x8001}}, 0x43) uselib(&(0x7f0000000000)='./file0\x00') r1 = perf_event_open(&(0x7f0000000280)={0x3, 0x80, 0xf5, 0x6, 0x4, 0x3f, 0x0, 0x98dd, 0x600, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0x81, 0x5}, 0x9204, 0x6, 0x8, 0x6, 0x6, 0x7, 0x4, 0x0, 0x8, 0x0, 0x9}, 0xffffffffffffffff, 0x8, r0, 0x2) ioctl$F2FS_IOC_SET_PIN_FILE(r0, 0x4004f50d, &(0x7f0000000100)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000300)=""/192, 0xc0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r3 = dup3(r1, r2, 0x80000) perf_event_open(&(0x7f00000003c0)={0x4, 0x80, 0x4, 0x7, 0x4, 0x4, 0x0, 0x7f, 0x800, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x4, @perf_config_ext={0x7, 0x3}, 0x2280, 0x9, 0x8, 0x5, 0x4, 0x7ff, 0x8, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xe, r3, 0x1) fcntl$setstatus(r2, 0x4, 0x1200) 02:33:51 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x1, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') [ 1195.195324] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:34:16 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:34:16 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @mcast2, 0x7}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x4e20, 0x9, @mcast1, 0x4}, 0x1c) ioctl$BTRFS_IOC_INO_PATHS(r0, 0xc0389423, &(0x7f0000000100)={0x80000000, 0x18, [0x3, 0xc000, 0x80000001, 0x6ce], &(0x7f0000000000)=[0x0, 0x0, 0x0]}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup2(r1, r0) creat(&(0x7f00000000c0)='./file0/file0\x00', 0xcb) setsockopt$inet6_udp_int(r2, 0x11, 0x0, &(0x7f0000000040), 0x4) openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000280)=@file={0x1, './file0/file0\x00'}, 0x6e) getpeername$inet6(r0, &(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, &(0x7f0000000200)=0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0xfffffdef, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 02:34:16 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r1, 0x400c620e, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e23, 0x4, @dev={0xfe, 0x80, '\x00', 0x28}}, 0x1c) 02:34:16 executing program 6: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = dup2(r1, r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x10009ff}], 0x40000, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000100)) r5 = socket$packet(0x11, 0x2, 0x300) ioctl$EXT4_IOC_GROUP_ADD(r2, 0x40286608, &(0x7f00000000c0)={0x4, 0x1, 0x1, 0xffffffffffffff80, 0x1ff, 0x2}) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) ioctl$sock_SIOCSIFVLAN_GET_VLAN_EGRESS_PRIORITY_CMD(r5, 0x8983, &(0x7f0000000080)) read(r4, &(0x7f0000000140)=""/20, 0x14) ioctl$BINDER_FREEZE(r4, 0x400c620e, 0x0) bind$inet6(r4, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8}, 0x1c) sendfile(r3, r2, 0x0, 0x7ffffff9) 02:34:16 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x900, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:34:16 executing program 3: r0 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000003, 0x40010, 0xffffffffffffffff, 0x0) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xf, 0x30, 0xffffffffffffffff, 0x10000000) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x3000000, 0x10, 0xffffffffffffffff, 0x8000000) r4 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000000a80)=@IORING_OP_RECVMSG={0xa, 0x3, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000a40)={&(0x7f0000000640)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @loopback}}}, 0x80, &(0x7f00000006c0)=[{&(0x7f00000008c0)=""/205, 0xcd}], 0x1, &(0x7f00000009c0)=""/90, 0x5a}, 0x0, 0x40002002, 0x1, {0x0, r4}}, 0x0) syz_io_uring_submit(r0, r1, &(0x7f0000000080)=@IORING_OP_READ=@pass_buffer={0x16, 0x2, 0x4004, @fd=r2, 0x3, &(0x7f0000000000)=""/13, 0xd, 0x1c, 0x0, {0x0, r4}}, 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:34:16 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:34:16 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:34:16 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:34:16 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'ip6gretap0\x00'}) 02:34:16 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x100000000000000, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:34:16 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:34:16 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000100)=[{&(0x7f0000000240)="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", 0x113, 0x400}, {&(0x7f00000000c0)="796906bbb8311955df9cf63ddc0d069966dcb9", 0x13, 0x9}], 0x20000, &(0x7f0000000080)) r1 = openat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x200c40, 0x64) getdents(r0, &(0x7f0000000140)=""/159, 0x9f) ioctl$AUTOFS_DEV_IOCTL_FAIL(r1, 0xc0189377, &(0x7f00000003c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="1f0000003000"/16]) ioctl$FS_IOC_FSSETXATTR(r2, 0x401c5820, &(0x7f0000000400)={0x2000000, 0x6, 0x400, 0x3, 0x3}) unlinkat(r0, &(0x7f0000000200)='./file0\x00', 0x0) 02:34:17 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x9, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:34:17 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1219.802318] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:34:41 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:34:41 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:34:41 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xa00, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:34:41 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) ioctl$SIOCGSTAMP(r0, 0x8906, &(0x7f0000001680)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0x65, &(0x7f0000000000)=0x75, 0x4) r2 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs2/binder-control\x00', 0x800, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000005580)={0x0, "554f0074ff3f111ab62030ee2d8b8bda"}) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) ioctl$BTRFS_IOC_QUOTA_RESCAN(r3, 0x4040942c, &(0x7f0000000840)={0x0, 0xffffffff, [0x7fffffff, 0x8d, 0x5, 0x6c7ab6f3, 0x5, 0x49]}) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f0000000640)={'ip6tnl0\x00', &(0x7f00000005c0)={'ip6_vti0\x00', 0x0, 0x4, 0x20, 0x1, 0x5, 0x4, @private0, @rand_addr=' \x01\x00', 0x73f, 0x7800, 0x2, 0x5}}) sendmmsg$inet6(r1, &(0x7f0000001c40)=[{{0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000040)="b13ef1bb7eb44769d0e802e7f35a75c6ee7520ff6eb0bc6e8291201af89d34bc16cffa4ada902b343270b57d209da2ad2cbe5ef520e16608cac23cbd860e7d5d923ad264632c072a2fc7f9bd9cf04ae8ac500985e3153072341584ec3ded1a09a71a6b2c53f15af43ef7619b1fb1736c60079d94b66f385363f53f8f9bfbfc733cc64bd32af59568e018ea3a446657b6dfc85af965bdc85a1063", 0x9a}, {&(0x7f0000000100)="cab504b3f80886fe1abbef664e7ad344fa4ab3898e092bd465596e60629fdd052e5e01460af714a4c6d9f4c4401b12f1fa8b3de7f3e76c337cdfbb1c5e1e42638b276492c8845264ad21de9df9436b2697081b8812891f011d4b5f0abd5d8d3b888f24b3f2c024e260c67679216a4620d01430ca46419aa44ba9e44ddf4282af43ec844e8cde321fe6853ceae5e056a52d80afab53b905bb4ce05ff779cf121a7d847a77707d4f68070a3a3a1271e311f883fe4d44c1070b9dc4f20000ac594a2f2f97211dcfb948b73798a6c88a16ee25b3923500ef83010cebcd41dd403cc4bdcc8ab1621f304a", 0xe8}, {&(0x7f0000000200)="fd056dcc903c17a9bd0310bea6605dd0f0fc1532a9b695eea9dadb3af8e8af8bb3ba7cf013ec2f85a160eb1d20ae3c11c21885025854f85117b37c5cb14fd7c645ac31e7eaf508343154cf635d4792af43bf16aacf51c354a34c22a0ccb0a097ac99f7bb72a50928de9ba81251cfcdadb99bef17cb85ce0ba36f1a3cc902061f71857618661130bc3f59cc27fde6cd463aac2a84065f3295adabab132790138a1c7fe504ded2ad45de1b4d807ad75415583442984edcb5d6eaf44c94bd97a0682d534f297a0096dee06bc5", 0xcb}, {&(0x7f0000000300)}, {&(0x7f0000000340)="d4504ce28f93343d3f0040bb530795da03e79fb3c0f51d0c421c3d690526b929c6e283b322e2ca612f4aca132c411d3df75b61d9666af9480f573f11b1c2f18d3ac3f3db0e99aae48f6773eaad8b8d97e9b9b122f49f413fb260bf50285be4a037a7badd2df6d6a00c8d3e0f7aa27a0923b4a5b4cbc05859b54833cceaa33abb853bcde3e66944fb7d28fa58f2b073c72dfa5b112607a31cfd46875e940ab0fa5f50e08528aabd21e621a62d0cbe34fb346f33121638589aad9befa22370668110637c46c41277c6376e70eed6da928755be1b7e929c1a899417de8f064b2fe93bc1499005373f0d626db22d9cb6f20e9b9f69", 0xf3}, {&(0x7f0000000440)="3de974144db109f6ab258ae08bb20a2549d1a08fa74cb3e6eb245e1a701cf6bf5d7b7fd9a48b643754741c8597e29f4543aaeb753c24ee42109f0a1d87b134d18e1d1b350517f48b38970c0976de5de1e16ac65fc0471bebfd03ff1dd4ec5f0de7efa6977211af9f8c8d444203e0518bc05f0e6ba87787c001ac2b4e95e090c02bd6908f8e4bfa48e458495f7862805571bb78e593edf3b5a0402952cc09fb9026480b3bcf5bb6c2a16fdc5fa411a615b17df8383e6f0e20bd6b774f63ccb5ad4b1e0d034255691d804d8136c7880a68500b160a4d3e79eab613b3f84d724ff943cc959acbb880851d519d008d6d42e63f66ab35e48e309e", 0xf8}], 0x6, &(0x7f0000000680)=[@pktinfo={{0x24, 0x29, 0x32, {@remote, r4}}}, @dontfrag={{0x14, 0x29, 0x3e, 0xd5}}], 0x40}}, {{0x0, 0x0, &(0x7f0000000b40)=[{&(0x7f00000006c0)="4b30ba1eded1544bff637f944b26efe652c518457a8f75e3f5c4d66f98037b4cd4ae9d41eac88fae02b8c35a225a215ba3ba8c1885dbb4ab39dfcc7a9e8112b8f644afe443da031d2edaa3a575b6af7f267ce6435a8a288e8298b0e85463ddb88966cbf2c1f513312c91c28b4e57ab4c12bdf7e426a40126ea924863c105534ad737e2b4a53c4f80db34db94f4c1f490f3be69f44d4b4bf811b474e5033dac32947998e1995719c17c5c995850fbfb5ca2cb40", 0xb3}, {&(0x7f0000000780)="fd31c5822756fd4949f35301c11fab789519ea0bae5a8c9c120eb66368ac8077566b61b36c691502200422077fced98f95a4b16aa1cff186ccaa998bca6a1236e44bd2c35ca4f53097b861fc936482436d72e88e9cbe0e61ddd6ffff16a5433decc467f623dd0fcaff9472b7fd6dba96150cc6950919198378b770c2f0aee0f4e5175f378a51783d9026729745c5af92e42a8a97c0aee465e1d300112face842f8d8098d", 0xa4}, {&(0x7f0000000840)}, {&(0x7f0000000880)="90d61c72d09fcd2c6fd424714763cf862f1127cd9eec43a911bd52ed62dfe739980d", 0x22}, {&(0x7f00000008c0)="700479886be8ba1e3aeae637caec83f4cf8e1c8ad7c501dc00fcc3eba9810a642aaaf00ab8ca2563fc75eaa2a299554c10a77d8d3109e5765dff3eb10c", 0x3d}, {&(0x7f0000000900)="c6dac4b9cfea776214549632cdeb78325e71e28b3904f2262236dec736e985fe1e77e4d8a39aacd0c137059352a67798ba86c9934c99b6a9a7fc8c2c95d53af80fe9503ad126f852f9e275091a26fb951fe7b40ecb540161ac296a641af8373d92200e94b78290e6365d00c911a7514114b87a7656792d7812ef67cbe8", 0x7d}, {&(0x7f0000000980)="c297517bc64346d4e3ed83c32bf3fe5296c969a1ffd481fc13182d03ba2f0e7e3c8df83c892133b08401a0e8a91b96024583c3f14544bc74c3afa435cd5211962e9b4661d4177448833a8af424258bb6f11c3d5955e5873c30f2e02be7ae305ef8ecbcf72d7d3ab88b802340d1ecdc948db82d88baa11e8940b4fe516d945a4b6042d30e50bd583c21aa12fba9f010657eedc5570233ac7cb55e2bce148191b481df4d1767cdf9b31bb2299c302b36d04a1789994c889ee97cf3cc7e2b343fcfb17c02252da4e9b2a5049e576cc51bdef641afd2622823429bec3677ca39d1742a38d2c0bd25e19d73badfcdccc679ae93fd81", 0xf3}, {&(0x7f0000000a80)="9792063b800849e080e0d6b96ae517266bb445bc88f39553d8c1d80d6a14d76a", 0x20}, {&(0x7f0000000ac0)="9b4f80578f7542bf09b2f73dbde2e3d9ea182c195f734c6a00f5ee606631feb0197457e516d52d18524958fb5f5e40ec7a1f67257b33067b45fb7deb2690b1d9aaad2139ead41d9b1ba6d51904caec1e04f2f15a93967256d0f54adfb7125605ae11f95c44bd7b62ba2701", 0x6b}], 0x9, &(0x7f0000000c00)=[@dstopts_2292={{0x20, 0x29, 0x4, {0x87, 0x0, '\x00', [@ra={0x5, 0x2, 0x1}]}}}, @hopopts={{0x248, 0x29, 0x36, {0x3a, 0x45, '\x00', [@padn={0x1, 0x2, [0x0, 0x0]}, @generic={0x1, 0x75, "3040bd51e6669c96f6bb977560439d6924dc69aaf9b0df9ed31e3a8f617b3a21426372ec9a5f67966e1781804f762e0a332f121a47b2e3b6ab412d42e1b9bbfb7ebcd98a3896321e0362436b30e50dc30bc4b04c04d3518216b751c4972677d5245cacf059ca0cced3afc0783b679f4db67eced013"}, @generic={0x80, 0xab, "28483c3bcfbc315ae1a569a65324942a74187d4c3e1f8f0d434e3224519c056c7895ac71f04c675bb1e285fe3758eae593c8a0d228d8702f5446082db16ff59ecdc0c1c032fa739e5c6ed815383c6be704bca5a99b00dd054b07ac216912d3004f0d7f6b12689657a597ba15f34703fe25ab6c45699fac31fdfdb0628ad062e2d56b28a8d587a371ae4f67448b3c1f9da751cb16c7fa82d946c77da4ebf56e4d009496a11721357ad41f70"}, @generic={0xb2, 0xe3, "82fc2d4e5eb8040372cce1914a3d5af0874f3cf2c4df5f9b5293c1ce7e12feb269564096c2013385f4f7ed1032242ad9be6367b7fdeeb242ee220eaeb01022adfa966d4d968afa07ee902ab769c57a5b688075174f2955e3e4ae42295afaaa645e12581d90586fa278c74fcdfc34d6a32edb9349ed111af99d003003ed3a95cd088353a2dcba2b667f182ea34f78e0c73edd1d2cb847db5c0572470309e2982cf9aa660feedcc6688b7bfc7599fcfa638c7ed9c81e78210c95b57cd3f53e6de59c1018b0ccfd7dd1ea206055487ea6cba3a98b275164222c95914ca7de52574f398660"}, @hao={0xc9, 0x10, @empty}, @pad1, @pad1, @pad1, @pad1]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x9}}, @dstopts={{0x40, 0x29, 0x37, {0x3c, 0x4, '\x00', [@padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x8}, @padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}]}}}], 0x2c0}}, {{&(0x7f0000000ec0)={0xa, 0x4e23, 0x8, @loopback, 0x101}, 0x1c, &(0x7f0000001580)=[{&(0x7f0000000f00)="10be739734e4dfe5c9d3fdb944ae53bb0350bddc2db8bccafb543a8b7956019483b8144755d00decd24f9e49d0f274959995f6d5e305a27b883e0658c19df48d75af3259cdfa6b8326c667fd24d9b783ee97a88b3c93bbb30ea8ad5d9108f986f033aee5cc04c86cbd3527a8d9129642be624e6071af69ecdeba7fcef006f6ae97518eef15d611aaa8ee1e6f4b451d68e92a0447b45783198c", 0x99}, {&(0x7f0000002580)="8d174838831b8c1d16509d72a99a21f568a2af5e32046cca9251fcb429d506f31ee950cfa313d9df6d5991d39b8b2f1a67a0138a49ac25bdbcf7e5c28e8590dcf7e92605cfbeba658d795a8b230e5e9c4cc2b686b64ac5cc7c45e370fc81765782adf0d8a6793552f1e3d0bb10999c30560e847320b43021e79c296b21e870a40a10c51bb6852904a4ab5da8c069a13a1f10f818b5b932e866c69009bcef69470cacd6f691c6e4548de708144869cf50951c8d7bdcb2a1f7392d96bd17e795e510228b20da2e2d6a8d6f19afaafbb8df82bbe1b7ea58eaacd47e47b78ecce4d7b8fbc091d92cafe5ea6bb6577c0871e8936b615e2e0d69dd196bbaf558ea17796af5a97c7a424894a024fafbe0dceda1a463bb77131665792e304a3b73d99e0f2ffe6fb8e286a74884bdb87bcc5878556bfeb08eacc140912748b69746e38e38fdffcc0c34b0bb139a825f703d8afa2ad9f14cb284a986d8ddaf85ef40a0e253dab9a85297cffa91caf917ce915dd7bfd52979938232a187b61410664c5d407b83ad5dbdf980024ff170ed4314f923b42175dfa5d0cf0bf63dc7bd98060da7e485935eab86db9ebdb7e37b0e81eec6aaf17bb3a3fbe6bb16c2be263fcea354b52b34b59e3a504ad6db18125f9014a0d99463de8f71970b5b22493a1404e5873236834f656ffe9f407ce26b19072d15b4c92d905a27cf0192ea8ce73e958361338588f8d60e606737d884efe0bbc0e83c532179971322cd84285bd709a48d397ea99de9abaac2fc317df79c08709a817721c6412e1a30e618f7eda997364b26695b62ac48e03ab1566738f35e856552da7e1b67b53739f8706b1d9cec90e3fa8841222acfcd10c69c297b212f8a62954bf68918db5703998ce3c6ad40a39750f6a825f81da75b120ee148e8abf17b77a81b9637a76a1f3dbf47d7337bc8a5d51a9e487baf648a34996f9752e1a764aaf4a73b1a15f64ba81a039a537890f7454957e1545a1d3138adfa937937d96ad3aac4b0a7d6526a7231720484334801b9abe9597e95149a9cb0077ff2fb7da520a7422e9c051ea1e705060dec270970742260a02322200b238f7af3a02fa765d3f74f1303d589b057a0646f4106c750a5f85fde4253c6418c5bf4410a82055d6dbb3a8b55d403946ed0b0c5ae2bd454713a73e1581a5ac916d184ad4526a0a734b9d5bcc1db554918cac2222e4c499ddebccf2797e2f87fce989465197cc97d859febfd993de63289f4cd73b695092871c54a6642fa61fe4b1e4a9b427a991cedbcf559b4a5dfe8ec3a5797df2f8e80b474a8e8a36c572632d842a7477006c3d0af0cebfaff58eb631248f58793828ab884ae4f8eb1e4f0dc72131a68e4d568b61a72d175d68dbfb8efc20afac69419e65658216da15754ba63a26048992c6bb6db20c9ff4e642091d977c418f808258aa53ba1da22e0bd5e9ee9821c6d15d01a669d13441e08dc21e64da1326fd2fb1bff2b05b13e25d38633b877cfd21b682a395c3d6db3ebd29dafa52e550f678c8fa33f8af0c4d3a2d5ebb31bdeb558ea093b67033b7fe95b5c005d6becdba901dbba42cd93cf3bbc80f14eb102e90c31d931de49bfab04c604f6f46b6fbd0a03fb2e3dd5a84300e26407ec697c272f8aa0938b8b945c2b4817430bf43278c6bf85481fa1a194e0903e54724bf56595e15a328f109ddaa54f969ef5de94d854004b11d136bbc80f1e878d8d6a2411f617d6ae0ec62ae5b47e7dbf38c15b0c7b265e5f406bef1d319fce9937aab6ec420bc201ed90c9d7c09513013bd5dc103e028655239b7863d999ba0071caa6c05cb21931e155b7d06d89d762393cfaad645b197147f26d624f418a1c7ac7d80cdaa6a6dfafd2dc03a99704f9383daa17d4d4131493dad3824e8882a42f9729d3b48833d2d2db8f0f66baa8dcf99f43e725cd0c69dc8b255c8a0dead6f3fe9a93407df82bcd45a31c7f935ce46090b8c93ab22a3910209d86ed9121f938ffed741a77be36ba92aaacd86fb314cc9a95517ca1c51374e3a5ee26421a9bf1511ad220fa795a05e07df7def95b0076a1983f02749e2a5a27f2965a73e82a040e5a5d55d99f370f6a74a2fa9913540144ff2d3a67dc201450c18ce4009cc75b7b3cf42868e253b9f510ce051ed9263017da456cf7806ae990fc20fdf36d55a88246e2d30eb193401d9ad14e3cac03f6f85e284a1437c7806f079cc04afbeb7ca221cf161b768c43bdc8fa2107314c26748d6c26c0fdfe011d73335863fba75980d6d7838aaf33dd922938a3df61fa69478f32f83f2e6e73acfe70ccc559925e160c59b83f33aa7c20aa2e39acf33877266d6d8f5b7c24307f84c9f006c6155c2f63d33264ec86777ed388588b40c6278e0e5500aa1bfec0aa577d4fad5a672fab50ed3b85dc2d16b0638f4982427707dd2cc4d4fbb5bb2899afb9b35eeaaab2788aa571dca67c7319d3f65c5f6adc9673cc65605107dd0db7ae75855ea1ffbe7d6b2fb8dafa68aca8adecd5fc44a8bb8df302b3adb101f55b8af05f43724c71267c6f26c729107a876ba270949162343d5a9ae31f2083cafce5aaefd6c93a6d1a09543f21c3468dab55bb1a3d0a33add7ae9df5747ab6f732dafa9aefa068f6dc60cf78e8c1ea8ecaf534c86c65367c359014da09e0d3ce56f603d25de0d2c50f07ece511710fc42a7c6cf9a42793ce59c371b4d1b17b9cea82f970c3c96eff50334713353b2cf60c832d61f500ff52074737a745787f614a012211db2f6f5d5161c3de347cedd94fbabe38f88a5406739376ba48eeb8b83c0ced9c34593676a1716d41cd268201ccb62f4c10434b3a6a42c4579c15b69c109fc1887d58a3db84e7e6dd1f87c26fb76486e439736e9a53cee8d07eed6f4b5297d42eef9735fad66014fd2d08b7e1725268eaba44e9ed0a657ee3c4f284386c1dc51658be95718e9ab07382562fee3f9ee044032bca7e6d4843bc1c41d7974e3739bcb70565afe9ccd606d8c834ac0800df187416d17fd121cdc6f852ab7b8beaf32736c20eb9c21864238c9d20f06927453f7e60d6cb233752011dd8f17fcbc73db6f490a435f028d98c2b5df53865e5a401a10fefe28dbd590810343c4a6a40db915d9c597f28decac2577856128b82a40172d599b7ed8359020ca2f09ad8bf8783918ae86a13cc4bb6eef36bd9626b469a906cd15de40e00c9bef157018595a63613259f7b9e3d742944228c357099f84cc8437f32e9dae890f81d486cc734b3343fa0a219eb410a6dadab041faee1e05671679f12269a340fb2e83150912b05c6d564f66278afd75b8941659d0b637925803455083df4fb027b6064e79cb4233fe502e948ea9c011eb784ee80453b0c350060c1f2a2eb8084b7d9be8f36f960238ac087f7fc404895f009cd33e62d5b87b898f64b145dfb84440f671dd614171b09b8cef1d4787773c463669dd487e17bc0283d7ce38d1e4e07e15527125f8094a20906cc435d3541cafbc2063f9e0948f693188f103db8d4a22a47ac088e5402e2459aa8bfd9696b731c671b1644b92cab2559412d84811d686990565c5cdb0963fe6b21902b223604eae86485b3f69b361278a6c2d5e5baa2c384d63792aad37c38a1d194acb81c0de6f79827856cabbe93a715ad61fc525c6564412c9c7e15b0a8dd408493dc013635e9fd07c178160a209f60a53d07737040dd763dcdebf77d2410d9ef24d11b8a3dcf1b4c23985cb2549d3d16d26d7f0b27d040171969fccd365a9853b6e9ad8c6fbb31e19ee31a6874ae925d7a240d8775413a50ab43b3454d0a85e6c4d07edb74fda6bbb7581a47d4373b3a183593b59bfab4d40d43998026d72648b993f6173b8e5d28f277f4aa7389d7ee10242e9475764ef132c53f0a044ddba875614571c31bb1d44dced262b810bedf11db8643659b32e253fbadbc4f5a496a0711ac7b5da1f53c005e7d1853e1f9deea34336a403452a4604453379092a0858c983d32f8d60f58db941da915ef8e55edafc5bffd80d058af09fe36a7fdbae2f818ea46c73fc7ac73370f818105c14f845d9af38d376f92adf88c3baa9c3d9e19664c96fc764e103619b43afd56f9b3d7b5ca39d2aa97500057d8fd556e887e20401a2b10477f22f870db636c49803387c69c95bdbf4d5de765b87e5ed6264234d6ad4eed134d9ecad0c4e89b554779e2c74bde3f5c995adff73e1d311c21d83b37ed18a41c3fefe14344f942187a12c83e4bd0d5cac456881602b5326b851736a5153762a85c7b4cb97ed8004f6138a3f9a554d8e0f2c5eb69d78b31aae53657859feaa90270b9c4cebcd6f9cc3dd68956188ed085b454bc9500871e1f2456142bfe2e2d4774f1ada83be75020a3de3e603a687aa5de9eadde766244beae68be5922e22618971411dbb4238fe92b3f64158153d61e9b24887c9b0eeda396ed72bb6184dbf1bc2389492f9fb3515e1283d309101ad3ade1bb0a96eddcceeaa66cf4c2b0316ad11cbcac166ba46b1bea7b739c809051741ba10d208341adcd140f89fcd17fbac70fd5fd70d91dbf7b6449a846ee2c63511a8ac14ee8f874456c4bfd5189ae5ba8bdf33ba993ba6e33f445bb4214e8e5345959de117a53da6c31fb76caba8c06ac623aa37e7663c4c8003b442c8a799cf908be00ffcbe28636260921d419517e9caa1e06b0acc36de4fe6cea3b3be55ed77efd5d4fe2ad2014f76a806d541c2eada7ccb13f7410f60d357b42c073a47b38a6b7edb33f352cc8183f83d2fd832b7a2c6c80412f73029ec043459c877e58faea10bf97047ed85433501091def5cc5b9b820695eef0e6828021a526a2b92e961c68dd80c03154d6ebaac00602e6292b8875d8b3acdd6a23d85532b3c03101c38026bbe2be695f4e140365b964bf58fee753b18fa18903fd5271a97d8a08ef4d740761391a755b5d95cb963e43647a7487343efc4b3ef2281d211537243345aba815cb38ff0143ed533460e7525b67072dc935427ec4d40df4f8970c887ad96393c8f222dd4d8a06fdd6e993199dc63ac4d982e99a212aff18ed55ff1476ebd97ba15d24e1c9e44520355902df57254eb9c1425791fb2832dd35b551431ee08536bdce6671df960d44da907a221c00f7856035c5b48f96656c12e5d7aade76f16696440b72da5839f546e330468aee12beb9cc9591d0bcafde89699f6163aa201831838db30e143d96ac20d354e92e2044c5a3c5d1e0d533144ce52881a8c4c7d966ec3bf86a8cd3e2317814d9d8c816d45cdbdf71a8959fb22a84b990825a7c8763eebf7c451ff16f0dd32e587bc412d7bd3600ed6bd46ee169d4a65816115c2f91ca2cd81a29999411e4c6688e056268542b37dd6a1c2d68c7d0e077a4d083a93ae9b8832c91e91c7ef4698c4241e9399138cb3f9cc8ee50a51dd7bf7deee0c586276be10f67964a163fdeae6f1ea8ccb64bf0df50fcd98bdc786deac58c7ea797d3bdaa6b67592e530070dd49cb43bfd93c45ca36a8964988071af3bf1609b6866001a73ac5bd6e8de7ff29297a20106c47f1cedfbf56a5e0821e15a4626c0f1c08ae42b1e5b3195ef6bdbb8f1151ecc970f79daa1b49b8d96c9377d022d5d73179e3fafea9ee72981ee3acad22f13459a71caefa084c1728ce009231d3b22693f3df5d4afdc8efc3bb63ae5cdef6ff8df8ddaf62c7a013143375e88712e17bb43ef7324141bf19a170d68c824299d107457609433e02eec6c4a4f7695186882336eaa03cb93030cd81359fcfa2b7d65aca8b428629e35ac5fb7e717b90", 0x1000}, {&(0x7f0000000fc0)="ca52419bf95db9e6e4603b3af17514038272aad43784b8604d6311f31bc7bd98ef4af2223d500eecc3cbc952ccb948ddd952817f785b51c66088eab7ad5e0cb2fb1992553ca66d331c21b7b9fadae2386ffb22d13adeabc48dfb751502f5c26e9128bab325df8cfee262763af31b2e527399a96ae4c3e9cfaf39dc9c15470fbb30e2d733b8602448548fb078c7a7350cf62d7291631500586fc8c1", 0x9b}, {&(0x7f0000003580)="8778651af60734fd93fa58158a8144926cf22885b019f9db5259621cc6587df627821aacebc4a05d4c33e8885f16a756a71e7910d70775560cfecaf17f514a1b00be433ee09517203367db9d7dbf7f26e26303a89335db6b5bb58611b8fa4c291bc51a46d1627799f02df454fa368e6773279cb7be1509dac78e8d3d764c962007de305b8dd36dcc969c26b5f11655831be9cfcdb50e50a617decc3a6f9ad575f432965d7e126894d9462feccb2ca0e7f0447e3bb55a448d4c8a0adc9ea69abf6109a4510a8a6885f4eaa23b6b93bdcfac0d5f7079b78db1bb046ccd2702b99bb3010f1e0511c41217ea3f8d83a7e0d4204b00fb1880ca01e92b63474fc6817d2e960d9e68384ed2a3e85799f23c44aff5ce6934f9b65ed9dd15186dbaeced54af74a16b3796cd133a49171eacd8a969bf987ab756070e5837b9c6605881eb7e872101730e81f6e8ee2ae2779ea1437f74a8daf138e9e22e4902676ecf5172a6b9d64360f290fecb2f1618356e96f04bb614a3caa998028aae24a3dcdb0c18091cb21ecef900d4227c376519bfb8e668284d55399ecbd55c935b401d1f439cdea752d470096e3f807499146c0a1251acd0bebed8e4a8f5c35ad5c5a1675ce29182ba97bfd6afb8fe7430ea4616901caec3e37c4e25410f20e5424db42f865a7b679c585192b7079b9d7fcf3620f3bb01788d53909d7d6c15d9777229453106ec861b65925155263835054c1b0149a164b69d913070a217f99731e3ccaef432071e86f724e71f95ead8c0778ea8ad081ba6220e4bd61b59b6e2ea83f3bbc21fb925f07a51eb0e6732a18b4877d81f29218b7e4f74047296f6405ef3a39b3d2acaf7dac3d1f96ce77529a117f1ef14e4de98e25bf479eb6c50259233df8deb8c18cdd1c08e8e49f64ebd96ac02f38363c02895c3f6d66e56e0214728e46a0ad3e7266b8b36ceb5ec09c36ef9bedd9e6a7e42aafa68a6e5da9a36fbaacc66563b6d71ea048f3a5b42e6f14f29bfd8f6c356b91e7255d4e08a808c016d6092adb1238df33e0922930ea5bd0bf73fca840a766537690e60e25d1f7a69b93fd0f569af330eead2a30612465c09633e55e619f63104571bed95e272c23fe1ebc19b09026d5aee9bbad8280be3396c4f606cc4de147df670db75d051ef458e9f916148bb1db540145c9a2e70a12177069b9c96400525eb92d1b610505e04d2983e5a9d57b7991cb7ad53453ade97f7e5e0dfed1f99610ebd875746c58b420ed2dedc6893533a4d928b46ffa6993cb1e0b737554cb0478817969da12d0884f60584de01eae12909d277cc57450b03bfc785ad894890015dc41fb1e4350c2addc80f4f442355850aedf9a4b109b14e30186257a1f28114b5ad273de6f00b942b04ccf100e009d8ed6c56a90207b7f11a2d197916d971e22dddd5f8f0a100fd2916826763b1c93aa7737ca063d1b88ed5c45122a13a6df1e6ce7a98c96d1c21aacb9a38779bb1c9c42dcba69357a3ad85f87bdd49cce6e9a814ddc9f90d4e30ed9bd5bae82b7b6dcf8928e3106dd0be7cae924c63c0487146de92c9b007e7134bbd38a1891d5c6ab83de7f8ef4556aa20d4e1e0be53f549c98c5ac44cdc6bc263a6da12e60ba69186f5dc1d421e8603d1b77fe6f80eb5628523aee4fde1901c306ca2d7f17a3c2a987426fecf43b950fccf24ad008d69309e0e440ec397a3fea75a04b078812253d2563106270dd6241cccdcf32edd05b07a84d965f5d69be42dbe04ef6f6ec341a344f71e8ba487b8971e8730b12876cccec4dbac8a244ee0d68538ec603d45fc18fc93c201b410fabc06b5ede6a55cc4a24e58563a99cc635a3c1a8d8f13257181212abc7fbabc45e183c15d8e31ba231f990d55262058110e18a62d01d7c025f3caa8ec6fb619456fb820df314d63e57b2f6b85038ad78afe4da4fcfb97cf3343e9e4a5100c104b52a1a35198ba22b386a6d2ca6bb2853796e16febe22cade4e4846582d03015d711c3129ef1fb899d02616bac6e326414a26219c7a116c3f676e1bedc559e020823cb093917f69f28bd6a2b374f2d488ce83a2ac105b82685e84b618948a22e9be4873af2cf12e330105aae77cbb350e5f6faa945868217534305cbd80c8e124cc4e5f6593b20b64c593ae1994c93297ebd1bfd891b93527f9e469032f295270da75c33c135f13ea2c138ad78f70edeeec2cc56fa103b2a67b19bf20960ebe8fd7cbd93bc7f1128da1fa95e11ad8a4fe84aae74c13e9709a78f7542105cde12733f2792bc0772b9ed03c9c2988d70b4435cf2208391fa870b58f8cfcf57bc19ad4e4f6f45376989b602be82ae122c2ebb16ecd91bed4983e6e1514c66210e5f0b2f12bfb9b8c91656f8c24e5e901e610373e77efaca6c6858262a457b1a3ff1e0c335ae7c88ea870ad409aa6ee43db24ec55c6c925673615866a5621a7ca5d86860ca1ae915fb01f0124310ae65b3659241be9a21fd76a36926ed77f19652b6219d75e1a2533ce49d76f2eac8b99dab42b967bce7d3784b4fc18038b1dc05e4254ee2c9fd1784c4f08ee25554c99694cf67ab0cac43584411f9f23ed486ce32fbba9fbf84d716eca5eb8a01e7dffbd016bb80ac032b4352cb1e16c7eab53543e706d1de26eab463d86b6b22cd35abbee8f87714f3f94c6fd2e9968bc44c9e6a704911df0728edbf2a59b14e0a68232074e969dcff595cdb0ad72c7b0169cf710f3ed74a674ca86ca37fefa773877a1f6e23d53fc09078ee0a20a1aebd15aa64d1bc94c6b0482e52e48892af4906f1c9ef2d6732aa13571ecbf3b9aebb7bf58804ef69ae054c7927e7fe386fcdcc02dd6f49d0b5fd15c2dfe67577c6e0df7b8b7756545d8b1c8713a6ca9199e623fa665983b63d82b817325b7e34ce3f67bca6ce0dc2a0d3dd73a108baedb787de2491cd6078a3cfb53e09ad3cf06c9df7f8317957a29ddcbe2689556ba7690a88d6b428f664e44606ef6930aab6630d76f24794fbb2dae823e190ac0600af137edfb30002045bf9b93c33021efc9d14625db865442c384ae438ef300a970e83d22b8c2d3c9f0cf043535570c54cbaaff651219c317d255c108137fab3363d288cb8b7bbbeb39988ff564ffc18c2ff045199ed5e95b69246334a66f1d3e3393c2ec9edc0c4dc1858abd039aadc586106051f9f183e9cac69139d0e20897567c0e7a9b19ef1c8849b4ed05f08394b9f91dc2c0d0c81098a6ec62c19d7a8c3d656ff407fff5ed54f27f885e039d0100db42514da298f3233c66d3f21076429a3b37c1a0b6b2a7a54f6473fcc07ad1d08342cb78cf1987b62b9cab72e1cf04c9fd2515c8b7338f1c39b52628faf42e399005c3ef7519ed7073883eb8ce022947f1dab213401fcb899ae616f31512c3eb18c18630501e2cc01727d7e2dc2e4735167aaf72c201150d87ba22949e822496b9451052747cdfc24e3072ff841fbc6349aaac667dd1dde81519f634d56117a20f35dcfa0be8d9cd9833c632ebb673a8f35af0f82e6d6aaa98b93a21c4f885ea786db983a37d2a4e440466afa935b2b63ca2a259389821a9c06c6eea7e54d0477d09058b9f0763b30d043ba73dff7e1be270bfc9a31e2c1c91ae6b53639795781eb0163113c94258697564a6a68cc805914a6ef030790c1dc471e8b0b15c012e41ea8051ffad4d97fa1706e27ca401debd5360926d6c24e79787ba99da493b62d7e4eddd4e1c7957ce02365095a41dcc9bcfac3987b08dc5abf4fb6470b15f1d4e7d951f042c39c8c76210377eb3fe3c590b0aa31657a869cb7b1872b69b25111485fdc7083c2af2d97a12b7fb5908c53f36b062e1dacb2432bd37160a3f85fd4aa8df25b628ff7c7a4322f105356c18e9fd211d0a2c2e99693c070654db8054ff2926874c6120ef48dc482d327e697e17ab267c676d7de9427949bdbc0df16da591b4cc2c506a776ad87fde95b1b8b2d0389481477a310c3302693b78ca2f7e50fc0f95b30e77407fd654da70a1db294b0b4ef24d519ac7d31688ff546c02e875f33450841a43d2befe42cac948a28d3cbc85aa410c35974ce71d0766015e0aec7014416a7e04cbc3fa4948146686a0d2cbfcddd32b716bd7566039fd96a4f90efd0d5ed27ad3ba2c7ff71bdac35b8a45101e4bd1bbd1793d3b6ed0b25084718f2473d9bc9e1dc3f666ee0a41bb5512463a5ea4fa974864a7ffa31dbc199298db0326358cdf4b3eac61660518238777c7fccc1f3571a28a6291464813c91074da602d713b26fc45c1411ed324ac0096cf9eabe898517eb8a96b70d6af670522c3380d9af9373fbc29c568ddcd78714b085208329e0a487f91610d453fad63c7e8bd32906a2147c93ff93554f1fc7322c951f43df31da90009b9f819c3069c5396f48ee26f779fdedc39c6222507224f9b285c7ce8a5c4143f2de8c11f99901f96424814a1a4bf429b888e5af6e42d407bac39c76f969a967a3f5dbcefa9ee9550e90d00a71583dae13c0d06b6c5ac46337dfd4dd7de98a82c0530a867ebf19d74d5621df92f43db80342ddb84c42f31c4efc6d145e185a55bb100b8438d1e3d0724179cc173ef1666de5038b1c9e63e58874cbde60a94f733a7c5e6b66740c5f55d1bc04b6f4a69fc72d8b4fc0205797fe51343d8d390b7b0d9c3c56e59bd252ccd55b424c3444832cc236c3fa83c4469739aff75b45b626960db731d4365bbe3d777ce5b9d86b2c2c462128aabb64dc519ca3ccc98baa0f5470f8a207251625befd9409f240ce1ec41d73a983c74b40ebd60f65fdd50e24815f772302664c7d15fe478dd532d3eecbf0c7e72d85c60583ac39f9ed2a0e24504c4071526527e4c8b31fcc5d6e70a6ccf09de5ecad32990afeb5a6231dd56e16a3b5172c9ae223977ce81581bb157a67ec009f11a692e5a0a7fa31a2eb690b2ad3b93ecd2df1ba1d931315f4aad49af9509252eca2df108f401eac842dfc67cc7185ddf66c2f53b65d61f28c9c4b1772ab390aa01f195e613a8ed7c2ce877a55b539b05707384adf3cedfd1e6a7872eaed40570c37bf35f7b72504b6d27fc47d5d9df75c24107479fa927ceb0f307c3df65e3a694cb2db8aff6bd400e17e954090c85dbab2090bdf29af563c8ee7be2141a242631091100f7d861a21decb65d5d2876919d6f37ec0c586a2d9f998aa7b0e3b4eaa1617d19e982827315d2beaff9f44c1bd6a0451d8adb3db0d6abe0eb8a69b60388492bc030b9350a7ee6f0c464e8dcd4eb1e7a1e2f925ac20200a990a79c60589509394a85f4b7372c2ff0858f3fefa3813a0f70a22f2147c971522940f832780a134ab7eba090d7e9e11788fd51f8df0d6f8eea1604a9004c1dc0f279dddf138bacf66328a3adfdc161e0b6a7d31b8c9baf666b4821a20cb00868abc326e85f34b2487474d514b1678bf3482f5717829f008317771843c43a839eda980e9ba96c00a98e944d9f2253a826af99b62c5ae76ab08ac470422c8a78146c2ccdf887e124a085c13673d8f4709f55b5d9888dd35625ee56abfd34f6561f8270b9682eddd1d8bb86fbce2e88f1f2eb83240108405d555491a7ee1009d8a583020c8ee7d214655ee7b7a7d66b87a127eb048a2854fa950ba97158591760c3429baf711949af1d378f15f23822f448cf9829cc86cd5cea993f0ec21a545b0caf81fda2c7ffe1823a3431be03f8bbc666ed581d58da785fd5f9e87667bef45dd682cbb0b3a227002ec56066daeda30f2b2dcb4098c1ade67e21ba0bc9af29086f86b1c435f5ca0970eaeb3bd0b340bb05d7670", 0x1000}, {&(0x7f0000001080)="06411a5b6246f5eb12b98515485e1b08009772951e086a3f0f055e2f5edf26c513c1f54a37658e7051f41632a503e5c7d40c433a1ec7f04f21d7fcfb7d3790b75d2944491185a808baf3e39bb4a5c09d6b5a160b6f76a5ce29de55c403f3a7fd5297864beba8f1180c5c25176ca95c37e16055b5ee7ec37e32cbe8f87e82a1872d267f9ed1b60b4e779b5321f3acb3175fb9cd41b236635cdbe206b12410e88819b298fe94381c1bdabf9b34d146df84a76c41bb181e7ed130af6a3ce198968350f1d1571e294afd9a740c0935ba5a1f648909f2ee2e55eafb8c2bf6fa0abd22c352fc11", 0xe4}, {&(0x7f0000001180)="b9743b6c78e23d5a20ae86c62e8e137e9afae879f6655456ff53aab901c330542056a0c0e19df1dde78f84fc2368e1e40663a28fa4a2383413f6a1f7bc2523c9464e37a23c209699f52b464c3029147bad7cbc7248eb6ebedb2e898f5d5beac776dade0a6a817082b43ea476969427fe683c3de95414de95c8cfe2cc9a47b21edebcd35f3f7e99b3b1963bdc5f", 0x8d}, {&(0x7f0000001240)="738305f888dc1b20083f8da75ad7b72544c4f597c781fc94eb8f8939e6db61fe1444d2f8ecaad1e1167544248c14019cc45403ed9d3311ee0513d22255e07cc73c4a92f2db44564cb5daf187bf9c18bb082960d0322b5ebaddd93e6d4bd485e1c510192455acba0904701f211e777fa4621e254623078ea4aff53b445b348656d2456dbd08414f1329c94177b24f34592f64f2075422e5536e23f7edd4e103bc1086c57541b62b9863e5ee23838ae3d12ae4cccf4ab0dd5ba416e2f8fe2ad4fdfa3901145645adb0785c0e61edecc4060b3374288e8b4acb5e733d37421a661fd22738", 0xe3}, {&(0x7f0000001340)="345488f606ffd9dc8a121022c15231b32fe6965f4178eaa2b1f12ee41b02bd1ea55ec6728c8514c4cc81346899379d8bc1e2f51482c8c621c706471bc1f014ff12b3f115d3d34a6b8469b808276ead916a6e4d708b509302bad0c6a3aac8f190db0f409d9a1d0efdd195d3996fa95e85a18d2d152fa6753e5f97edd312594eb5cce5e70358dc3f02dfd45961633a17015fd168bd3e60d354dbdc804425d66b33ef17bd628e3a", 0xa6}, {&(0x7f0000001400)="a13091e0a28f4f21d4bb950bfd8fd0ce0689dfcf2ee9ecb969a35ff54e0cfe2b01568593cfaafc114afdedeee111b1dfcecdb610c2c9546dff1ef712f4fc26b88d7235a57af694a0cd5fff233cf0006b", 0x50}, {&(0x7f0000001480)="ad6b8ee3e14a1e082c3efb736f877672e819f26c841be40df37c68bbc09176b3b166f46ae843dc3857fe9e0d6cf7406687572354b89a890cbfbcaf28407afef1dae1230c4a9d107ea4e023b0e83ee025252b718581c6f2968b69687269eca6f5f27c838b26323e303d25974521998c9902e9468a438ca57c79f95a1fe04519d891f8857aa5a9cdbabd897d2d63a45ce26bdada4a4ab774713c3eb8a000f4192b5a50e5e8e37646ade1cb75d4f0a0308332c2097c22f52b8f84e31a555b8decc384bce7e59bd6aeac1cca99a88cd730eaaf025a47a79642e1cc402392dff1116fa9e87c640515bb1c0e0c58915542ecf2fd33c958", 0xf4}], 0xa, &(0x7f0000001d80)=ANY=[@ANYBLOB="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"], 0x180}}, {{&(0x7f0000001700)={0xa, 0x4e21, 0x7, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x9}, 0x1c, &(0x7f0000001bc0)=[{&(0x7f0000001740)="79a1d1a5d90abd4c966545f2857a0e6848232fb272bd927f", 0x18}, {&(0x7f0000001780)="4936507da89cc008ebe90aff31028dbe27a115adb2102e84475c9abe4f8283aa4433aac01dd380d9edfe3bcc484587aa3c09b9fd409a07e14f5730e7d2fd74ce30a5b643da4b2353e48b6292c5ac93e0eceb2f265c6ce3418873c9ecdd539208f93f7aab4243fdb7262d8f9a9abe0b430366385275aac1e9db366ed2f97de261346dd58612c86867b970b67f839514027924ad1cb38282fdde1a625fa29d06a65b2ae37a9222e5ee47dcdaaf636503fe4b008605a10a9226e06702d5efb44227e71a59a186054c4f", 0xc8}, {&(0x7f0000001880)="846bb42d7ce0ff7d9cd6bd71723e9e63301ad55eac13d130405bdea84b4eb7f6b13c8cb15a6a11452d4e316c0d55c1be17b0c9fe210683fb2dbfce3c8e17f54ef5ea7e4736354177b60500bf14c1867316beedb1b6fea19f078794333bcee56d186230a534938314d0e64845055ab4f1d258b2adf91428b0afefbc1d930882956024f895baefc9325046c492ae977130de0bbe07b2c1310408b754f25de7314084aa67d0bf6c9e9b5c161c1e4801dda200d7d976ac44f87f64acc58faacc527d1bb3c4f2b752d49d59b9d5d2e589ae9b450366af6a5d071070a06f696899b4c80f7c6d37", 0xe4}, {&(0x7f0000004580)="5acd29947c2c95de1fbb7ca48895de3c11f5af8a86f72cf5231fe3fc0dd37d29064b9fb9cfa448a1c53ec0d9ddb0f86bd25d8f8479b71a073504a6f0618206ae94233c5d6c1b829e250da83dabb18aea208116780189123dc3914826d04aadf1f83fb0bbe50d53a44f0e2640a7b9419c72b931e39e9019f27e0b846a9624e54a4f1221f001a11377f6bbce492b2f044ee92d4a871aebde65713d68bef89f7e8f3718f713ecd005c51515094cc1def14046daec07cc7e97a17161e1997c2e54d6dfb719e6d83ab981ef90062e1115f3175eb83097f50b473daaea465e83b2b6fdf5c0feb4a7df01fd394f192892235c081878a4dd28b771ec4060f297479c558d2d6cdc83b1f1db62a1a6620f7631eeacdd9d10274ba25a2478b97a88e78bfc178e87a07073622d9ac81c9cc65d414153b0191408218814fe2048d3d5db57d4a68786df128157d27c67d8a2ac97bcade9282646224cb4f85c4e8972ab3cf6b110f0c18ca89ee2f11412b2458a4eb76407937f44fc0a69de3728bac253bc88b9bf394876a255dc2e7d2299e0e317aaf6158babf1c93c50590a28334880a395414a7c375fb6946fad9c7c220667dfff237abdf7e734a104c654bbff935083f62068f74bdbab1c8d050ab82f4f924f7ad0f3de674b4d21a71f279a51c0ac62a49808e74401759c50bf390f039df35898db66ade47d1c47af61975e5d48aee382ec8e595f3c368bbf28a1cb4c1ff94a08ce5a96e4c0cfe098231be64b0d33cfe2cf8909f4b92e704d80fc255093f0352b847c7c3b4c2f1b40b5abb67ce18f7daf16dfad69eee6edab36b04424ae8340395ee51627f6487a1a0c9a8ce345da5bc9ef08b752bac24fe1921718cb2dfb401b33c3069f4c139fcbd81433f6af535ecce06b53323814a1530ba376e9949f03b5f38b1dc9cdf0596fe46482c88942651d588a39c7085ee5bfee7f17d070f3312d8061cb92af613fa6ad702ec449d7b18df01cb96db2cc41f4a81563e1403b0ac4939222282f793c368083163d9ae5b635c51f06ff574dee351e15e3689aebdc67f3813531cb1b617bb5307778c19593d727137fa5f769ec4d7577ac67aa098dd4c33368456709b523609903ace69b289edfad11afca99099a1912abed791f48c2f92e423a8bae3ab88a2be76bae17a3eb29793c7aeff30f1c3deefacfa574b2d9b82f575146179d5e98771036bbf62095c78b51f3aba73a557cad41eef2bc0b4976cca5c7790665a9060bd1925414873d32c24aa610c076cd65a031d0bc0c94a0209184673a5a9cb6512bec49be70f6d85c7a12fddb4e482bec4b3c257520ff120780b07fea5412de1b3c088a7cadeae23d7123583a4e4330bbbf23734f988e1595839bfe6abd36202bd1d02634fcc3c384ccdb98ca85556ab3a21cf720b190ac4b50cbf8c8949d473f47482be93e811eb16fb994e8608b0e1831537ddfa194b652e40a66d9996eb2a2307640b82dffad3cba7f44f18397ba2e18c9533e3616f892bd155dfcec4028c1b4646c9adbc4e1cae17244b027fff9f1992e845f07af7f51d65eb99737a371b49b4c427e88f79e67118e9488d2d6c60063c3302f05ffeef05d6f12c28b405d7163f84e22c29edbd380c05ef6ea53e6a52c5c658389400bb9aefd97d62b002b781b1d135f39bcab7fcdfa734e2706d36695509bcdfeaa54bd73a20846556954c6792e82ffd0eaee1bbed36b423936a5f533083585bcc81da643106f6bda191b45efb5d2c6ad656f80e8b5d4120b1042c4a2bb64c538b2b64fa295a88924f539ce366ba63a85cfe8378418d356ad538cc75717b91f1a6c027f7d0168f62707387e46f69c54902e85d20b52bd331b8d17c80511b67bc2f293405fe3aebd2dba173d44566339f56bdc1898bd6dabea225f3ea41dff587643b76300133e5f11a2b42a6812f01af2ded792d07b5523838518e86003f74b0b5cbad1d057f69d3df53760040faacc57a3de9c010c3aaccc255a701d50726d6b84980915ba4b0d30a2dd128d980b7c26746984f529ed8be5483e1973ebc287121275dad71f408aeb869e4b77cc0b91ed9471e00f664db080abe5020768213e0b1961bbc0864c72a7e23db1c7c65c4a0cf9fbe0f1ea2130e2a87ebc76bf72df5b4d85000550f02eafc2626eb0eb7ad4bc100e31619f71f6d150e1850b5be1c73998d669e8040228688b6fc8cfe2946609fdaa73a2d53cb73958c2f7a2ba4634e3a6c3086d0abc7a6a3bb9e9982b46b33e85775f1bf8ae3312986eba5a3c7615c9a2b72ce3908501483262a686d0063eda94f4261d95fb9eeb1fbae67de6f192afa830bb9d3754ef923627495fa0bb244bb999755114497934f7235029574ee0e250369cb15f0827edf4e70ed589ea4e324d4f7a7c5a6b730c2994774111f7122ca6c63fe2afc0242e56fcda66b6694a7fb07a87696ba81261b186010fa7fb1190dc85cf4f2229d9f0de1c48fb568ae3dde6ece27b1f7c37c58e886a0d2d49e58a18b3a9dd88c04d300d219ad9891fab9c07cd53fb789e17348328f8be4bb9797e11ce81d46ae6c65f26175bb48e5ab1b228b3953c54463b5f0e81a2d10567512f27a4ed84124117d0559db2ad7481f3995327acbe411dc88aacff5ba4fcf17e66f5d41af5c381d2284c67a4260076fbe4b2da3c45b7e73355d4fab9be3fef20aadc147228858b22a5239e01dd1a3b82c1347b3c0e5a6a6f7ca9fe2d5a161c7d17def9f859ffd177334b3568a68d91444bbf68cf591e0af3494c328c2bd5e26091e9b0508dbaba7c15c154fc89312ceaf1033897ba38d344a9473e5ddd5d0275a639824adf5f08e50898118a11b97353b56f7887db8acef6ff4a4f39996dc4f56876f0029dc72cadd9a3a0160218a9705af39ca9d3cb13a5966f2795859b1131be11e1a4733c03899ed2cea0c4cadda70df0f1dee8221a677245291ec3d5cc66cb13e3741b89c6ee1e9cc049692d50744b2a0795d7a64223bf4f1114721f54dc411f542dfcae6fcc8aed1aaf471ed1ae8f752736ba66ba53230ad173ff07c7b094bb1cc24047e050bfc49dc99b52a6f81e5450b748643cc57b681b40bb234e1f29853de846cad4d5ab36929658a1ca5b038f3e14f00733e40fa1058fa51ca25ae703eb4b60df205326acf2b95c3113bcf58610cde58859a59cd0a7d1e27bc4db9221bfd6ce0f27667bd1909dfe98824d2e3fafd35f28d93cdd2ce83be2609956a3eb0c2ae6e4b2bceae65824c383bbf642b8f06c5c083a39d76d1ae128fa2bd61620337f5894ef42fb92498d4befe590e239994b0f1b4f643b24d4dd47c0db6d8392bf410012fb0a458f8e24754db9aa4cb8f65f9398c08b7ca707cd76b213da8cfed4e51d98f37331e1eaeb9e91cbf0e40f734fa59bc6a44fb2e5d9fb009750c05ef7fca0a02d1a793a6585015ab97ad84850581687833f5e41676ecf03a3d520c242d5ca897b0d1a181ac8b53c17e8725031fc2963925f81aa9236934a203051d8a934d872da5b3177462b901b18860dc13f3103471375272065b0f94b52bd990af8385371abfec83ad185eb1efe85100d5ecd30397fa40f79feebb41a16992c273808d3309f0d8813948fc873a4e5150cba6649f1d8fc081d7283f9a5e44ddff3087e26178450fa2b6aa41354e41cd94fb7eeb82cd899893af026ea4d648cca658478ab180157fc4dafe596bb1391ddfc199bcccf08fa5494c82792394322213cbb9326c0459a2e1cbd09e620236ece29a7a7b0313d89e258766f87afc38a02c5b3e68ba92564771d53a9a3d8a8a540b23cdf1eba07a060a259295bcec0858ebbbc6be2dc75a1dc1f8bd09c1f77eeff27571a7b0cad3b5d2c2d8ce809195808c77d2eaa99301c4c9c5ad95564f9afa5780e639a92c5fd6602ea463358cbad4129837f78e397d239c5ea01039f447112e9c1409d90362667e47a8da83a3d270a4ef6a598050e2adba210578c7e7519296b3c29100615afaf8ea239ac6bce8ce801581b456944ffa8fbd7cfb50c62dad3f0c1ee067fbc2021a2fc4d20d730773d992586fddf92536b19d8eebf6c9b92cc7a39e3a18555de83e58892462f11b77de92700807f8bf3e1adb98cab4e2f85da11a9189b61fa1c0849fde50311f6398f01a8003ba073381c2be6c15f6c3fa6c49c11c302da0d60894bfb9a697f462b3800f43cf219c54d2feec7ce7615780d3d841b5004a368f149e3ec0183b0fa04ecd30d75b26e80de1c4717cb1eb4fafd677c1723ca713e80cf317555daecb4b90e9c74af04c8ac3f37cc88eba1ecd2a3f692819a06fc22f613a034ba05a675653354be8bca189e513f81ac30cabf23af783c4a20092a6590d56dd8a3a2acaec6f1d29f149bea624626f6ba3355c5f1db4d27325b6258de6c1f0eacd01b07cafbe4cb28145fb27e855af327e86b1f5c41859c6756bf7d84a2cd69048c09d506c8ba04820d144093ddf118755005eb1427c3374f70f1587b94115430b2328f9b0f78e390cf2f1fb1f54772ee1039e72dd08847ef602d143afc730c52d00fc3f90a0c4814bcdc03320aad393191567d102328529bc00cfb1419e2f7165907b937994af9174111493d970e06ecd322a61ec92d947bbea6eff7633792b79f7ae23ffdc31b62a3cdefd6b69e22db192e8292f56c4a7c936a0b680ce190f5e4b96172605fb3fe64777c9eff159e70d0da7d95758d8b6e39987754fb7d6c0e953ae4182c77f66bf5b93947b22c2f462e089b5c543f00363aa661e7c849113ced8b20723304d1a7ab3ffa2b18310a10af706078dce5a50cc5a596d8e569d580d023a846678f7b41ff5ccda85f44ddc1900a7eef2f33f62e931329f0426c945221bbd377fc291c5295da3657248fe823e5bf94696eff39d2974fec40d39844bf0fe86a5e6b6aaecded40bf67a5164bfb113daa55c584462cb54231e2b6f036cb78c167348d0c4f521c3f98eef5c79b84c1a7373f12abf311b2a30b6646e10cecf0e419dfaecbd594b65e1928138e1d54160bba890499d5df657eda4f5f0299bd449874aecaf560876fac2f5997fba95e6cf9326fafe47a030207df6ee7e202a0f381d58182499a0021a81856704295372d4a34e180a88e1a3567f8ba17e4a285211bbc556af1b4af3a0253a01f95d1fdddda5dc468c6866cada761f03eb865c41556e6c5ac30a331d6de43e7186716064b904758bfa4d99b4a29c15e7dcc1d81633db945e002d30ac97d7670173826c7a7e6adafc5245c77b5eeb8a277323cb83fed898f4d3a284e3249ce719bc6c02d2b2e44abe307d1058d6ac462340f1bd704e743730fca065340f6d50fd3ce6587d063d58ff8c55cc04474bb2cff49f74eb6514346b8f63bc340d25400aeb8cf1d26d712ea68f5bb36c1cb99169b20e1ed63d905c4954cae91bb68b0e5fd98332b13c1a997d61c9121946ac1493c8f1202662631ccb9a9fcbc154c45777deecfd5c39aa09eae16c458a7109f7b8d03f934b1108a32a59b0b31e7243dae5839bfbbb3a3adb2c1b46d4719466b6082af8ab5b73f4cbe241bc4eae32a456006dd29369e92ec5b52379fddca4e323e648476ac402fa873cfb50fcf558471738aac134b89fe990e85e0380db12a643fb928751452c859e1b396cb07b6af19d1d38142eb299f666674f346edf3c822b4db70469051d375ac3a5f48d0615b1224a612d0abe283d673a705f899676ae6177b68218742a4dbd2b91418f19a7accdfbce86ddd0e4abab246f1c8d2122d122799f378df0590367d5417c3a87681323f2ce71bf32b0e2fca48db7963d4ec", 0x1000}, {&(0x7f0000001980)="3363acec7bf636a4266fae612c59b710d714d3aa9d654477acbaae5f20b28b5889dabfbadc794e6984ab7bb7c139b30aaa570f406b998ecc7a7a70afc2749cb0f2f70454285277a8213cdcf448a0035c2b0ef6afe9aefca39f1fc6f1c2982d43087e1db773146ea5ed38c085e3a4a280fabba4f67511291c5ecf44364e3e88572d323466465303ff398f731005cb83d48b2652eeb08dc1a7390379af18a05889384658420f65129718251dcc36af3a1bf1779220982c345014fa93fa22b990f1c49333e99cc8b7757a10c217dddafe50a22fc96df0", 0xd5}, {&(0x7f0000001a80)="158ccddf521c4412f8a1accb97da08ec6e40fa1ce19eadee5920a30d4a3b1a85261c50133be3674e47be1fdb6e813e944f2fb95aa9fc1e353bba340fc20beefc00e6b4221c5958000826ca25ede31d3ab36ffb80b421604328a60097ccc7e24424ba6c4651d7d5d3ec98bae945302fdb7a0c36d960a77135e41d0ac6fdc028943a42d047b591dc936e2e741ce0b567a59f5c34123639151b12de42b75712c2856946e0d1255f31a67a2e6db480a7b6c5288fb76973fc96c217e9e6d814f814b76d81a9ba7c664d335f41dd913b6fb2dd6b23e6a3f579a636b36fe5eb2e6bb74a36f6ef6bfe7514bf929db7c1c90cfbea5fe450176b96", 0xf6}, {&(0x7f0000001b80)="0f1d3282", 0x4}], 0x7}}], 0x4, 0x4008000) sendmmsg$inet6(r1, &(0x7f00000024c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[], 0x1e8}}, {{&(0x7f0000001d40)={0xa, 0x4e22, 0x0, @empty, 0x89d}, 0x1c, 0x0}}, {{0x0, 0x0, 0x0}}], 0x3, 0x0) r5 = geteuid() sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000020c0)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002080)={&(0x7f0000001f00)={0x160, 0x15, 0x8, 0x70bd2b, 0x25dfdbfb, {0x17}, [@typed={0x44, 0x96, 0x0, 0x0, @binary="8ddc4546f0e0b74f32b519087a793a8ad7426abd8b922ce7bb0c46218eaa42d600520b86b7f19d1f7a6cd7b87e74603abdc8294dc10b410c083e1bfad223a282"}, @generic="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", @typed={0x8, 0x5b, 0x0, 0x0, @uid=r5}]}, 0x160}, 0x1, 0x0, 0x0, 0x24008001}, 0x10) r6 = fcntl$dupfd(r2, 0x406, r2) setsockopt$inet6_udp_int(r6, 0x11, 0x65, &(0x7f0000001640)=0x9, 0x4) 02:34:41 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r0, 0x400c620e, 0x0) write$P9_RMKDIR(r0, &(0x7f0000000000)={0x14, 0x49, 0x1, {0x4, 0x3, 0x7}}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:34:41 executing program 6: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f0000000100)="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") signalfd(0xffffffffffffffff, &(0x7f00000000c0)={[0x58ce]}, 0x8) ioctl$F2FS_IOC_RESERVE_COMPRESS_BLOCKS(0xffffffffffffffff, 0x8008f513, &(0x7f0000000080)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) read$eventfd(r2, &(0x7f0000000040), 0x8) getpeername$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000240)=0x14) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/ipc\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) 02:34:41 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:34:41 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0xde5eb54a487a8572, r1) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pkey_mprotect(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x2000000, r1) ioctl$sock_SIOCGIFVLAN_SET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8982, &(0x7f0000000000)={0x2, 'ip6gretap0\x00', {0x6}, 0xffff}) 02:34:41 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:34:41 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x10, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:34:41 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2e, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:34:41 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:34:41 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x5, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1232.114021] hpet: Lost 1 RTC interrupts [ 1244.357585] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1250.626845] hpet: Lost 1 RTC interrupts 02:35:05 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xee, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:35:05 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:35:05 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000000)=[{0x2, 0x0, 0x0, 0x9}, {0x6, 0x0, 0x0, 0x81}]}, 0x10) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000080)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) ioctl$BTRFS_IOC_DEFRAG_RANGE(r1, 0x40309410, &(0x7f0000000100)={0xef2, 0x1000, 0x1, 0x200, 0x1, [0x89, 0x0, 0x7ee, 0xff]}) 02:35:05 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = accept$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000040)=0x14) ioctl$sock_SIOCSIFVLAN_SET_VLAN_FLAG_CMD(r1, 0x8983, &(0x7f0000000080)={0x7, 'caif0\x00', {0x1ff}}) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:35:05 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:35:05 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/drivers\x00', 0x0, 0x0) r2 = signalfd4(r0, &(0x7f0000000080)={[0x2]}, 0x8, 0x800) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:35:05 executing program 6: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) accept4$inet6(r0, &(0x7f00000001c0), &(0x7f0000000200)=0x1c, 0x100000) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:35:05 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xb00, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:35:05 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:35:05 executing program 5: getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000100)={{{@in=@remote, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@private1}}, &(0x7f0000000200)=0xe8) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x2d, &(0x7f0000000380)={0x401, {{0x2, 0x4e24, @local}}}, 0x88) sendmsg$ETHTOOL_MSG_PAUSE_SET(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000300)={&(0x7f0000000440)=ANY=[@ANYBLOB="88000000", @ANYRES16=0x0, @ANYBLOB="200028bd7000fbdbdf251600000005000200000000005c00018008000300020000001400020073697430000000000000000000000000140002007465616d5f736c6176655f300000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=r0, @ANYBLOB="05000200010000000500030001000000fa38b1c37c8c68f8587a65b0ddf91571f6774b4ed4b6b02d7c486d2ddd6163da075288ef6f990b6ba65db05eb449374493ee070e8bd7b730c6f439d20ec79843d540d52284651fe7ec2288dfaea803980f75b7a0284b60696de846cbf4059b78df85820d0d2736ea328f73761e9fb3eed3567bfb63f027cf72534b978cad54db3816ab6fb5a050cca3dc02be9c5eb469d9d9c0354af500aa6f5c38e39422744bb1c318d0472c19d81ff522972b4888a07f0000"], 0x88}, 0x1, 0x0, 0x0, 0x20008840}, 0x4810) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) sendmsg$MPTCP_PM_CMD_GET_ADDR(r1, &(0x7f00000002c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)={0x88, 0x0, 0x10, 0x70bd27, 0x25dfdbfe, {}, [@MPTCP_PM_ATTR_ADDR={0x30, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @loopback}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @local}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}]}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x8}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x7}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_SUBFLOWS={0x8, 0x3, 0x6}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}]}, 0x88}, 0x1, 0x0, 0x0, 0x40}, 0x24004000) r2 = signalfd(0xffffffffffffffff, &(0x7f0000000000)={[0x18b]}, 0x8) io_uring_register$IORING_REGISTER_FILES(r2, 0x2, &(0x7f0000000040)=[0xffffffffffffffff], 0x1) pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r3, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') pkey_mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0xffffffffffffffff) 02:35:05 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x107, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:35:05 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) acct(&(0x7f0000000080)='./file0\x00') setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) umount2(&(0x7f0000000000)='./file0\x00', 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x200000, 0x4, 0x15}, 0x18) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r0, 0x40047211, &(0x7f0000000140)=0x2) 02:35:05 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x162, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:35:06 executing program 1: r0 = openat$cgroup_type(0xffffffffffffffff, &(0x7f0000000000), 0x2, 0x0) pwritev2(r0, &(0x7f0000001300)=[{&(0x7f0000000040)="438f1c", 0x3}, {&(0x7f0000000080)="0662315cae1984db753a89b13463bf99", 0x10}, {&(0x7f00000000c0)="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", 0x1000}, {&(0x7f00000010c0)="3fc03f502e974e7bddb835d1061b3cde94439348f6f7ff7c5ed9704b7fcc5a1ebf92c413e50a6d3a436968a197a28f7d31cd2825b8ae19cec1d684ec2e0cf6930d0f6bef7e3c4f0c6ff8c94bfd680c7e9f7cc655b566", 0x56}, {&(0x7f0000001140)="5c755beec5f9b2f2ba6d5aaf08bbda201002a0e9ba76dee485dfb6a6f2ca1bfed71dbf9348d20e7a04decca87618e943fea953812a2318d7d9be35bfe9ecc2431d9302448b8690c27726b73ef43ce483f994d2a75b2471b1bee0e66deb31bd0293b329ebacd9b97dce6da9153274ffd7f6aef3dd389c95d4a1b34c0d6dc8de9278004af0bc2318ed6d7020019262c13c176585ef51c1cbe516efa25390b736a0cb72b95d9e33806812dccceb8109b85a843ba57e73f8d4f1531b0e02b6cf8c9c53e80d4361", 0xc5}, {&(0x7f0000001240)="dc0d4059d56f429eb072186824cb15a4d90b6e066b9701dd542411dd6a89419c8f2ecaabf9bfaf862a91273b60c4418a97a7b1994c46be5171a76da09974ee9afab86be274d0b29b69f56ff498e681cf6bbbd7fb9e79fe1bd169c05484b3f2f9edacb8fe2276cc26d29eabdba8363a7fed00a4c8fcc47466eed148cf0b1e1810a1f4514b098912", 0x87}], 0x0, 0x4, 0x0, 0x15) ioctl$F2FS_IOC_DEFRAGMENT(r0, 0xc010f508, &(0x7f0000001380)={0x7, 0x8}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f00000014c0)={0x0, 0x9, 0xfffffffc, 0x9}) r3 = syz_open_dev$vcsu(&(0x7f0000001440), 0x1, 0x100) write$binfmt_elf64(r3, &(0x7f0000001480)=ANY=[@ANYRESHEX, @ANYRES16=r0, @ANYRES64], 0x603) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) io_uring_register$IORING_REGISTER_PERSONALITY(r1, 0x9, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_STATUS64(r1, 0x80605414, &(0x7f00000013c0)) 02:35:06 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:35:06 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x1020, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:35:06 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f0000000040)=@random={'security.', 'trusted.overlay.metacopy\x00'}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0xffffffff, 0x6, 0x2, 0x0, 0x20, 0x4, 0xc7}, 0x1c) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0xa3d8, 0x3, 0x0, 0x8}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r1, 0x400c620e, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x4, 0x9150, r1, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) getsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000140), &(0x7f0000000180)=0x4) [ 1268.969241] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:35:30 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x9, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:35:30 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x28d, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:35:30 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x206400, 0x0) fcntl$dupfd(r0, 0x0, r1) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000100)=[r0, r2], 0x2) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x44, 0x7d, 0x2, {0x0, 0x3d, 0x0, 0x2, {0x4, 0x3, 0x8}, 0x1000000, 0x80000001, 0x215, 0x5, 0x7, '+@}%{^{', 0x1, '\x00', 0x1, '\x00', 0x1, '\x00'}}, 0x44) 02:35:30 executing program 6: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f0000000040)=@random={'security.', 'trusted.overlay.metacopy\x00'}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000000c0)=@req3={0xffffffff, 0x6, 0x2, 0x0, 0x20, 0x4, 0xc7}, 0x1c) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0xa3d8, 0x3, 0x0, 0x8}) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r1, 0x400c620e, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x4, 0x9150, r1, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) getsockopt$sock_int(r3, 0x1, 0xf, &(0x7f0000000140), &(0x7f0000000180)=0x4) 02:35:30 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:35:30 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, r0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f00000000c0)={0x0, r0, 0x200, 0x8, 0xfffffffffffffff9, 0x1}) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f00000001c0)="201900d07642da921fd6ff11430c6c6b8c0ac5060048065e24ecf3bb8ce311427ac446646b66cda5c391a00fbccd665cde721d7307fdcb6b969016edfcfc7632c1f3819bab23a38c40d2318820e65ef0262c", 0x52, 0x4e0}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000140)) 02:35:30 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2000004, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='system.advise\x00') pkey_mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x100000d, 0xffffffffffffffff) 02:35:30 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:35:30 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:35:30 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x300, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1277.810612] EXT4-fs error (device loop1): ext4_orphan_get:1413: comm syz-executor.1: bad orphan inode 301979167 [ 1277.815080] EXT4-fs (loop1): mounted filesystem without journal. Opts: ,errors=continue 02:35:30 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x2000000, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r1, 0x400c620e, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000000000)={@dev}, &(0x7f0000000040)=0x14) 02:35:30 executing program 6: r0 = socket$nl_audit(0x10, 0x3, 0x9) sendmsg$sock(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x20000000) 02:35:30 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) preadv(r0, &(0x7f0000002500)=[{&(0x7f0000000080)=""/165, 0xa5}, {&(0x7f0000000280)=""/154, 0x9a}, {&(0x7f0000000340)=""/245, 0xf5}, {&(0x7f0000000440)=""/192, 0xc0}, {&(0x7f0000000500)=""/4096, 0x1000}, {&(0x7f0000001500)=""/4096, 0x1000}], 0x6, 0x4, 0x1) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 1277.933392] Zero length message leads to an empty skb 02:35:30 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x31d, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:35:30 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) write(r1, &(0x7f0000000000)="be47a3edac70498f7d698b04f7c3e392218cf2cc413d52cfab697fb787795704a6a89b10fac16afe5efda017f736e3c9804875bac2f2a98450994105ebd3b3cf3099227cb5ca3238d0353f727694b2b8caa9583340d1d4e7625e1980a9bf96bcd0ebaeaf", 0x64) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:35:30 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:35:30 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) listen(r0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @remote, 0xfffffffc}, 0x1c) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1a, &(0x7f0000000140)="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", 0x1000) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x4e21, 0x2, @loopback, 0x20000007}, 0x1c) dup2(r0, r1) syz_emit_ethernet(0x6f, &(0x7f0000000080)={@local, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x61, 0x0, 0x6000, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x4d, 0x0, @gue={{0x2}, "f9c078f101d1dc9201c78594b498501f09914562bad8b2ac3acfa8f1077155d2f6f0d3b772848d9c2710d907412ee514502b441b70d5c5e5764c3ead5d"}}}}}}, 0x0) 02:35:30 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2010, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:35:30 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$inet(r0, &(0x7f0000002680)={&(0x7f0000000100)={0x2, 0x4e24, @remote}, 0x10, &(0x7f00000025c0)=[{&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="cc34b5384ba6890af565ba0c89ff9fd875a5a3bb5c95e0d2d89b999dc92d67702b10a74e7a0081d82a10c3b0ff0b3ca0e633f37583a14d63f912bd882daad98557d147eb9abd48bd845171aff6a0961cd2a4275b38c7264f44c7bb84b76c308d6549416d6cca386fba7f976f674f37792ee0da2201183db87abd708f8a1e02031ddff1e9bf75ba07c3aab25f5f98bba84705362f61e51a23455789b8c927a765133033ffaefa36698ad01d3ffee93713ac83dbdb45dabb1d0e26ee58850fe691cc7d3b5089ac22f0aeaa542e282d7ac6e714ab242b204e50ad049d84a336ec0ed0ace30a22b01c37a68061d2688129dd19b0d32ddf415414396a6b7e1968eb9dc5d9f0454474677456734047dd73d7d9dc50f505dea9e1e2263ff40c2268c37e6d0ce0549bda93933d0b5be4dd5cdf5c9ee4626862a85e0244487f5feded4cc1668d584b048b8c8ddc896ed13128b707127be3ed4ea66880b3d442e7c9a09f822569204fb497f460db6fd79691a9e42cd324ff7f3f970dfb64dcd8f778eaf9b6ba63b44bc62be64ff0ff85ab360eb2523be58a96c361a9808b26e73eba86b8315370a303da6ea103592512a73164448b402d26920f4b6d7db19c41a385ae95d1bd31814876e6ee570b05519becdbce461e28b479d90764c910557ddc57bd1ea660eade94eb407a16e082ca7476d119bb9ef817d57356b66e37b94ee66d2ac0a4a61ce00186d38413b86fbec554e62421fbc59940ffc46746decf92a6f43586798e4ee1625760d7efe510d48c892e7d346a644bc72f6b7561f4bff1412c73785fb87dacc1dec76605f053f372084da492f0f15f96a8888e76d4cebe82416c7a843bc8b42e94d7b05de56de1cce769781527c9247ce49469ccfb740da1c4f91a103c7b72797fc06f380b288dd703b48ae0eaadd838ec138ee061ad87b2550f930a2382d125540b1e2ed1fcd6dede50a38bd67bcbdbcb01bee6ca14a9c91461f1a9d5819b935c48bb27fd490ca8f2bd28c3b198548360b49f68157b95dcbaeedeeb25101274ef930e2773c2b5dc74136566ac971a3f790563c06d6a3b949c1d372decd1f8c6d0a9c0413e55f84ccfa43d6d2782f825dc42f1933aa7c844d43b77f09f371623ed21b415f033fdbbd36ffc6d8e3a720c82a6b184f4839577c3753c4ee14d6e6d784ca21be155925ac25650910f8cab8c0333dc9f6f5bd10ddbf3eb696ce136a40a0ffde4e915159cf6184656d430ce92d875b9d79cd9790334abe8e521071dc0577828a6d85659eafda455b8f49ee3d421dec3b4808b877ac44f75f06d42f8dcc379a06b6ad07eb9db0d16a68507701fccbd8bd20214e4a07e7ed3c8f4f6ca7f72bf619955a2ab3b73f88dc5cdd400da2b6a431f03d5408492ec73e22666e41aae470390679a26cbea6d4119d1b0a7d5d69813994e5b0070632c44b9d6509bf5ae1b08bce580126cf8e0a9775b136408113d2772dd80f87efb6575fb9fa9cb6e0cca99fc988b43b41fa281961954b0ef2a51ebc56b6e0f5578f2165d586cce5e4cfdbc9207bef80b48dd31da46f823e1c32ebbdad52f3cff8483faf7aef08e31608746950f2e2126f3ff15e72f052236697155dbb47cbc0ad17c91d5a5b59325f2b0659fe871660331b2df524a6ccf4d2bccd91c66c998865d76030e36a160c19c88e3b30774fd90c868e266e1cdd8a06552f075392853bf255591526e3a3604f67d1a713fe3e0cb0af793fa911972af14db8b5d0e62436f348d09ca40404d809b9aa34f4890ac43391dcc5e8ffe9fd12e3d27653def4d7cda7e77649ca2d6fbe1f5c6e4962539dfc006b81b34a12b66f66d01d3d18f4926cde98a7ef8f6a6c150cd6425bbea28eb3b24282793f32c2b23ac33ae772d68fda3fe8da7a72bc89f8338795f87214a8469de59c3f472ac4863b0bd29fc425294287f0b1dac3ebef38b846ffa2fce7c0ca4c2f1227aa6166a73511a803cd772f5626bf0b41e45280f581d86460eb2379079ceea1f0f18c215cba43559237de82a796e00c09fb8d9479acde8ba72f8245adcae08129be22d63f57828530fd981d983b4d24e471871e2b06237d98a4ec449d86bac65823ccc0f7ab054b74bb9e71576f2ddb402afd9c9273c8264b4684c41138a46fe6823156f5f5e4f24dad00b7193af0d39a088db634acea89136bba82889f124fd6c0cc1a2b86dc7c9f97bc6b85d94cfac11ff219d25570656757ccabd1f5bae5853f9d1d12b94ed68fafc6ebbd7af064f8e780ddb72263c9b499ef8526be4175e584f019e3896d2c7ba8891aeb1ae972f1390675b636b6ca2aa0eae4a75d1f766301046d030b2f64d7a284c78711abd90cb451522350d4db30c7f8c9298e4020a09cf35536144e3f1b41e07b083902b428cde760e1387363c171c883107aa4946b9c29a9d7555a7bdeaaef8a8ded7a5b70329138deb3b0d3782300075d8999b02546a4fda54063deb55475896c66940521b1561bebfdf4f3c28b1bc19c756452721d1fd04960159e82d4ceeaab716987d9fc9e5b1f843125698d860d4da7615ef06792940b53b44e1ba897bce7e1b439337a211b71fd3df06add947d0aff08e61c583ae3578b1b515b9b9ecff4b2826ef98a17a6d6ccfe335f9a740a8d8a40d964d2d493b189a8c798b961bd3d1e249b4012e4ae393fe7b69edf46752b569c9ccd13ef65ec8643f3e31f4347c340050ef5dd7d1979d95d7b238a213889c99415183f87038cf68bcc5e0747d3090268baa36d16fb88bdaa36a12ffa3718edc531fb43926d9bed0b1327f69b1b0b113c7f58578b62622e54fd78b67ba9d6acffa1f5e199387de06bc4a0ff42662e1c94eb9487d7aa7f8da4c4c9d8dd7d264b089506add2b2c62f43973ba11db3587c717e4e0fa1897d27ebccbe152a7ca58c029335fcc2cda2a209721301ab1e488adc45d08785cd9a2ec14cf307fd3533a2b81c5cf03b18c67748a2ac094eebec38da590109e4dd672fb15697d06faff8991268e13ae10dacbbbf3be050419d357e6ddae1e2990940ac02cc23534bfa5c4f6e0b5c0c2d003515bc774e5b3acc4e68415dacbf3db1cb5cfbbb4bbfcb154d8e359a4e92ea8fd2c8afdd2aea65eeb38a3e8d0c991d3e35f0b030563d9c7e814a884e3f93770a74f5ea25ef3a4ad541f260c66af1c948a452b735b412eb42682a879f806cc48e6d81833c9ffd8e02bb7285fc565733cc8942cb9c9c99c86be46e4d357897dd0dbebdccc016ba53d5a6290f3162fe0ec3eb49831508f4242e3e0d00ed0a77a988eec7a3ca67ad9fa85a2fe772c5c725a181638581952308f8a7d23af19c75753b0e0e0d86916881699bd7a7d9cdb31c2716cb7b1b3dc7dadb61408b4c6620ea3e4d7cbe343b56cb0b115220fc657f960091dde128b9665d9f3496cd6e428476a46cf4ea1e64cb0023dc007891858d27af0d73062754e2c835cb575e6db5e7a2954cd6be4746ea7fbfc7cfed2f145639c15cd0fc0f77aee4e378f453936fd12cceb7eec858e9c7fad98cb5d5c8511441b04a6cbc78f535af663bee8f3dea5a67a5cee846aa54f75abe827d398d6cfd864e67cb0cb6b6c13607cc5f979e2bed5ac0b3150f19a3e46cc17e5d28e0928f8365bb68f46df010e16cc37b6afa84f55baab0f65cbb0ba40f3f4f6a8c694485ea0ba733c51c80e357665549c1ed545f0fa391ed382670e79937153cbddf79642fe4b8b2c2d76f6ed5b7b4a46cbe77a065d2565a52b6bc4b7b3347d2bed94c17aa575639397c5955d3709723e556e9384d38a29b40043a6474a61a00ecade5c84210d33e31ed1661f043c6842cd591c0a5fe265625a22093cea46e95a05f67aac519b4fe2d4627b68a7858ea38de6a0563d67d1c0cdc6fc93c2a61d6df458608ea7d7acaaaebac25b24718fab131d48e2476c5f6d40ac42ff1fdce8d4c2bfd181c2302baa3926a100ca84cc8077810578d590717a837912cafe9820aec9437391b90c1635565574052ee0bf6ab58741989f85ba59ee3a83af6335f3431d5fc4e3df00d782c00cdf6e67769c70a0cc60914579d3a70651a0ee612d8db362834981b98e65d79d4b039438d95527236675661eea27572e981c3448bd0b3d5cfac8664512be97f5baae079b93058cfc950f590892f09f3a119e90e2d908e96bb2e1ed9ceac281ce537336d2c78450279235b03501ed0b4d345a7cb9c1b7e5dfa88ade7bcb991615379fb6f2ff4f9d2168041d90296633268ace2b1abda79d6ae5df005f5b46e34c642cd5860c13f3511ca0cad576264d91fa6bc598e57918c46cefc2d31f9dc1e38ed9c65cd551ceaf2139fad58f9c101fa7ce9dfd47839f72bde5a18ea3a03171fd6861028dde5ae5c756407d37f89cc3f2d4219efa3e1bf0c7cb5d9d455081e942957912211ee622c2063f40ce8541270f828a578e4a354770a4c578c12a9e127264016b262707962059f58ceadf5771db92d0ac1dace3314b5fabc2d47a6e372fa732007f73bbe6ac50831254778948b0fba1fb913bcc2044f3af147ccf4167494715f5367526bfb1a3db26bbbe44e9dccc07a726936147bed434fcc02e1a824421b5f8040882cd59afe804e170c582daee52eb702b3c32e2e2aa93f3bdfef8bbe706358cfbfd0bfd6ab38a88104627f2ab7636271addd1aea1c2d70859441ff71a6f0101274671e0764ea43881f8e4eccbc40d453057c429cd8b96257270739a1075238bea1185121323095f636df76d902b071ffbd3b34556fd1729e1a756864ef9922da5523838aa13c9fcb3912e2b41b556faf5e0a5f343c8706c79bf67c9104c0f230fc2b64ce87a55e93bae18243d639a8cd5f04a09b21202a31f36ace6e0c0b16b87626b73e4fe317c2e69a9bade0a68f3c3901bab903083e9d73796271e63189801dc9981d63829e823d5920837a84382ead8aa08325c6a8c925b90ed7104e1fd4db6c8bc25f21f24185db39e786a730342647d96c0f4fac278668030e18ae6f1fd27d1413ceb3d8393f710974bcadf3d7567afeceb079d4d0ade999b297e3dba774270075ed6c4c413a7787a74d330b8e606eefcbff21a3e4f962f84a3bec35ce351bfc9475eb4fd5998fb42c62a32ca2855f66412737e5043b0d1234217371a134cf0530f2b733e7773a1c24ce6df0b466abe28fb7d3266be961f07f29d8aa7c8a501dfee19580c7d986736660d9392c3817f9cee761ef51bacab81863ff078e6bab8a14a304afa3fe32981077fbaf086772936d0824482fe17ab3e34f02b86dae55321ead0ff092afe4719b276f262cd484c3e464ef953873648f70aa3cf6a8980f903febf4749e3043622bd1d228de07f022768e8c799934f8c5ad179e9e7be2811cd19d249714cc0177bd2dd1b22be1e6cc4f051670cc4fb4057ac40015564351853c811c25c91f3ba65a2d0a4d11cbf01443b5b97f2df96eb9a306cd7383bb4609de4c3d48b03d1711ed68f2fee991533a274da5171fb5154e348fbb62ec8345261179dfb8f966aa37d9a783f52f8e5fb9216e733cd83976abb314de70652b84a35779fb5b35ea283eacbffe3bafe8dcfcf6a843fca7df03377ab8a997ea3489493c0f8d68163131a3cac8d5fec4c99000e9f625a2ca2966a777a9aad6042bfb0d44a997ef8132c43edf38aeb21677fd997e95b3d78c892c75865c19a0124849535b99c3835029f5b865aa42fa45bd48aab15016367808fea17e36e88aaef4bf2e7269964f6033c0a6b64396dac78dad3a1fd9dbc20a9e3e836dfea751dfe579f42fc1a398be1570378ffefc3ec2d0e3e4a", 0x1000}, {&(0x7f0000002280)="55b821e02b6a83cef187e47c26375a7faf4f93346404a46f1a9db84a2092de864cf2830253a8bd802c166a56708db15ee5690be8a0ae28392c9578203d68b5ea066d3005ccfbd733b69568ec5a68daab4775fb12df8f6206ce0d40b4092791de044a8d2626a88f5cc60bbd57162d1e8298637832f9a1de54c1d39aaca6063f48193235375c54e3a872393ced0f3912a0d29f4359b65d59a6f3cb01e7ab51", 0x9e}, {&(0x7f0000000140)="8f3234358b7e31b3c7695ec7b04167ba112fc82e66f9535d83a32084acd79154e2ad21e1c64b1d155f1376d4dc60fca34ba911f2969e5e0f211882c3", 0x3c}, {&(0x7f0000002340)="630daf7b3f5b90c04791cbfbbe72fca6e61ef1fc9aacd14d42664b", 0x1b}, {&(0x7f0000002380)="f66dc0c1294e0d1bce5a4d6c26123c0af77c815aee449d498d10ae718a0be40efff412fedced05ddee8b2e42af8664f3db50d20d09ffd530c4df3f4a822f46c1f5bd23e0aa6295e1af7d9e61adcbe84f2a117cf92895a79da0a94f7696ac27b500cc8bdd6096434b679b41836dde98cdfb1de2d6bbabfdb6d77df5db3f5fcbf17f8f7de9b85c7bf5570c1df526fbc34402", 0x91}, {&(0x7f0000002440)="d6b3d1d59336a05734ce03f66ce023690aff8b044560f8ab15365f4a06305fdf131dff356e3830419638c84cef0ce5ab44a774b8ff78f7a51736e07d8259f567fceacd6e253769af5f211536368c9e3ab5208c8c43ffa1ced2eccd5de8632e8f509d6ec947b228c66a62e419af756f79e649615b47d371c6fc804e82ca2c6f601cb0a8b2", 0x84}, {&(0x7f0000002500)="22f6d2283d6d5ffc114406270cd137fffa6471327d73f5f74e0947523f4a9a040816508402affbf9b6f63fdebfa5e1dd96e9c52c60fb809f7ae4226185a49babac9ff87b1aed80c99eda54002b6b913034f2bce48134af1c1e11c49ae7bb8139face8e717753480f65d80f54ba3704936031afed7d4f64f988d2580aa32f84a295166463792e083c0f89a2afa9084acb08448f37dda2b4551f7ce98fed0a146d395f1f5df0290b7bed053ac68e913444ee98ac66e7", 0xb5}], 0x8, &(0x7f0000002640)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @dev={0xac, 0x14, 0x14, 0x3e}, @local}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x5}}], 0x38}, 0x4000) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/118, 0x76) 02:35:30 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x10, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:35:47 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x500, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:35:47 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/crypto\x00', 0x0, 0x0) openat(r1, &(0x7f0000000140)='./file0\x00', 0x10840, 0x8) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r2 = perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x5, 0x9, 0x80, 0x7, 0x0, 0x8, 0x2, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x8031, 0x3, 0x3, 0x1, 0xea, 0x2, 0x7ff, 0x0, 0x4, 0x0, 0x4e}, 0x0, 0xffffffffffffffff, r0, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) dup(r2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:35:47 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pkey_mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:35:47 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) close_range(r0, r0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8, 0x2000}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000000600)=[{&(0x7f0000000080)=""/61, 0x3d}, {&(0x7f00000000c0)=""/116, 0x74}, {&(0x7f0000000140)=""/202, 0xca}, {&(0x7f0000000240)=""/45, 0x2d}, {&(0x7f0000000300)=""/213, 0xd5}, {&(0x7f0000000400)=""/108, 0x6c}, {&(0x7f0000000280)=""/23, 0x17}, {&(0x7f0000000480)=""/190, 0xbe}, {&(0x7f0000000540)=""/148, 0x94}], 0x9, &(0x7f00000006c0)=[@cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x168}, 0x40000002) writev(r2, &(0x7f0000000b80)=[{&(0x7f0000000880)="a0d9c80e0aaddc1c93a4037528871eeb36a506e3537c85184574ef692a1d127600f9379a305b3664a0240e5ecd9b", 0x2e}, {&(0x7f00000008c0)="3e89878f0bd42f1dc0f74f71b5be8bfa83de867f0da0d3085cf9e7558e18ff167352c3c3159ad0f0f7a894461cec025ea636149cb56ffac70f53359497bbb294cdfe781827e16250c35a30e5cc6eec0e1daccc80acfb05a3610292e84e092a858ccabb6d570c1600eb9192b53b60653de7c49d06a949a572f00f6ebd7f1a7b5d98843a5fef5674ed1ea72aaa8d0362a111527f087c2a75eef7828cdf1760f6a3f595ffba74c07d4bd80c763a9eeb29f43844c357857f920fc00e709aa760a421ac6d0114044f177139dbd5584d71c90209074a07a7ed420dc3e5b4d46dd9fa6ee8c987e54df4", 0xe6}, {&(0x7f00000009c0)="c2e239", 0x3}, {&(0x7f0000000a00)}, {&(0x7f0000000a40)="bcba8a2732317a00a4ee6b1ac0722993b382cd46ff6da1d7b86afbd3abad38813d7156948871c6fb0816012c6db0104f17ba99ba6c91f3fbe61826e201f1a3dabd7a62c0", 0x44}, {&(0x7f0000000ac0)="120c982e63514413da1c6423080caa8ba1a8ac9897534fdfca26a6b0d39d41ce931379d22025fa9ce2d47f91e439f7883b4856ad559428ca9733825f103b89a8f95837b5119aa4eabedb040432c927a8dd33ff07d16f34a87e34e97d503c3916e266974207881dbb7be0799d3e7ee6d5c9280b6f4acd851b9d7722de6b56d9022fe2521bc5a5c3ba30ad465f997a", 0x8e}], 0x6) r5 = socket$packet(0x11, 0x2, 0x300) r6 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$sock_void(r6, 0x1, 0x1b, 0x0, 0x0) setsockopt$packet_rx_ring(r5, 0x107, 0x5, &(0x7f00000002c0)=@req={0x8000, 0x8}, 0x10) r7 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r7, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8, 0x0, 0x4}, 0x10) r8 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r8, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) r9 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r9, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) r10 = socket$packet(0x11, 0x2, 0x300) syz_usb_connect$cdc_ecm(0x0, 0x4d, &(0x7f0000000ec0)=ANY=[@ANYRESOCT=r3, @ANYRES64, @ANYRESDEC, @ANYRES16, @ANYBLOB="4a7cad0b779a87a831b8ea6e4463be7d92d8665a317bdff15e381e04c91ba8d82362e12064ec96f07090d76fac6c077b8d5a491c2f0032313c407424b87040dbfe5b9073ffa8b2f47671cabbba653d3221975bcadfa0ffd347c833052f16a6ca87000083ebe6ae41fe7a504363a54463c48c370693461d9ad9312aaba8292533298a78993caf571f0a966968b45fa21bc3e9ba5e5c18b0685536e67a353c0133447d55d9069a44e405ed69587a0c93661308", @ANYRESDEC=r9, @ANYRESDEC=r9, @ANYBLOB="8c555582786b566c742f06092bbc65fc2eb4419bfdb942ec0f72d3d1df80", @ANYRESHEX=r4, @ANYRES16=r10], 0x0) r11 = dup2(r0, r0) ioctl$HIDIOCINITREPORT(r11, 0xc0085508, 0x20000000) 02:35:47 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2e, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1294.628819] udc-core: couldn't find an available UDC or it's busy [ 1294.629823] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 02:35:47 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xedc0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:35:47 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) creat(&(0x7f0000000200)='./file0\x00', 0x2) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000080)={0x0, r2, 0x9286, 0x10000, 0xc39, 0xa6219d3}) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(r3, r0, &(0x7f0000000100)=0x9, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="60010000100001000020000000005fc1c513aa83ea33000000000000000000000000000000000000000000810000000000000000748244affff915789e13441223accb5afc95a598277e7f3a4026e17b849f081e3afec4559429a2faf130112139e5b368edbba1aac054890f903a4569c9d84a570e920347ed701a748444d38de50ae24da4fe4c13027458c61e0db310cebcc46c0b1247d5c896d8104a209934125b49ed513cf053d55cd64a", @ANYRESDEC=r0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000032000000e000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a000000000000000000000070001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002001000040000000976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"], 0x160}, 0x1, 0x0, 0x0, 0x4000011}, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x7fff, 0x6, 0x2, 0x2}) r4 = perf_event_open(&(0x7f0000000000)={0x6, 0x80, 0x5, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x7f, 0x13, 0x40, 0xf2, 0x0, 0x101, 0x0, 0xf, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x5, 0x3}, 0x2800, 0xffffffffffffff79, 0x3, 0x2, 0x3ff, 0x7bffffff, 0x3, 0x0, 0x99, 0x0, 0x4}, r5, 0x3, r4, 0x0) 02:35:47 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:35:47 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xbe, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:35:47 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=""/61, 0x3d) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) 02:35:47 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') setsockopt$inet6_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000000000)={0x1}, 0x4) 02:35:47 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x600, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:35:47 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x80000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:35:47 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x700, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1295.397072] udc-core: couldn't find an available UDC or it's busy [ 1295.397961] misc raw-gadget: fail, usb_gadget_probe_driver returned -19 [ 1310.426762] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1312.959356] hpet: Lost 4 RTC interrupts [ 1317.063397] hpet: Lost 1 RTC interrupts [ 1327.396453] hpet: Lost 1 RTC interrupts 02:36:20 executing program 6: r0 = syz_open_dev$evdev(&(0x7f00000002c0), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) writev(r1, &(0x7f0000000400)=[{&(0x7f0000000040)="327541e65557ce4263c54d58b241522f1f6ebb215a4c6d6fb5509a505d1c2efeefe9478d6b45e6a4968d91f51abf4d14e1d343f0919044bdfbb8da08f26a1cdd8aea89b8bee7414716ea33e79d1e0b0a658e4a538f31310b6cbd06669548f1038e2dbccf9eb57e19313a240ced5b9443b5a61c1a30804e0afdceee1ab9a8a34dcf9659086476ef72d746d141b475277bf2a2b2bfeb89cb6e179245aef07f750aa16dcce17aadaabca36a764aea391eae307594d8bb124a2d51bd5229240ffb29345e212197253ac47b0678fa", 0xcc}, {&(0x7f0000000140)="ed7cfe04823236f37c6dc95cf35e7d02eece63a9f9fba5695fa3cafba3638ee73a79d69548cf9a7cfed8cdf6dac07482c20b61ac1d7b178cbe1d766a1f0e7b4e1a345767989a9ababb86a94f71d12d8637c44e5b744e5a746a6adad32c58b2e6b801425cf94747544f8e445dbd642440c82bcc58bf94f6bbb3e68ed19a8b08eb62052fc40ab8210499aa8522ead3a6cddac20004836f381088e5645fe793060ede84096c1f4fc1b9ca5596349cfb253ccc22313855758228fa09fbcb12005530b2af727ca82813aeb97358b83304eda4431563341efdf0f7bba3d30234d7f7c2500e06d4", 0xe4}, {&(0x7f0000000240)="d82a5d155418d37689a97562f29968e11d99442b68ce29c8e8c47a52", 0x1c}, {&(0x7f0000000300)="cc7bfa02a10b6b1e27f27e02d7603e7939cc5e8b86f8cf9920709c7724282de4e254aa5d1e1a3f0609d34afe050e9bdb16b717d80af7a183ea99b6ec95da465a2a6eabc8b4dfd2d36e1e6ade1d12c6f5b34a2311bd90caa70d2eba7b41a3357ae99e597057442ca665454ccb0a630745f95d427f2b5ac8af31373e61d6d3488216f7f71626db0dc4ecd51ed7461619628764675ff8ded52b26d6ec487d225ed0dda7c6d980b4bc03c205fdc8cb97d86436664f58e78c4f5b493a1ea06621cae5b94024b3e303be7c1d32bb9c382b3b90695bc4a3a73f555210f809d160b6c3502efb6378aa39987dc8fa517dcad67209", 0xf0}, {&(0x7f0000000280)="658122427468b93e4f", 0x9}], 0x5) ioctl$EVIOCGSW(r2, 0x8040451b, &(0x7f0000000480)=""/22) 02:36:20 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x1f80000}}, './file0\x00'}) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) ioctl$BTRFS_IOC_START_SYNC(r2, 0x80089418, &(0x7f0000000080)) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:36:20 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:36:20 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x1000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:36:20 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xc0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:36:20 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x701, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:36:20 executing program 1: ioctl$BTRFS_IOC_BALANCE_V2(0xffffffffffffffff, 0xc4009420, &(0x7f0000000080)={0x1, 0x4, {0xffffffffffffff08, @struct={0x3, 0x1}, 0x0, 0x0, 0x2, 0x7, 0x0, 0x4, 0x10, @usage=0x6, 0x5, 0x200, [0x9, 0x2, 0x8, 0x3, 0xfb, 0x81]}, {0x10001, @usage=0xf70d, 0x0, 0x1, 0x1, 0x101, 0x401, 0x4, 0x2, @usage=0x2, 0x44, 0x80000001, [0x2, 0x6, 0x9, 0x0, 0x2, 0x101]}, {0x3, @struct={0xba9, 0x3ff}, 0x0, 0x14a3, 0x3f, 0x7, 0x2d, 0x10000, 0x73, @struct={0x0, 0x7}, 0x2, 0x8, [0x200, 0x7f, 0x80, 0x3, 0x6, 0x48]}, {0x0, 0x1861, 0x5}}) ioctl$BTRFS_IOC_SCRUB(0xffffffffffffffff, 0xc400941b, &(0x7f0000000480)={r0, 0x1, 0x4}) syz_mount_image$tmpfs(&(0x7f00000047c0), &(0x7f0000004800)='./file0\x00', 0x1, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='mask=^MAY_APPEND,hash,uid=', @ANYRESDEC, @ANYBLOB="2c61707032616973655f747970653d696d617369672c7063723db0303030303030303030303030303030303030312c66736e616d653d6d6b66736861743d407d2c00"]) 02:36:20 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f0000000000)=@random={'os2.', 'trusted.overlay.origin\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r1) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r1) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000000, r1) socket$inet_udp(0x2, 0x2, 0x0) [ 1327.754689] tmpfs: Unknown parameter 'mask' [ 1327.771945] tmpfs: Unknown parameter 'mask' 02:36:20 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xee, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:36:20 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:36:20 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x900, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:36:20 executing program 1: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f00000005c0)='fdinfo/3\x00') r1 = dup2(0xffffffffffffffff, r0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r0, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {r0}}, './file0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xfff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/keys\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x9) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) preadv(r2, &(0x7f0000001580)=[{&(0x7f00000015c0)=""/4106, 0x100a}], 0x1, 0x2, 0x0) readv(0xffffffffffffffff, &(0x7f0000001500)=[{&(0x7f0000001340)=""/215, 0xd7}], 0x1) 02:36:20 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) fcntl$setpipe(r0, 0x407, 0xfffffffffffffff8) r2 = socket$inet(0x2, 0xa, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSW2(r3, 0x402c542c, &(0x7f0000000240)={0x0, 0x0, 0x0, 0xffff, 0x0, "0489fdc1843fc745ea52a5fff7962e807836db"}) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000100)=0xff) pread64(r3, &(0x7f00000000c0)=""/12, 0xc, 0x80000001) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000140)) r4 = dup3(r2, r1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000000340)={@loopback, @private=0xa010102}, 0xc) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000580)=ANY=[@ANYBLOB="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", @ANYRES32, @ANYBLOB]) r5 = ioctl$TIOCGPTPEER(r4, 0x5441, 0xfff) ioctl$FIONREAD(r5, 0x541b, &(0x7f0000000200)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) 02:36:20 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)=@newspdinfo={0x2c, 0x24, 0x4, 0x70bd25, 0x25dfdbff, 0x7fffffff, [@XFRMA_SPD_IPV6_HTHRESH={0x6}, @XFRMA_SPD_IPV4_HTHRESH={0x6}, @XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x80) 02:36:20 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x107, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:36:20 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000000)={'rose0\x00'}) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:36:20 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa00, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:36:20 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, @perf_config_ext={0xbc, 0x99}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:36:20 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:36:20 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:36:20 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x16c, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:36:20 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb00, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:36:20 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x100000001, 0x4102, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80, 0x3}, 0x0, 0x20000000000000, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:36:20 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x28d, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:36:20 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:36:20 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1020, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:36:20 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x300, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1333.172432] hpet: Lost 1 RTC interrupts [ 1365.339952] hpet: Lost 1 RTC interrupts [ 1365.367989] hpet: Lost 1 RTC interrupts [ 1368.062659] kmemleak: 697 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1372.740075] hpet: Lost 1 RTC interrupts 02:37:09 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@random={'system.', '.(]{$\'--\x00'}) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, r1) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r1) pkey_mprotect(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x9, r1) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) ioctl$sock_inet_SIOCSIFDSTADDR(r2, 0x8918, &(0x7f0000000000)={'hsr0\x00', {0x2, 0x0, @remote}}) 02:37:09 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:37:09 executing program 1: sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, 0x0, 0x450745c438580058) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000040)={0xffffffffffffffff, 0x2, 0x0, 0x100}) r0 = syz_open_dev$vcsa(&(0x7f0000000140), 0xe11, 0x4000) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000240)={'wg2\x00'}) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0xa, 0x10010, r0, 0x96c02000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)={0x1c, 0x1d, 0xc21, 0x0, 0x0, {0x4, 0x0, 0x2}, [@typed={0x8, 0x0, 0x0, 0x0, @u32}]}, 0x1c}}, 0x0) 02:37:09 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x7000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:37:09 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:37:09 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x31d, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:37:09 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r1, 0x400c620e, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x96, 0xff, 0x9, 0x8b, 0x0, 0xb50d, 0x300, 0xe, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1ff, 0x4, @perf_config_ext={0x0, 0x6}, 0x40ddfc36f739762f, 0x1, 0xfffffffd, 0x2, 0x1000, 0xbf87, 0x1, 0x0, 0x1, 0x0, 0x86d4}, r0, 0xa, r1, 0x718b1cd162e68f54) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000280)='./file0\x00', 0x2, 0x4, &(0x7f00000005c0)=[{&(0x7f00000002c0), 0x0, 0x5}, {&(0x7f0000000300)="faabefb9ec51ac92abb7070cb11d8a4e599966a68064e4e18ee568871d33288046dcb1b58e69fee889862ea8df1a770454d5f7ed0a1a019da4fc95d5c357b7f0ba9fc1fbe50c1ff2b10b1792144241377a64d053155e6b78e83a6e1d4c7ecbb7df6de7748590a0a713e827235395fb3dca7b8f22f038c48140582f53334d19aabdf5a940827cdfb52c82a643b61f264bd5fefe849b0eb0e9afd6c5984617e815cfd13f349cb12f13d47dce473eb4899824a17b1b06d4ec579c3518170eedabe2ecce80162715c862117ac4dc30875a098e", 0xd1, 0x1ff}, {&(0x7f0000000400)="3fca8fe1aa0c4bb5ae6aa231df201cff213d0921f74815ec7c1499460df97613af7a51e38bd4b98772246de934b5b732794f55c17c28b12e6de8d06dc520ffe8e80730d100bb509c7031be5c3cd8342d7c380c11f4bef117433a5838781ec56736e7075e95827d006fbccd239b78b1dd44e823326bbe7188c403894168632a5c2751c4e12d921dfb23713fed638f4f83f2846540ebd4165fc5e47d749690d68486aacf5b17bc1f663293eb6d946114ac627ca799fed5da798f07575ebcbeb6041be78ba3fb72a7973ee2efb7a1ca73f290c4071ea879d145b002a07fcb20c15c587920a3a92c2293", 0xe8, 0x401}, {&(0x7f0000000500)="412b72991ca39742f5328899387abea0c07bc6f69fedcf4e88f52614a4ca0fafe25b7f1f74de64f6308b9dfdb5f31d5a02dc51c8dcc99f52bf7f8990998c45e8d97d0012bbc55c92e503cd682931660cbc23ee546a4d05db5a2900290de49091eaf59fa5677b950f512557c70c4b03a5f3807cc6c56deeb77e8f9f830ef648c10d1e8b81c5d7ecb85d5b", 0x8a, 0x4}], 0x1900000, &(0x7f0000000640)={[{@dmode={'dmode', 0x3d, 0xfff}}, {@check_relaxed}, {@dmode={'dmode', 0x3d, 0x8}}, {@map_acorn}, {@overriderock}, {@session={'session', 0x3d, 0x4b}}, {@sbsector={'sbsector', 0x3d, 0x7}}], [{@smackfsdef={'smackfsdef', 0x3d, '\x00'}}, {@permit_directio}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@seclabel}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}, {@measure}, {@uid_lt}]}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x8010, r1, 0x98f85000) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:37:09 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1d03, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:37:09 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x500, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:37:09 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:37:09 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x10000000, 0x4000, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={&(0x7f00000000c0), 0xc}, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x6, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'veth1_to_team\x00'}) rmdir(&(0x7f0000000a00)='./file0\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000980), &(0x7f00000009c0)=0xc) r1 = syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0xfc9, 0x8, &(0x7f00000007c0)=[{&(0x7f0000000140)="2b87b494d748131e1956d3fc033999a96f0a80239cb5610012fc031ff1ef1621ab4cb249f3026c8bc69921874eec34c45bcadd6d00d321", 0x37, 0x6}, {&(0x7f0000000280)="a5593f1efb42399ffdb67cd97bc9f11f5a11565ff871fae82a41a5ea7f0df766751d2fa6ece6ab9e37aa2ad1fc648e934f0726d8ffd9da45a1ad956415cceeecc7578d1af7d0a1542f232ed0f4cad6078df9db15b963dccf43a0387083b70b54af15a2bd6633f6213912adda722e8b3c853b5f920b80cc0df9d7739e22f859e6886960448697cc3aa5429404aa3844b7bf02", 0x92, 0xfff}, {&(0x7f0000000340)="d85e1ba506b59feb148a55125a8a4f80ba6c01656e1dffdd548d7a04a982da543624400a7f401203642596df2e14f2afb9fbcfc768644e8b95d4ba7032721348263a648ded2e384fd7851533eedbb9c81e4706c5e57093e771b9a10171910b0fd4906a485c0bbf4520a1c9255e2e3512d297ad201740045ca4885b84eaf3348a90f4ac32ca8fa941dd8b7d149fbf4f0f975f3618061d03de6157b5fbfeebb2064ae90191f4599767926a162d18f38db9cec2bf4e14c027e1478f", 0xba, 0x7}, {&(0x7f0000000400)="9bc26107305ad451ec304f30119ed0c37565c7e89882eb29a31fed2cb47a398de25bae364ba11bd33abd360d0efdd7932a92171875cd86b856d36f91adb7805abfca3a9a97611406bcd3054e8642607e54eec39c00f934d95aa8eea63c450152ed2e66fd2483e9c9d2d2355d3dedbb8104c99c024568f503ee6a099829df22295df11203ace2466eac3b6099d8a6a7531c5ebeadb9cee340f3af14", 0x9b, 0x100000000}, {&(0x7f00000004c0)="fae857c324a3a452362ea409f7362e5b4db4207f6debda4aa4beff7a8d43ee7f4e6b8b11395fa497090d8a5e8cf7e5cc74ffb4c100283275a0d14b13b751262f28c95091aa4ab7678ab24c28d137eec5b8b46145ff6aea4f793df275e56452f46dff45dc89c93343cce57fef658ce1bb1887b9cd", 0x74, 0x2}, {&(0x7f0000000540)="4fd16dcc3d05c729d7104fbd24d6de4b36f171eefd3d717a1bad1502d8bba362ec5f187fdf7003e77e88f8279fb5db87752596d2c8947376cd6a99a248efbfb3e3355f4373b1a3b79a0d50ca27b8ea207380786aeb398416f54a9fdf2f34b18cdd795eaf246ba6ac7b9abaa5afdabee4cd62a2a8d106e6012d21112afce9927f056ec265744da4e36d", 0x89, 0x1ff}, {&(0x7f0000000600)="8f236473d73ce53d284c262d8a64c84901b66e6e501845164c1aef3d5477fa4a54ab52cdda015fcca99216ab5134c4c219e51404c3d639d633160e2f68ef93197c3696c2103b0932acbc49739987dd921a93f985fdd5020f25c918858b108923057b92f8caa3cd380eb426775676749c985770655a64444ad786d8c9814ee886e973e941e428808d0b4da9d7dd28343782654795a504e432db2df665747125acae2c3f06514a7712ce0e904529", 0xad, 0x8001}, {&(0x7f00000006c0)="63feb9c9b3e7c0832849fd48dbf59dcc5abafa7d7ea1f27703ce2eafb58c555851b280aced2c0c44b670917725f1f25e034f0a4b52665b18a4979d3c40331becbe002760b13e4910d3f3325f666e817e3d1684ac46e4364388cb138c48e85da10fb773868a14e80c6892e604fcd7635306b020e544cf607ed5eb5c5858351449ad9b2c436abd52a4512380c79ee3e803c9e9eb1987ee6015194861f0307e1ad35fadd6fef27717a37e14c075e0aea57c42eeea6f6ed784069dcd1184cafe84dcdd2ddda6bd", 0xc5, 0x100000000}], 0x800, &(0x7f0000000880)={[{@iocharset={'iocharset', 0x3d, 'iso8859-15'}}, {@hide}, {@session={'session', 0x3d, 0x3b}}, {@session={'session', 0x3d, 0x4c}}, {@overriderock}, {@cruft}], [{@context={'context', 0x3d, 'root'}}, {@mask={'mask', 0x3d, 'MAY_READ'}}, {@rootcontext={'rootcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@dont_measure}, {@dont_appraise}, {@fsuuid={'fsuuid', 0x3d, {[0x3c, 0x38, 0x64, 0x0, 0x37, 0x34, 0x66, 0x30], 0x2d, [0x30, 0x39, 0x31, 0x36], 0x2d, [0x36, 0x66, 0x36, 0x31], 0x2d, [0x64, 0x65, 0x36, 0x62], 0x2d, [0x65, 0x30, 0x30, 0x66, 0x61, 0x64, 0x33, 0x34]}}}]}) close(r1) [ 1392.591606] kmemleak: 41 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:37:34 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x8000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:37:34 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:37:34 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x600, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:37:34 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x88240, 0x0) fallocate(r0, 0x10, 0x0, 0x1000002) setxattr$trusted_overlay_redirect(0x0, &(0x7f0000000100), 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) stat(&(0x7f0000000140)='.\x00', 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) open(&(0x7f0000000040)='./file0\x00', 0x1a18c1, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x2, 0x1000002) getsockopt$inet_int(r1, 0x0, 0x0, 0x0, &(0x7f00000001c0)) 02:37:34 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x20, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x100000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) fcntl$F_SET_RW_HINT(r1, 0x40c, &(0x7f0000000540)=0x1) mount$9p_rdma(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x2, &(0x7f0000000480)={'trans=rdma,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@sq={'sq', 0x3d, 0x7}}, {@sq={'sq', 0x3d, 0x800}}], [{@fowner_eq={'fowner', 0x3d, 0xee01}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@smackfsroot={'smackfsroot', 0x3d, ',\'+'}}]}}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)=""/245, 0xf5) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) r3 = syz_io_uring_complete(0x0) openat(r3, &(0x7f0000000140)='./file0\x00', 0x80, 0xc0) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r2, 0xc018937a, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x86}}, './file0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) io_uring_enter(r5, 0x4aa8, 0xffc6, 0x0, &(0x7f0000000100)={[0x7]}, 0x8) 02:37:34 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2010, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:37:34 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = timerfd_create(0x0, 0x800) timerfd_settime(r1, 0x0, &(0x7f0000000040)={{0x0, 0x3938700}, {0x77359400}}, &(0x7f0000000080)) timerfd_settime(r1, 0x3, &(0x7f00000000c0)={{}, {0x0, 0x989680}}, 0x0) r2 = accept4$inet(0xffffffffffffffff, 0x0, &(0x7f0000000100), 0x80000) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) r4 = eventfd(0x6) sendfile(r3, r4, &(0x7f0000000140)=0x7fff, 0x401) tee(r0, r2, 0x3ff, 0x1) r5 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYRESHEX, @ANYRES16=r5], 0xfdef) unshare(0x48020200) 02:37:34 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x30, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFNAME={0xa, 0x4, 'wpan1\x00'}, @NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_IFTYPE={0x8, 0x5, 0x2}]}, 0x30}}, 0x0) sendmsg$NLBL_CIPSOV4_C_ADD(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)={0x120, 0x0, 0x400, 0x401, 0x25dfdbfd, {}, [@NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x7}, {0x5, 0x3, 0x1}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x5}]}, @NLBL_CIPSOV4_A_MTYPE={0x8, 0x2, 0x3}, @NLBL_CIPSOV4_A_TAGLST={0x2c, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x2}, {0x5, 0x3, 0x7}, {0x5, 0x3, 0x6}, {0x5, 0x3, 0x5}, {0x5}]}, @NLBL_CIPSOV4_A_MLSLVLLST={0xac, 0x8, 0x0, 0x1, [{0x14, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x13dd3e29}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x4b}]}, {0x4c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x612d19a5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x2337e526}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x34}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x5f}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x1609674e}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xbd}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0x7}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x62e38ae7}]}, {0x1c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xe5}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x69cf4efd}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x7b2499fd}]}, {0x2c, 0x7, 0x0, 0x1, [@NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x66f5c4f1}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x22484dc0}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x255f2c3a}, @NLBL_CIPSOV4_A_MLSLVLLOC={0x8, 0x5, 0x70c86462}, @NLBL_CIPSOV4_A_MLSLVLREM={0x8, 0x6, 0xb0}]}]}]}, 0x120}, 0x1, 0x0, 0x0, 0x8000}, 0x8000) pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r2, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') [ 1401.640165] 9pnet: Could not find request transport: rdma 02:37:34 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x700, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1415.689763] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1422.472782] hpet: Lost 1 RTC interrupts 02:37:58 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2285, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:37:58 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:37:58 executing program 6: clone3(&(0x7f0000000080)={0x1040900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) openat$cgroup(0xffffffffffffffff, &(0x7f0000000000)='syz1\x00', 0x200002, 0x0) socket$inet(0x2, 0x4, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000040)=@req3={0x0, 0x1c0, 0x1f, 0x87, 0xff, 0x5, 0x8001}, 0x1c) r1 = syz_mount_image$nfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0xffff, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000180)="d4e4370047054aa9f483cc7b3ebab1668a94c71407a171cdf4e3de3f88f220f815c9c0eb1f50f67450680022ff742cbd46ee4bccf4e5f42e0e2ab374668913447d9a013b8f2526f9d26ff118fc642f85ae267afaafee2cebaff4cbd4f89eab6504476795b7ba0e2607a99b031da83ef3bed0bc0eda198397509444c84e0dc4c73d718dd49d2eba5b9352291be2d06605b5872aadebd4", 0x96, 0xfff}, {&(0x7f0000000240)="a1a1cdbe5b7aff7892b2c5e5acf36457e1720b5f76299cac5b82fb9177bd56c383c506c63bfd05c1bfcdf4b22b0050666a2ea1761942e6056cec6052fa7c69bd837935778997be2f710d8948fd978322375b3237f6ab4d71b46c467a088c55cb5cc090a65f96f628683f24604dd64c53a49fcbc41afd06abbcc1eab010a437cb07eb5c4776e84cd723fb691e349a9865", 0x90, 0x6}, {&(0x7f0000000300)="eb8e299242ab269b91ca78cf011d6d244f704857f9ee2ca1289e85a80288fb554f326b74f58875a239257601444bb522b55fcb421368234f7be5d22380b1e379c06bfbc630e68ee2d4bc467c1767d3f68e1dd9ff4cff34d7e67570b5d6b3c412d4c52a1465d16883bb905802f739f7cd28fb1a957dcdfe8c85b4731017eaf3798532697ae2c1d8e6a3", 0x89, 0x401}], 0x20, &(0x7f0000000440)={[{'syz1\x00'}, {'*'}, {'}/-/[/&\'*]/'}, {'syz1\x00'}, {'syz1\x00'}, {'!-\''}, {'\''}, {'-#\'^'}, {'syz1\x00'}, {'}{,$.'}], [{@permit_directio}, {@dont_measure}, {@smackfshat}, {@smackfsfloor={'smackfsfloor', 0x3d, 'syz1\x00'}}, {@smackfsfloor={'smackfsfloor', 0x3d, 'syz1\x00'}}, {@appraise_type}, {@fowner_lt}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@hash}, {@smackfshat={'smackfshat', 0x3d, '$&-*$^\''}}]}) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000540)={0x0, 0x0, 0x2, 0x0, '\x00', [{0x3, 0x36, 0x7e9, 0xfff, 0x1, 0x3ff}, {0xffffff2b, 0x6, 0x7, 0xffffffffffffff30, 0x80000001, 0x8}], ['\x00', '\x00']}) dup(r0) 02:37:58 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x701, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:37:58 executing program 5: rseq(&(0x7f0000000080)={0x0, 0x0, &(0x7f00000026c0)={0x0, 0x1, 0x80, 0x64, 0x9df}, 0x3}, 0x20, 0x1, 0x0) rseq(&(0x7f0000002640)={0x0, 0x0, &(0x7f0000002400)={0x0, 0x1, 0x0, 0x2, 0x7}, 0x1}, 0x20, 0x0, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) rseq(&(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0x3, 0x0, 0x80}, 0x5}, 0x20, 0x0, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r0, 0x400c620e, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r1, 0x400c620e, 0x0) ioctl$BINDER_SET_CONTEXT_MGR_EXT(r1, 0x4018620d, &(0x7f0000002680)) kexec_load(0x2, 0x8, &(0x7f0000002540)=[{&(0x7f00000001c0)="ae6fc97984d3a0ab3b0416dd6a799b777ed7eef810428cb22461ac5f", 0x1c, 0x6, 0x4}, {&(0x7f0000000200)="a24f4237f18ded76a0e88b49ca5dc5fe039d205c7357fff9ebafbbc887902323c9511479cfd8030fb16d22b3f65e120395cd1e40b0513776041903f9b96a4bcb117c3bdbd3228ddf1675be92ee28d04b73ad2348b6b4e8ea94daf473bc2e17ea00e2110e18a5d063d327f022e0c4c612a6d1b50461812880099e642c5ef34fc4b7c28bc96a2a3291da70ecf6f57a733c6b00e49c6180c8c5442ae89f9af6b4829b3ecfc7e1154f2609505c37739158d42a04b80b6c4a28abba46fc459de1057ac6267b195a4add54b6a4c6f8022e94732732f6b5903112a4172315091445bc9910a95648407d7b594e5bba15a0278f8b7f70e268036d1fc89e4c", 0xfa, 0x3ff, 0x5}, {&(0x7f0000000300)="aa9be7269ef4392c375adb05699edd4133edbd7c70a00db3d3c9a3549b944fe97239b92f88939b9743d40bb6ef25de9e4c0ce7b38379a438785be9036bac15d099c44becbf3dac5787f1d185fab4dc2029375ec9d6330f78cc27cf39af2a5b332b344cbce187cbd3c45216599d9a1c5ef49e179fac6956da7b621fb2dcec12ec64109a05af03fd79506db1da7140f38cd6f75a9431022d4bef1e9d3d60bb3cfd5f681877d0beceff7b35e93138433fa5a7d15af73b8fe1365dba395a34b099b0f3423b07ac4389ee711a1a014e280c72aeaee51d0c82e9f4a5c56ea123754e4c802663", 0xe3, 0x3, 0x80}, {&(0x7f0000000400)="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", 0x1000, 0x4, 0x1c0000}, {&(0x7f0000001400)="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", 0x1000, 0x7, 0x6}, {&(0x7f0000002400), 0x0, 0x2, 0x8001}, {&(0x7f0000002440)="b1bbc4fdaa58a69a86b721f4339d8e350a5ff9a5eab1f12558ede8be7b632cfdc17e04c0592c03a956f8f22559c2c9d4a57fe2250c233b2ed2dd3ec6f324aa86483d7f545a0760be34a3ef64d7e474c2b9fb27240578e67a9d0a15072852907fdb6b9de7f9a6b0f728ffc22d4a77e7f1a15f117bb208a1e08ee3b7219b", 0x7d, 0x7, 0x10000}, {&(0x7f00000024c0)="c575cead446885798114111e8e56205b0545fc9561b6bbf356d55c4182ce28eeb7585f0775dcecb2a79629ec6758db1d7931d0ab413a565aabec5eb191c3983f388128d290c39dd341c871193969fd997bd3192872", 0x55, 0xffffffffffffff75, 0x2}], 0x140000) pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r2, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'syzkaller0\x00'}) 02:37:58 executing program 3: perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000000)='\x00', 0x2) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:37:58 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x9000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:37:58 executing program 1: syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NLBL_MGMT_C_VERSION(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x200}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) utime(&(0x7f0000000080)='./file1\x00', &(0x7f0000000100)={0x7, 0x9}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f00000005c0)=ANY=[@ANYRES32, @ANYRES32=0xee01, @ANYRES32=0xee01, @ANYBLOB]) pipe(&(0x7f00000001c0)) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syz_tun\x00'}) socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000540)={r1, 0x7, 0x9, 0x200}) openat(r3, 0x0, 0x444100, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) finit_module(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x6, 0x0, 0x2, 0x2, 0x0, 0x10001, 0x8c036, 0x16, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x44, 0x1000, 0x400, 0x0, 0x2, 0xd13, 0x7ff, 0x0, 0xc83, 0x0, 0x3}, 0x0, 0x6, r0, 0xa) ioctl$BTRFS_IOC_SUBVOL_SETFLAGS(r2, 0x4008941a, &(0x7f0000000040)) pipe(&(0x7f0000000000)) 02:37:58 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c) getsockopt$inet6_int(r0, 0x29, 0x10, 0x0, &(0x7f0000000e00)) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r1, &(0x7f0000000500)=ANY=[@ANYBLOB="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"]) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r2, &(0x7f00000004c0)={0xa, 0x4e20, 0x200, @loopback, 0x7ff}, 0x1c) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f0000000080)={0x0, 0x0, {0x0, @struct, 0x0}, {0x0, @struct}, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_RESIZE(r3, 0x50009403, &(0x7f0000000480)={{r1}, {@val={r4}, @max}}) 02:37:58 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x900, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:37:58 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2385, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:37:58 executing program 6: recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)='autofs\x00', 0x0, &(0x7f0000000ac0)='\xa1\x00') lgetxattr(0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000380)={&(0x7f0000000040)=@abs, 0x6e, &(0x7f00000000c0)=[{&(0x7f0000000140)=""/226, 0xe2}, {&(0x7f0000000240)=""/181, 0xb5}], 0x2, &(0x7f0000000300)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x80}, 0x40000000) 02:37:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x0, 0xfffffffd}) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, r0, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=""/4096, 0x1000) r1 = accept4$inet(r0, &(0x7f0000000080)={0x2, 0x0, @remote}, &(0x7f00000000c0)=0x10, 0x80000) ioctl$BTRFS_IOC_QUOTA_RESCAN(r1, 0x4040942c, &(0x7f0000000100)={0x0, 0x7fffffff, [0x2, 0x80, 0x9, 0x6bba]}) [ 1426.211495] autofs4:pid:9338:autofs_fill_super: called with bogus options [ 1426.238531] autofs4:pid:9344:autofs_fill_super: called with bogus options 02:37:58 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xa00, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:37:58 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2485, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:37:58 executing program 6: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000440)={0x1024, 0x26, 0x101, 0x0, 0x0, {}, [@nested={0x1010, 0x0, 0x0, 0x1, [@generic="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", @typed={0xc, 0x0, 0x0, 0x0, @u64}]}]}, 0x1024}}, 0x0) r1 = syz_io_uring_setup(0x21, 0x0, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000b0000)=nil, 0x0, &(0x7f0000002a40)) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000080), 0xc0000, 0x0) r3 = syz_genetlink_get_family_id$gtp(&(0x7f0000000200), 0xffffffffffffffff) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r4, 0x0, 0x0, 0x8800000) sendmsg$GTP_CMD_GETPDP(r2, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000002c0)={&(0x7f0000000240)={0x3c, r3, 0x400, 0x70bd28, 0x25dfdbff, {}, [@GTPA_VERSION={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @local}, @GTPA_NET_NS_FD={0x8, 0x7, r4}, @GTPA_I_TEI={0x8}, @GTPA_MS_ADDRESS={0x8, 0x5, @rand_addr=0x64010101}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40}, 0x800) write$binfmt_script(r0, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0xfec4) pwritev2(r5, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r6, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) r7 = syz_open_dev$hiddev(&(0x7f0000000280), 0xfffffffffffffffa, 0x400) poll(&(0x7f0000000340)=[{0xffffffffffffffff, 0x1000}, {r0, 0x40c}, {r4, 0x280}, {r0, 0x80}, {0xffffffffffffffff, 0x9004}, {r6, 0xc021}, {r7, 0x8104}], 0x7, 0x7) sendfile(r1, r5, 0x0, 0x9) syz_open_dev$vcsa(&(0x7f0000000140), 0x7, 0x40) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 1429.645137] hpet: Lost 1 RTC interrupts [ 1438.648946] hpet: Lost 1 RTC interrupts [ 1443.539048] kmemleak: 14 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1445.289099] hpet: Lost 1 RTC interrupts [ 1449.426152] hpet: Lost 1 RTC interrupts 02:38:25 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0x9}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000100)=0x0) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000140), 0x402200, 0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x7f, 0x7, 0x81, 0x6, 0x0, 0x5, 0x40404, 0x4, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x101, 0x2, @perf_bp, 0x2406, 0x6, 0x7, 0x0, 0x7, 0x9, 0x5, 0x0, 0x4cf, 0x0, 0xfffffffffffffff9}, r1, 0x4, r2, 0x9) fcntl$setflags(r0, 0x2, 0x1) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_elf64(r0, &(0x7f0000000c00)=ANY=[@ANYBLOB="7f454c46071f4006020000000000000003003e000200000034010000000000004000000000000000b5020000000000000500000003003800020004000300530c070000001afdffff71080000000000005c0600000000000080000000000000000180000000000000ff070000000000007f0000000000000047219a4c74ee8c037a6928ef288a932a6e258f1fd3a716411afc7831b848437dd5473dbe8318be65d6df13fd547a8388c23285695d59028ea4778e891024067195b54bf69ccfd3bc664c7861df13f8bffe0e788c2f4b2c5da1ca2e4a9f68ceae7094d068772f57ec7d0d15c82ddc937bea3c3047a171fd3debae1235b353548e341841b6818a11c1d357d8da328d4f93d3625d03d495e21d3cdedf6b0cb7daa00b7a7de3bf6db5c5ac0500aab405187ddc6ca96a2994c305703d13703543f94ef05573af37161efe56dd6267a535b254886ebb783ad89d66494910dde42d7d8f5af080ca9f647c6a1976de46810000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005299e1c3551a3ea2ebae7a92d8f2131db6cfa1dd43921036c28ae248a23bd0f209e7577bdd38deaaa8a98fa69b084110dc459690c1073ad2ed0446597e1e85ddd84721eff96c0d7ad1223ca0db5a58c840c8c6422bd5d03998c8fda79f1bc4237b797d5900e8a4174413cef9e28a7c4b2267f5bd542e7d0354a4cb250bddea4093f473b5af5a2b41cc5c4213db172b64cd336d900aeddbbefc491f028e2ff1be11f9d7f3c04127ab945e7d8d88a87476a65e388d46bf3561aa0f3a7c4d023d778388d7a11e0dc45b2b1a4130f194792a62333c541b20b14457e495a6494cc56e58d5f2dcd21b07894bbd12a5a224bd52d11db5ab01bd2ef21b4512359377820b164217ca274be6ce112223569d7fb60daf211cb425d92082803a"], 0x865) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$sock_ipv6_tunnel_SIOCGETPRL(r2, 0x89f4, &(0x7f0000000b80)={'syztnl0\x00', &(0x7f0000000b00)={'ip6tnl0\x00', 0x0, 0x29, 0x3, 0x9, 0x7fff, 0x14, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @remote, 0x8000, 0x40, 0x7, 0xaae}}) socket$inet6_tcp(0xa, 0x1, 0x0) 02:38:25 executing program 6: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:38:25 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:38:25 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2585, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:38:25 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xa000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:38:25 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0xb00, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:38:25 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r1, 0x400c620e, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$packet(0x11, 0x2, 0x300) r4 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r4) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r4) pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, r4) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/module/thermal', 0x40000, 0x40) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r5, 0x660c) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) sendmsg$NL80211_CMD_SET_PMKSA(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xf3b1c9fe1c8a259a}, 0xc, &(0x7f0000000080)={&(0x7f0000000400)=ANY=[@ANYBLOB="94000000", @ANYRES16=r2, @ANYBLOB="010028bd70003e8600003400000008000300", @ANYRESDEC=r3, @ANYBLOB="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"], 0x94}, 0x1, 0x0, 0x0, 0x20000080}, 0x4000) ioctl$EXT4_IOC_MIGRATE(0xffffffffffffffff, 0x6609) 02:38:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0xcc) futimesat(r0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={{0x0, 0xea60}}) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, 0x13, r0, 0x0) lgetxattr(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=@known='security.apparmor\x00', &(0x7f0000000180)=""/90, 0x5a) truncate(&(0x7f0000000080)='./file0\x00', 0x4) r2 = syz_io_uring_complete(r1) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) statx(r2, &(0x7f0000000540)='./file0\x00', 0x1ed3d8b19280cb94, 0x2, &(0x7f0000000580)) ioctl$INCFS_IOC_CREATE_FILE(r0, 0xc058671e, &(0x7f0000000680)={{}, {0x5f}, 0x7, 0x0, 0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)="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", 0x194, 0x0, &(0x7f00000009c0)={0x2, 0xa3, {0x1, 0xc, 0x63, "24e4962bfd9d10948b9b5ffc1408644fedf7c160faca5cd1f8064fe87138325458bf69bf8e5a2f44e7be1e2e7c598bc01b9dc2b7874d0283029284abb60499723472cfc2a87902b430eaec667639b6ed2898f7504b9f8652d3d97776432ec66608a7fd", 0x33, "d10489e0fdb7561eaef237c354ed968435c15a10d013a55066e56cc9eba7f4d59fb7b6306169d0d6f201b334325709e72476a2"}, 0xda, "9edfcd6f1c6ec799ed29210fa4ae32c2a6c45c8b01c2c8c50759691a83e813cceb09c0482b445625ab43daf93aea8f4aa1570302525260de5a5beb6341438f1031eebbd767863342e66a4b6d47ef03fbc5cdfd7293428aede1c8624151aeb79e995ca1f534fe5aee65b558ab8aa41cdeab523b01aca8eb602f13f3b42b5975b13f37c185d6fa53d5e432aecc9831ae47aab269dd5063caf9a4eac34772bdded3d871b85ee5506d2c20bf85eaa77a99c761d56ab0fc3c305654b94d7741382eeae83e29200f502143082b3cf530ac90bdfbb2c530850316bd159b"}, 0x189}) syz_mount_image$iso9660(&(0x7f0000000300), &(0x7f00000002c0)='./file0\x00', 0xfffffffffffffffe, 0x0, &(0x7f00000004c0), 0x0, &(0x7f0000000840)=ANY=[@ANYBLOB='check=relaxed,hide,uid=', @ANYRESHEX=0x0, @ANYBLOB="2c6d01000000010000002c736d61636b66736465663d73656375726974792e61707061726d6f72002c7375626a5f757365723d73656375726974792e61707061706d6f72002c7569643eec7d073e70f97c5567517f9d8e5c9d5295dec7d6c985834581a6985ad918718d04eb1f0bfc759a8ff19d4a3ab1fae5eec4eb9014f258791e4157d145c5941b6a53c6fa52b2bc873197a47cc05a2c6acec705ce2e4c49ae8bf489246dd88c72871359212fc97ce7dd7d8b692d41d80a1cb285c5c464e64316b6a1a5185d8e458a96702767df12fe50fee3670082b90a20bc31ef000fbf7d2a87dffd15c58aa54b7167000e302d", @ANYRESDEC=r3, @ANYBLOB="2c6d61736b3d4d41595f455845432c6f626a5f757365723d2d245c2df62c5d2e2c00"]) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x15) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x28, 0x3a, 0x8, 0x70bd2c, 0xbddb, {0x18}, [@typed={0xc, 0x57, 0x0, 0x0, @u64=0x1ff}, @typed={0x8, 0x26, 0x0, 0x0, @fd=r4}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x10000800) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x105142, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x180) 02:38:25 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1020, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:38:25 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2685, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:38:25 executing program 3: perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x8) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:38:25 executing program 7: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040), 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x20, 0x3fa, 0x2, 0x70bd29, 0x25dfdbfb, {0x1, 0x1, 0x1, 0x1}, [""]}, 0x20}, 0x1, 0x0, 0x0, 0x20000051}, 0x1) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:38:25 executing program 1: ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000040)={0xffffffffffffffff, 0x1, 0x1}) ioctl$TIOCL_BLANKSCREEN(r0, 0x541c, &(0x7f00000000c0)) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000100)={0x6, 'xfrm0\x00', {}, 0x4}) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r2, 0x400c620e, 0x0) getsockopt$inet6_opts(r2, 0x29, 0x3b, &(0x7f0000000640)=""/4096, &(0x7f0000000140)=0x1000) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f00000002c0)={'syztnl0\x00', 0x0}) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x11, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 02:38:25 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) r2 = inotify_init1(0x80800) openat$null(0xffffffffffffff9c, &(0x7f0000000100), 0x40802, 0x0) r3 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r3, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r2, {r3}}, './file0\x00'}) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000080)=0x800) 02:38:25 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1887, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:38:25 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2785, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:38:25 executing program 3: r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000000), 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3f}, 0x18, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000}, r0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:38:25 executing program 6: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000000)) sendmsg$nl_netfilter(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000000c0)={0x28, 0x0, 0x4, 0x201, 0x0, 0x0, {0x0, 0x0, 0x7}, [@typed={0x14, 0x73, 0x0, 0x0, @ipv6=@mcast1}]}, 0x28}}, 0x0) 02:38:25 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xb000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:38:25 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2885, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:38:25 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1987, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:38:25 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) copy_file_range(r0, &(0x7f0000000000)=0x2, r0, &(0x7f0000000080)=0xfff, 0x7, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:38:25 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2985, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:38:25 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x218, 0x3a, 0x200, 0x70bd26, 0x25dfdbfc, {0xc}, [@typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x17, 0x0, 0x0, @pid=r2}, @typed={0x88, 0x62, 0x0, 0x0, @binary="7c850ea846956521ee0d1131ac3478a6aad8bd4dc4512cbfd14ac2f369f1d2c617cba91dc7211d4d81924943a129edff9377b36aad855902230546e157995f371da0dc04bdb8c8229e24425915fe366edf183fc77c76bb47135ddd1ec9ae04c42c678633630fdf5c40ded6ad1431193005686b6573d2c1c0babe53ec0ef988fabf4f5e70"}, @nested={0x9c, 0x43, 0x0, 0x1, [@typed={0x6, 0x7c, 0x0, 0x0, @str='+\x00'}, @typed={0x10, 0x2, 0x0, 0x0, @str=']]}\'(,%^%++\x00'}, @typed={0x8, 0x6d, 0x0, 0x0, @uid=r3}, @typed={0x6d, 0x85, 0x0, 0x0, @binary="52b5bcff89c7df45395c1035c09af5f7ee960a9d92076c24b35511f2766f63ad3b32ae20e1e5dfbf35b094120b505acea16d34100b4b531ec31cb47e5521553925617bfa0c222bd8e17333a3404279445f3a5bd66747e1671deb147e88b7c04a8c5a9e18fa1a2412e2"}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@private=0xa010100}]}, @generic="c0873a9fa2195039f51ba05f08c5854aa9c0d9d1f2ba846880e8c2859325f73417bbd911e03d5b80fe4aada5f2e9a124ea93ee81016dc6cd82a8eb38c08a7b0cf327583e42dc782636a351e8d1cc3b6da913603a2afd6b57f1ff24648718b2edc28b19b8e0ce50052c2f78eb4090236669febaeb08bff89baa500a09b688c717b70d09837d74cff480fa5a77ff57c924570f2cc410ebdc4ff2a372ffc3273c37fc1922ce0f15ca29f985c27c4f2ed4684db0847d23023ddb199f2f7be97d1ab7eeac7ee1"]}, 0x218}, 0x1, 0x0, 0x0, 0x40}, 0x881) chdir(&(0x7f0000000040)='./file0\x00') r4 = getpid() prlimit64(r4, 0x0, &(0x7f0000000000), 0x0) r5 = gettid() kcmp(r4, r5, 0x1, r0, r1) 02:38:25 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1a87, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:38:25 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) ioctl$F2FS_IOC_GET_FEATURES(r0, 0x8004f50c, &(0x7f0000000000)) 02:38:25 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:38:25 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2a85, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1469.238144] kmemleak: 28 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1477.645091] hpet: Lost 1 RTC interrupts 02:38:50 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x218, 0x3a, 0x200, 0x70bd26, 0x25dfdbfc, {0xc}, [@typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x17, 0x0, 0x0, @pid=r2}, @typed={0x88, 0x62, 0x0, 0x0, @binary="7c850ea846956521ee0d1131ac3478a6aad8bd4dc4512cbfd14ac2f369f1d2c617cba91dc7211d4d81924943a129edff9377b36aad855902230546e157995f371da0dc04bdb8c8229e24425915fe366edf183fc77c76bb47135ddd1ec9ae04c42c678633630fdf5c40ded6ad1431193005686b6573d2c1c0babe53ec0ef988fabf4f5e70"}, @nested={0x9c, 0x43, 0x0, 0x1, [@typed={0x6, 0x7c, 0x0, 0x0, @str='+\x00'}, @typed={0x10, 0x2, 0x0, 0x0, @str=']]}\'(,%^%++\x00'}, @typed={0x8, 0x6d, 0x0, 0x0, @uid=r3}, @typed={0x6d, 0x85, 0x0, 0x0, @binary="52b5bcff89c7df45395c1035c09af5f7ee960a9d92076c24b35511f2766f63ad3b32ae20e1e5dfbf35b094120b505acea16d34100b4b531ec31cb47e5521553925617bfa0c222bd8e17333a3404279445f3a5bd66747e1671deb147e88b7c04a8c5a9e18fa1a2412e2"}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@private=0xa010100}]}, @generic="c0873a9fa2195039f51ba05f08c5854aa9c0d9d1f2ba846880e8c2859325f73417bbd911e03d5b80fe4aada5f2e9a124ea93ee81016dc6cd82a8eb38c08a7b0cf327583e42dc782636a351e8d1cc3b6da913603a2afd6b57f1ff24648718b2edc28b19b8e0ce50052c2f78eb4090236669febaeb08bff89baa500a09b688c717b70d09837d74cff480fa5a77ff57c924570f2cc410ebdc4ff2a372ffc3273c37fc1922ce0f15ca29f985c27c4f2ed4684db0847d23023ddb199f2f7be97d1ab7eeac7ee1"]}, 0x218}, 0x1, 0x0, 0x0, 0x40}, 0x881) chdir(&(0x7f0000000040)='./file0\x00') r4 = getpid() prlimit64(r4, 0x0, &(0x7f0000000000), 0x0) r5 = gettid() kcmp(r4, r5, 0x1, r0, r1) 02:38:50 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x218, 0x3a, 0x200, 0x70bd26, 0x25dfdbfc, {0xc}, [@typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x17, 0x0, 0x0, @pid=r2}, @typed={0x88, 0x62, 0x0, 0x0, @binary="7c850ea846956521ee0d1131ac3478a6aad8bd4dc4512cbfd14ac2f369f1d2c617cba91dc7211d4d81924943a129edff9377b36aad855902230546e157995f371da0dc04bdb8c8229e24425915fe366edf183fc77c76bb47135ddd1ec9ae04c42c678633630fdf5c40ded6ad1431193005686b6573d2c1c0babe53ec0ef988fabf4f5e70"}, @nested={0x9c, 0x43, 0x0, 0x1, [@typed={0x6, 0x7c, 0x0, 0x0, @str='+\x00'}, @typed={0x10, 0x2, 0x0, 0x0, @str=']]}\'(,%^%++\x00'}, @typed={0x8, 0x6d, 0x0, 0x0, @uid=r3}, @typed={0x6d, 0x85, 0x0, 0x0, @binary="52b5bcff89c7df45395c1035c09af5f7ee960a9d92076c24b35511f2766f63ad3b32ae20e1e5dfbf35b094120b505acea16d34100b4b531ec31cb47e5521553925617bfa0c222bd8e17333a3404279445f3a5bd66747e1671deb147e88b7c04a8c5a9e18fa1a2412e2"}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@private=0xa010100}]}, @generic="c0873a9fa2195039f51ba05f08c5854aa9c0d9d1f2ba846880e8c2859325f73417bbd911e03d5b80fe4aada5f2e9a124ea93ee81016dc6cd82a8eb38c08a7b0cf327583e42dc782636a351e8d1cc3b6da913603a2afd6b57f1ff24648718b2edc28b19b8e0ce50052c2f78eb4090236669febaeb08bff89baa500a09b688c717b70d09837d74cff480fa5a77ff57c924570f2cc410ebdc4ff2a372ffc3273c37fc1922ce0f15ca29f985c27c4f2ed4684db0847d23023ddb199f2f7be97d1ab7eeac7ee1"]}, 0x218}, 0x1, 0x0, 0x0, 0x40}, 0x881) chdir(&(0x7f0000000040)='./file0\x00') r4 = getpid() prlimit64(r4, 0x0, &(0x7f0000000000), 0x0) r5 = gettid() kcmp(r4, r5, 0x1, r0, r1) 02:38:50 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:38:50 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2b85, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:38:50 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/213, 0xd5) 02:38:50 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x10000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:38:50 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1b87, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:38:50 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1000008, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000000000)=0x7, 0x4) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000100)) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r2, 0x84009422, &(0x7f00000002c0)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) ioctl$BINDER_FREEZE(r2, 0x400c620e, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x22, &(0x7f0000000040)=0xfe9f, 0x4) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r0) pkey_mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2, r0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r3, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:38:50 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1c87, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1486.259065] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1494.320298] kmemleak: 6 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:39:16 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x218, 0x3a, 0x200, 0x70bd26, 0x25dfdbfc, {0xc}, [@typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x17, 0x0, 0x0, @pid=r2}, @typed={0x88, 0x62, 0x0, 0x0, @binary="7c850ea846956521ee0d1131ac3478a6aad8bd4dc4512cbfd14ac2f369f1d2c617cba91dc7211d4d81924943a129edff9377b36aad855902230546e157995f371da0dc04bdb8c8229e24425915fe366edf183fc77c76bb47135ddd1ec9ae04c42c678633630fdf5c40ded6ad1431193005686b6573d2c1c0babe53ec0ef988fabf4f5e70"}, @nested={0x9c, 0x43, 0x0, 0x1, [@typed={0x6, 0x7c, 0x0, 0x0, @str='+\x00'}, @typed={0x10, 0x2, 0x0, 0x0, @str=']]}\'(,%^%++\x00'}, @typed={0x8, 0x6d, 0x0, 0x0, @uid=r3}, @typed={0x6d, 0x85, 0x0, 0x0, @binary="52b5bcff89c7df45395c1035c09af5f7ee960a9d92076c24b35511f2766f63ad3b32ae20e1e5dfbf35b094120b505acea16d34100b4b531ec31cb47e5521553925617bfa0c222bd8e17333a3404279445f3a5bd66747e1671deb147e88b7c04a8c5a9e18fa1a2412e2"}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@private=0xa010100}]}, @generic="c0873a9fa2195039f51ba05f08c5854aa9c0d9d1f2ba846880e8c2859325f73417bbd911e03d5b80fe4aada5f2e9a124ea93ee81016dc6cd82a8eb38c08a7b0cf327583e42dc782636a351e8d1cc3b6da913603a2afd6b57f1ff24648718b2edc28b19b8e0ce50052c2f78eb4090236669febaeb08bff89baa500a09b688c717b70d09837d74cff480fa5a77ff57c924570f2cc410ebdc4ff2a372ffc3273c37fc1922ce0f15ca29f985c27c4f2ed4684db0847d23023ddb199f2f7be97d1ab7eeac7ee1"]}, 0x218}, 0x1, 0x0, 0x0, 0x40}, 0x881) chdir(&(0x7f0000000040)='./file0\x00') r4 = getpid() prlimit64(r4, 0x0, &(0x7f0000000000), 0x0) r5 = gettid() kcmp(r4, r5, 0x1, r0, r1) 02:39:16 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1d03, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:39:16 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:39:16 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2c85, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:39:16 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x42, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r2, 0x400c620e, 0x0) write$P9_RREMOVE(r2, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:39:16 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x218, 0x3a, 0x200, 0x70bd26, 0x25dfdbfc, {0xc}, [@typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x17, 0x0, 0x0, @pid=r2}, @typed={0x88, 0x62, 0x0, 0x0, @binary="7c850ea846956521ee0d1131ac3478a6aad8bd4dc4512cbfd14ac2f369f1d2c617cba91dc7211d4d81924943a129edff9377b36aad855902230546e157995f371da0dc04bdb8c8229e24425915fe366edf183fc77c76bb47135ddd1ec9ae04c42c678633630fdf5c40ded6ad1431193005686b6573d2c1c0babe53ec0ef988fabf4f5e70"}, @nested={0x9c, 0x43, 0x0, 0x1, [@typed={0x6, 0x7c, 0x0, 0x0, @str='+\x00'}, @typed={0x10, 0x2, 0x0, 0x0, @str=']]}\'(,%^%++\x00'}, @typed={0x8, 0x6d, 0x0, 0x0, @uid=r3}, @typed={0x6d, 0x85, 0x0, 0x0, @binary="52b5bcff89c7df45395c1035c09af5f7ee960a9d92076c24b35511f2766f63ad3b32ae20e1e5dfbf35b094120b505acea16d34100b4b531ec31cb47e5521553925617bfa0c222bd8e17333a3404279445f3a5bd66747e1671deb147e88b7c04a8c5a9e18fa1a2412e2"}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@private=0xa010100}]}, @generic="c0873a9fa2195039f51ba05f08c5854aa9c0d9d1f2ba846880e8c2859325f73417bbd911e03d5b80fe4aada5f2e9a124ea93ee81016dc6cd82a8eb38c08a7b0cf327583e42dc782636a351e8d1cc3b6da913603a2afd6b57f1ff24648718b2edc28b19b8e0ce50052c2f78eb4090236669febaeb08bff89baa500a09b688c717b70d09837d74cff480fa5a77ff57c924570f2cc410ebdc4ff2a372ffc3273c37fc1922ce0f15ca29f985c27c4f2ed4684db0847d23023ddb199f2f7be97d1ab7eeac7ee1"]}, 0x218}, 0x1, 0x0, 0x0, 0x40}, 0x881) chdir(&(0x7f0000000040)='./file0\x00') r4 = getpid() prlimit64(r4, 0x0, &(0x7f0000000000), 0x0) r5 = gettid() kcmp(r4, r5, 0x1, r0, r1) 02:39:16 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') r1 = syz_open_dev$hidraw(&(0x7f0000000000), 0x94e, 0x4000) ioctl$BTRFS_IOC_ADD_DEV(r0, 0x5000940a, &(0x7f0000000100)={{r1}, "3bdb7e42d223c2041b8e871cb20bcdddf67c5c38231a01ca454fbb73fd9644b8b78ad9bb1e29fc77754795473be051171867a247223783d4e3367745be1b10ea16751be1394006bd3449ed7aa4920ec418c04fc8d59ee6b3f2d2078e274bffc286308b3d1107aefe88050c58d84345b919637aa6fbb2973f41b9ca0b3275f634c5bf2d4cd0e933ba5d6c9ee71178d2f70303b5f2974619e2c787d964284dc70e9138060ae60574bc9cfb2edb72d0fd892224663e3fedeaa08129f914cd499c502485e1f42d3ce361e289905b76ff24d347448e45cd5041142a0a529aeebbef1b4728b44b2c7514c1e2a234cd190f4963e7f8dfc93549337a4e8b3335cfe2f6c6a94f3800ec8a627ce7bba52fa0a1ede649a63d9925f308176993b432fbf22d3f8c1fe98de3853d5c5d1c0261034457ab24621f8a2759eba2ce17aadd69520b1f3b155934d9f3f4527f974f9b00a29fd547f1ec364d7ce1fdd99d49e14e3cb08f71a552d10aae5e77810d5d2f75fee8b624abfbc6bb3710af66fa4adae29dc6ff54f202eabb4daec7f13486116bf1e10456f5fbd6ef9f0ac4789ce694890afe24ab1b6eeee27e328798151167a08b97c5aeec39df064e6d23e2dc93897dc1ef9a2c7c9f8dba7ca4b5787a9eb8aea05a9d8f4ff65c17320efe404bee276161aa997dc02e7cbdb675fd0bf0aeeaf74af2daa67813f174dd328f2c72ee7edb89b87b553886ec211b16ec030d0b846cd290070e1427f2aba4678c9f03c69e66e1c3ac255fe758866b4d82c85485ad0c29b02164c238fa10ed671a7a3c903f745281027720f386819103a145ecf2e704398ea4086a217dfc82e9e9a428a70892b195dbb0c633bf591081fc8b60b9fcec1c19a60ccede76ec0b78a3c73d805bc5b9b69f41fe6619efb8ae85f6fb4285ba34b4de66f63a24223f2291fd687a452c7bdcf87972d63416f55c3f0e66178a2797cf16e5fbe3448cc932245a9fa438b29f4d1ef53a2a4ae6b44cf529ef346bccc27b08fda7239a4051bbe66e4286d02da5d5205cbc9bc6464aed6c6adf33ff9f3358ae9d33b3c6c2d6983d84e454d637bf588313ad83f9f6e89ace8b5a4d604fd813dba0bc77c5d90bbc9816fd21d9ce0823b58def09542e8e0549152f5f3c9d8ab40bf0b3a5b5a8c880788c1aee7369fc45f849190d646f25ae4abdae0aaa4fbdb669fb56ea29cfb40b512c7821c1c9fb0037f3406b0d085fffd0a4495848a98098de81ee6059b26227ea903f92b4ef1a5ca6c5f65cc1fb2968d5c0c99e849f1d65da0160898d73db5a7c9da0d8abd7c653f0f4bf2a13181691a1294c047ae7cc5024e966a824b1f7f335dc574766c6d72640bc37cdedf2eb40b332b7ce19369b5672c9f000e681f763b2f073ca170992c2cffbff91dee8ee19ad1af554f1c20eaa2b1558928a65510f66085074bc0a9d5704c90b219544f55d3052964cf561ce8507704c8c8947640c7daa1ee3cb223e723f57404931427ec03413b4b5d07928a6b204834b20873d8c46950456c19e482432cc1f30626b1dc68b683b05e6be5cd7eb705c0a8242a2b4dabcab2ce53408390ca281430b45e6a00e5f38fc8e945a020e4c1a3216b270ec9ed46ae7be2a6d2cbd3e6946e7c500e4f03f15ed9fdd9f3bc068fef06cae6344e212500913d62120dcfaf5e60a1f767c9f698f87dde5656a5c5b163d279601ff36cad055962c7ca701ea1d25023432f47e9695543482e07d330f9aaeb9f96a8e08f0b21294d3ed3b97712f0af09e307d5aae33f8854bbe7128c53524b41d0a801615953a806d9e07249dec8da980c2901dcc20db9b53d9b43cffad4fae5f761ab7d0f6cfff95afed7a429a97733d945a356ddf8aaf8e9d4770e77ada8983fe652f779985e2754e48026fa049926b74a9f725c803f6f4f6f6c1657fe5f338035b4b70bd123ca617dfea99f455016bdd703f350a0c7bbe47e3d9c819471d17017eb60b8111ca96b8108ffd556f61a5b8ba02ce33a78449de781c71e31eeeb04578710a2d89579b229784da766360925dad01901cfb59d08c8a1b33e41eb5bf2ac8a8188a5151d9e59d5e9cc624468796d2a47f2219ff16c45b29ef4a77d8655c1d84be294a434ede8743296b5caae361404ed18f36b2b239c73df8fabd7dcbf8ad1afa87dfd04b9fae66e8f0493ccaafaca9631a10214cbdc2f18a46103fa173f86c751486a2737a1a7174cc9a42999f294c6f9f10069aeb22b66b4380186ba0464ba937f69342506c426f7959c3789cab8025cb8b48f11f7a5d5b022aafe37adab24799840e944cfac0cc871429e89634aee1bcb2730b2b1f5037267d9d65775a1b5e18d52eba31863b19124b8a9cd836916bc0518af33c6b14134976f69e31fe4f0625f545cc6d11443ca1458a0c76d1e0ad101447b3730e08e1e4f8a50346386aadbd022f6209992c9d76f0639c603927e11519e6abdcf4e979cfddd6b67334a60f67e1436c4281999235323cd84a4c5c9aacc927e28a9ff0411ad70b0d2743529fdba20cd4d216c232de05ddf4489816a98265c435b6fb0a7c2518e03ec9e5767ab8b03c9ef4bead0eb049447295f28f02c9490982f0ad290b238693ad27a81afe8233e4f3d68393e676331f49e8faf57ea2bc4152b4783177942d76cdf8b3c115604cf8e7f8431849e9abab727398a7d22335d8e74889f96d1c35739f024e05a5b1bb4823f8a561ebce9aba31bfadc7fae8c863cb01a16eb6f49bcf880108ae2bf1a3c7d93c3fdab45ddce16a482924170a1be93cc32e77c321947e8e67c1429ebf4cba5f935da7fc37e5638274866d74b939c07646e36146e49407651a1745a8f2e0af9ebc6cf23ee830828e707503dab6eb2a22e45ff37db123e28250bc578a2304654a7a0f7966a47b6a68bb29d46f9a3473995eee49a75194c407bcf0b0a1fbd43eaad31598d0a06c9f76106d659993b7c701fa1daef88589afa19019b1b84c0c97e70a33d79467cd69f4ed7679aa3535e51ebb137b8da4f4ff17f602f57c5d7208e0001a6122c1d0f72679a216db268198b6a9e9ce5f5a284c1e6ae00dbc58c5a85202b9fec6075fcf13c94fbea4b6b7563345af11a56ce7055b780a57fef07b0bb4374311e70fb7136c34812d7ab73994e754999bdcdf0cbf5c45fa70be9c18af363783fbfed84a7d15c215a3fe513357e57ee395ce79d44bdbdd8fe4864ae7f3f1fd81fc73916e30df9bac8206fa7dd3eb09d07f3bb4decfb48dbf7c28cffcb89833289b94c33b2f58533169679e6bb8d85883f05e5f4a7eb0a126d69171ca977d328b8bc098b5302541e4d2c5bae1801a9ebc8e67ae772213abb67ccc7ad7230a8394b0e32ac261f9edecb45e8174ef2287fa75f16c72db91384015544c4209b7347e46599381e847af0cac78e122a8bfdc0b97873aa20ec10bf01dcf8c62208c7557f87fa99f9be211f9e3d605614899002cc5214c9b0cf6bbe44d40d79aab2db7d89687d98b30ee566d88f9bb32cdbf2d69bba51486850c1ff5968dc6af208d2b6ce384888a7f33f4edcd93f37400f7c031f018344cea8063c8ba54ba99564f8be0cf636934060a89a58acc4eaeb2f4936b37f10f61f731e749d874a9c1560f2ae385dc18964918ddb1d78643b9397bc7abecbd2942c9961a96d028b359cb4b35007f2844c3cdf2370e9b8fca3140dd6094d16f549f1a4b3c868cc4a5697f3c8690fb779831059289ae9133b8a5f9086a761161070c44b2b64477d762e6bf6a310161196cd6db97ba0cafb089c0db67a67d2698ee5889a53860ada84c20cc7bd474dc38f3da181e2e7189b18654641aaa234f7e0858402bfbc2b230e39d4952cdd7c12defb590fa6d358e8375bdb8664032663a7bd8a327f14beae66cc413ceda8e8b7d750cacfeaf36d1bd0f5f65ca77f9cc3dadd5a9ea1402a926599cc703b1bff7f8770360b4cf226c700b11cd9cff9c853b4b6e8f7e15e0a47b485a62ea38a45346a823cd2bb315c38fad3da8aaa9c6c065e9d7f38f134e6f739ef2f070ffc3aac507a6578cacbd94215b0a3e4a2fcacff9fc8f9eaa821c95e577be233e5e5d0863de857fb6f8bf8c87417855890d05ccaf5667e5925105d66030713d2c31060bd59d366598e41fab16431abe18ed215fc063eb877cbd919e207a203d0ef2313ebe4d1f7dca890a256889cd3b6b3863db8aaf15eec4d5ab3d0488aa5fe7ae5a067a406a522d18b02133a4d3bfd14c42c82ea0ca46c83a828adbc57e75ece5878cfabb642052339ec4cc081483efd97215c61f84cdb8efcc055e1f2fecda226f7975dc48b7bae3f7d9af88a135c72f77e0439384fa1c991d62440bb73e847595245ec67c5de5eb9ed95fad16198f53f34a68cc2e30ed214aa38a3fcecbd3178c4a49ef680be87ce0e263e89feab0a2efdbde11f226bb5467114fbab25ac92afe2e382e039a274f0de9e3932ab2b7aa964e18c4d5b76700d03336489888806d92e2e446a080c343288c1a1a6aed04d81dc3341767cd7f2eb4485e6f0e66f4196d49a48331ddbf8b58216852bbfd9da3c4a1925e686bb95116cfcbd10909c1fc33da73bbb4a7777367dff5a981b3ca5ec0bb0d86851c08718f87831a643ef0d3ad5c35047b6101d5ea32149ba1e61b6a0b1f7b52450959b3e14611ecd5905763b5aa09a138a3fc29787d8cb3844a96fd71ee81ce1c73b37d9627bd4cd2f3039ff0a4cff9247e685228a0d802c41d7fb7dbd0a03769a34e31d6844523c0e5f41ddf70c074792cdf23f207b2e9a49942cde3caf81f995220ea26063bffafa29b6f99e853e272a7f5ddc1d71d61884e5a66b03a7aa7bd81af08f488313ef614eb5bfdddf73b92016a7cc360e174f14231462df8cbbc392f9311b39c2b0c0adbecc782e3cbdb6ff3793cc3d5a469ae5896bfe867463321dc60db213e982776fa5cfaab277f18dd1e6378de9d1044279316c7c8e231dba147f97d4ac81067e7aee4d069955944ec1e01281ca6cb9ed97c2c12336ec0208cf81e92730bad35d8afd94ca8c96c9acf109363d94ad0de2740c8ba3f40591e8ffc79a8667d0536126bf8f004ec2eeb204a8b639ecacc910ba34045671e449a40ecb9eadc03655777b1020643d58c0457bcd7ecf6a28d5aa6afbe6733a6904441311cab285127e2d57fbbb24658a740d7543618c3d58fdc3577d11350dd7bd7dd8f40134006e3d49f0cc4ef8a0f00f604a36d4de1533548578567dea665aa256c7f22b41f4e9faf3fc559be9077e834c821ac74f41784caf6bb7ddca360f5be012b48e04e139056c4788394ee219549cd492b6dc405d2c2d92da4f248c4eb55cf441e34ab14e6a8cca700a9a9ad29d15c648b220964e27a54ec8602949dacc0116b4db5707b16da04ce969a5cd7f1f1fe4b8477b4dc5e693376539dee3b27d5058962a932a41cdae8e93cfb95b3fc0ec6076fe0875c2786e9dcc9b8ac1273b40829bb1beb22e430cffc77eea29d23c0fb41c2a31df19f063d921b0e25be28d10db06fb933088e62eafe1374113c47c8e83d5b9528b404ab2c6c7d2da0c826c3b48bd1cc3f812261d03816c2b720d69f5645e168b31808a7f21fc4a0bf2b466a9a53d543d12777f52d4ca3474f66d923524ba215bbd238444982923d8889978187e90bd37b2f17336c922b16c4f6436765f7090ab86b7418a51ede33cf69c853cb7d5120f5f643c8d7c489a1d03f007d5639c1e2948c88d7ebfeed2ea2756a6200ef763ebe3470ec5540b308e560791cb48ba8108b14e5c4339a8d7f01a20b13cd5f27a5b54c"}) 02:39:16 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x20000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:39:16 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2d85, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:39:16 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) write$binfmt_elf32(r0, &(0x7f0000000100)={{0x7f, 0x45, 0x4c, 0x46, 0xfc, 0x7f, 0x7f, 0x9, 0x6, 0x3, 0x3, 0x4, 0x38b, 0x38, 0xd7, 0x9, 0x9, 0x20, 0x2, 0x2, 0x4, 0x3}, [{0x1, 0x3ff, 0xffff, 0xad3b, 0xfffeffff, 0x80000001, 0x5, 0x80000001}], "952fc96ed5bd01cfa90a0c4caa3ea57bf440ce20f7a60b49109b3f1425690d6943cf60cdf738ca33732b3f9b4e3fa32f077a656cfd79ede130343cc89d45bc7ea58aaa3283ad646a5543ff67a8d21d5769da1e7b47fd6cf6241b6ba93cb62f7ca097ecd85df9ccebaa870fdd020782bac3b0c3234a129dad552debb5eb6da95ab30797eb02e0e28f1e8b1218fabbd041d1fac668cb1fbfc353d892c58c43966a814e53bbfc3e9188130c3459ee09b4cdff00675e81434a47ed1fddcf9fdfae4e06b07922de35426d1e39b4d5f3e1dc09958c83bd71c95bdb93", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x631) ioctl$sock_inet_SIOCGIFNETMASK(r1, 0x891b, &(0x7f0000000040)={'bridge0\x00', {0x2, 0x0, @loopback}}) fremovexattr(r0, &(0x7f00000000c0)=@known='user.incfs.id\x00') 02:39:16 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1d87, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:39:16 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x218, 0x3a, 0x200, 0x70bd26, 0x25dfdbfc, {0xc}, [@typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x17, 0x0, 0x0, @pid=r2}, @typed={0x88, 0x62, 0x0, 0x0, @binary="7c850ea846956521ee0d1131ac3478a6aad8bd4dc4512cbfd14ac2f369f1d2c617cba91dc7211d4d81924943a129edff9377b36aad855902230546e157995f371da0dc04bdb8c8229e24425915fe366edf183fc77c76bb47135ddd1ec9ae04c42c678633630fdf5c40ded6ad1431193005686b6573d2c1c0babe53ec0ef988fabf4f5e70"}, @nested={0x9c, 0x43, 0x0, 0x1, [@typed={0x6, 0x7c, 0x0, 0x0, @str='+\x00'}, @typed={0x10, 0x2, 0x0, 0x0, @str=']]}\'(,%^%++\x00'}, @typed={0x8, 0x6d, 0x0, 0x0, @uid=r3}, @typed={0x6d, 0x85, 0x0, 0x0, @binary="52b5bcff89c7df45395c1035c09af5f7ee960a9d92076c24b35511f2766f63ad3b32ae20e1e5dfbf35b094120b505acea16d34100b4b531ec31cb47e5521553925617bfa0c222bd8e17333a3404279445f3a5bd66747e1671deb147e88b7c04a8c5a9e18fa1a2412e2"}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@private=0xa010100}]}, @generic="c0873a9fa2195039f51ba05f08c5854aa9c0d9d1f2ba846880e8c2859325f73417bbd911e03d5b80fe4aada5f2e9a124ea93ee81016dc6cd82a8eb38c08a7b0cf327583e42dc782636a351e8d1cc3b6da913603a2afd6b57f1ff24648718b2edc28b19b8e0ce50052c2f78eb4090236669febaeb08bff89baa500a09b688c717b70d09837d74cff480fa5a77ff57c924570f2cc410ebdc4ff2a372ffc3273c37fc1922ce0f15ca29f985c27c4f2ed4684db0847d23023ddb199f2f7be97d1ab7eeac7ee1"]}, 0x218}, 0x1, 0x0, 0x0, 0x40}, 0x881) chdir(&(0x7f0000000040)='./file0\x00') r4 = getpid() prlimit64(r4, 0x0, &(0x7f0000000000), 0x0) r5 = gettid() kcmp(r4, r5, 0x1, r0, r1) 02:39:16 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x218, 0x3a, 0x200, 0x70bd26, 0x25dfdbfc, {0xc}, [@typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x17, 0x0, 0x0, @pid=r2}, @typed={0x88, 0x62, 0x0, 0x0, @binary="7c850ea846956521ee0d1131ac3478a6aad8bd4dc4512cbfd14ac2f369f1d2c617cba91dc7211d4d81924943a129edff9377b36aad855902230546e157995f371da0dc04bdb8c8229e24425915fe366edf183fc77c76bb47135ddd1ec9ae04c42c678633630fdf5c40ded6ad1431193005686b6573d2c1c0babe53ec0ef988fabf4f5e70"}, @nested={0x9c, 0x43, 0x0, 0x1, [@typed={0x6, 0x7c, 0x0, 0x0, @str='+\x00'}, @typed={0x10, 0x2, 0x0, 0x0, @str=']]}\'(,%^%++\x00'}, @typed={0x8, 0x6d, 0x0, 0x0, @uid=r3}, @typed={0x6d, 0x85, 0x0, 0x0, @binary="52b5bcff89c7df45395c1035c09af5f7ee960a9d92076c24b35511f2766f63ad3b32ae20e1e5dfbf35b094120b505acea16d34100b4b531ec31cb47e5521553925617bfa0c222bd8e17333a3404279445f3a5bd66747e1671deb147e88b7c04a8c5a9e18fa1a2412e2"}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@private=0xa010100}]}, @generic="c0873a9fa2195039f51ba05f08c5854aa9c0d9d1f2ba846880e8c2859325f73417bbd911e03d5b80fe4aada5f2e9a124ea93ee81016dc6cd82a8eb38c08a7b0cf327583e42dc782636a351e8d1cc3b6da913603a2afd6b57f1ff24648718b2edc28b19b8e0ce50052c2f78eb4090236669febaeb08bff89baa500a09b688c717b70d09837d74cff480fa5a77ff57c924570f2cc410ebdc4ff2a372ffc3273c37fc1922ce0f15ca29f985c27c4f2ed4684db0847d23023ddb199f2f7be97d1ab7eeac7ee1"]}, 0x218}, 0x1, 0x0, 0x0, 0x40}, 0x881) chdir(&(0x7f0000000040)='./file0\x00') r4 = getpid() prlimit64(r4, 0x0, &(0x7f0000000000), 0x0) r5 = gettid() kcmp(r4, r5, 0x1, r0, r1) 02:39:16 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@mcast2}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/45, 0x2d) [ 1515.558848] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:39:37 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x20100000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:39:37 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:39:37 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) lsetxattr$security_selinux(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:pinentry_exec_t:s0\x00', 0x25, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:39:37 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x218, 0x3a, 0x200, 0x70bd26, 0x25dfdbfc, {0xc}, [@typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x17, 0x0, 0x0, @pid=r2}, @typed={0x88, 0x62, 0x0, 0x0, @binary="7c850ea846956521ee0d1131ac3478a6aad8bd4dc4512cbfd14ac2f369f1d2c617cba91dc7211d4d81924943a129edff9377b36aad855902230546e157995f371da0dc04bdb8c8229e24425915fe366edf183fc77c76bb47135ddd1ec9ae04c42c678633630fdf5c40ded6ad1431193005686b6573d2c1c0babe53ec0ef988fabf4f5e70"}, @nested={0x9c, 0x43, 0x0, 0x1, [@typed={0x6, 0x7c, 0x0, 0x0, @str='+\x00'}, @typed={0x10, 0x2, 0x0, 0x0, @str=']]}\'(,%^%++\x00'}, @typed={0x8, 0x6d, 0x0, 0x0, @uid=r3}, @typed={0x6d, 0x85, 0x0, 0x0, @binary="52b5bcff89c7df45395c1035c09af5f7ee960a9d92076c24b35511f2766f63ad3b32ae20e1e5dfbf35b094120b505acea16d34100b4b531ec31cb47e5521553925617bfa0c222bd8e17333a3404279445f3a5bd66747e1671deb147e88b7c04a8c5a9e18fa1a2412e2"}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@private=0xa010100}]}, @generic="c0873a9fa2195039f51ba05f08c5854aa9c0d9d1f2ba846880e8c2859325f73417bbd911e03d5b80fe4aada5f2e9a124ea93ee81016dc6cd82a8eb38c08a7b0cf327583e42dc782636a351e8d1cc3b6da913603a2afd6b57f1ff24648718b2edc28b19b8e0ce50052c2f78eb4090236669febaeb08bff89baa500a09b688c717b70d09837d74cff480fa5a77ff57c924570f2cc410ebdc4ff2a372ffc3273c37fc1922ce0f15ca29f985c27c4f2ed4684db0847d23023ddb199f2f7be97d1ab7eeac7ee1"]}, 0x218}, 0x1, 0x0, 0x0, 0x40}, 0x881) chdir(&(0x7f0000000040)='./file0\x00') r4 = getpid() prlimit64(r4, 0x0, &(0x7f0000000000), 0x0) kcmp(r4, 0x0, 0x1, r0, r1) 02:39:37 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40040, 0x50) open_tree(r0, &(0x7f0000000040)='./file0\x00', 0x0) pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$AUTOFS_IOC_FAIL(r1, 0x9361, 0x3ff) fremovexattr(r1, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:39:37 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2e00, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:39:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x218, 0x3a, 0x200, 0x70bd26, 0x25dfdbfc, {0xc}, [@typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x17, 0x0, 0x0, @pid=r0}, @typed={0x88, 0x62, 0x0, 0x0, @binary="7c850ea846956521ee0d1131ac3478a6aad8bd4dc4512cbfd14ac2f369f1d2c617cba91dc7211d4d81924943a129edff9377b36aad855902230546e157995f371da0dc04bdb8c8229e24425915fe366edf183fc77c76bb47135ddd1ec9ae04c42c678633630fdf5c40ded6ad1431193005686b6573d2c1c0babe53ec0ef988fabf4f5e70"}, @nested={0x9c, 0x43, 0x0, 0x1, [@typed={0x6, 0x7c, 0x0, 0x0, @str='+\x00'}, @typed={0x10, 0x2, 0x0, 0x0, @str=']]}\'(,%^%++\x00'}, @typed={0x8, 0x6d, 0x0, 0x0, @uid=r1}, @typed={0x6d, 0x85, 0x0, 0x0, @binary="52b5bcff89c7df45395c1035c09af5f7ee960a9d92076c24b35511f2766f63ad3b32ae20e1e5dfbf35b094120b505acea16d34100b4b531ec31cb47e5521553925617bfa0c222bd8e17333a3404279445f3a5bd66747e1671deb147e88b7c04a8c5a9e18fa1a2412e2"}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@private=0xa010100}]}, @generic="c0873a9fa2195039f51ba05f08c5854aa9c0d9d1f2ba846880e8c2859325f73417bbd911e03d5b80fe4aada5f2e9a124ea93ee81016dc6cd82a8eb38c08a7b0cf327583e42dc782636a351e8d1cc3b6da913603a2afd6b57f1ff24648718b2edc28b19b8e0ce50052c2f78eb4090236669febaeb08bff89baa500a09b688c717b70d09837d74cff480fa5a77ff57c924570f2cc410ebdc4ff2a372ffc3273c37fc1922ce0f15ca29f985c27c4f2ed4684db0847d23023ddb199f2f7be97d1ab7eeac7ee1"]}, 0x218}, 0x1, 0x0, 0x0, 0x40}, 0x881) chdir(&(0x7f0000000040)='./file0\x00') r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000000), 0x0) gettid() 02:39:37 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1e87, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:39:38 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)) 02:39:38 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2e85, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:39:38 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x1f87, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:39:38 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x218, 0x3a, 0x200, 0x70bd26, 0x25dfdbfc, {0xc}, [@typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x17, 0x0, 0x0, @pid=r2}, @typed={0x88, 0x62, 0x0, 0x0, @binary="7c850ea846956521ee0d1131ac3478a6aad8bd4dc4512cbfd14ac2f369f1d2c617cba91dc7211d4d81924943a129edff9377b36aad855902230546e157995f371da0dc04bdb8c8229e24425915fe366edf183fc77c76bb47135ddd1ec9ae04c42c678633630fdf5c40ded6ad1431193005686b6573d2c1c0babe53ec0ef988fabf4f5e70"}, @nested={0x9c, 0x43, 0x0, 0x1, [@typed={0x6, 0x7c, 0x0, 0x0, @str='+\x00'}, @typed={0x10, 0x2, 0x0, 0x0, @str=']]}\'(,%^%++\x00'}, @typed={0x8, 0x6d, 0x0, 0x0, @uid=r3}, @typed={0x6d, 0x85, 0x0, 0x0, @binary="52b5bcff89c7df45395c1035c09af5f7ee960a9d92076c24b35511f2766f63ad3b32ae20e1e5dfbf35b094120b505acea16d34100b4b531ec31cb47e5521553925617bfa0c222bd8e17333a3404279445f3a5bd66747e1671deb147e88b7c04a8c5a9e18fa1a2412e2"}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@private=0xa010100}]}, @generic="c0873a9fa2195039f51ba05f08c5854aa9c0d9d1f2ba846880e8c2859325f73417bbd911e03d5b80fe4aada5f2e9a124ea93ee81016dc6cd82a8eb38c08a7b0cf327583e42dc782636a351e8d1cc3b6da913603a2afd6b57f1ff24648718b2edc28b19b8e0ce50052c2f78eb4090236669febaeb08bff89baa500a09b688c717b70d09837d74cff480fa5a77ff57c924570f2cc410ebdc4ff2a372ffc3273c37fc1922ce0f15ca29f985c27c4f2ed4684db0847d23023ddb199f2f7be97d1ab7eeac7ee1"]}, 0x218}, 0x1, 0x0, 0x0, 0x40}, 0x881) chdir(&(0x7f0000000040)='./file0\x00') r4 = getpid() prlimit64(r4, 0x0, &(0x7f0000000000), 0x0) kcmp(r4, 0x0, 0x1, r0, r1) 02:39:38 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x218, 0x3a, 0x200, 0x70bd26, 0x25dfdbfc, {0xc}, [@typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x17, 0x0, 0x0, @pid=r0}, @typed={0x88, 0x62, 0x0, 0x0, @binary="7c850ea846956521ee0d1131ac3478a6aad8bd4dc4512cbfd14ac2f369f1d2c617cba91dc7211d4d81924943a129edff9377b36aad855902230546e157995f371da0dc04bdb8c8229e24425915fe366edf183fc77c76bb47135ddd1ec9ae04c42c678633630fdf5c40ded6ad1431193005686b6573d2c1c0babe53ec0ef988fabf4f5e70"}, @nested={0x9c, 0x43, 0x0, 0x1, [@typed={0x6, 0x7c, 0x0, 0x0, @str='+\x00'}, @typed={0x10, 0x2, 0x0, 0x0, @str=']]}\'(,%^%++\x00'}, @typed={0x8, 0x6d, 0x0, 0x0, @uid=r1}, @typed={0x6d, 0x85, 0x0, 0x0, @binary="52b5bcff89c7df45395c1035c09af5f7ee960a9d92076c24b35511f2766f63ad3b32ae20e1e5dfbf35b094120b505acea16d34100b4b531ec31cb47e5521553925617bfa0c222bd8e17333a3404279445f3a5bd66747e1671deb147e88b7c04a8c5a9e18fa1a2412e2"}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@private=0xa010100}]}, @generic="c0873a9fa2195039f51ba05f08c5854aa9c0d9d1f2ba846880e8c2859325f73417bbd911e03d5b80fe4aada5f2e9a124ea93ee81016dc6cd82a8eb38c08a7b0cf327583e42dc782636a351e8d1cc3b6da913603a2afd6b57f1ff24648718b2edc28b19b8e0ce50052c2f78eb4090236669febaeb08bff89baa500a09b688c717b70d09837d74cff480fa5a77ff57c924570f2cc410ebdc4ff2a372ffc3273c37fc1922ce0f15ca29f985c27c4f2ed4684db0847d23023ddb199f2f7be97d1ab7eeac7ee1"]}, 0x218}, 0x1, 0x0, 0x0, 0x40}, 0x881) chdir(&(0x7f0000000040)='./file0\x00') r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000000), 0x0) 02:39:38 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') pkey_mprotect(&(0x7f0000002000/0x2000)=nil, 0x2000, 0xe, 0xffffffffffffffff) 02:39:38 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x8cffffff, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:39:38 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x218, 0x3a, 0x200, 0x70bd26, 0x25dfdbfc, {0xc}, [@typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x17, 0x0, 0x0, @pid=r2}, @typed={0x88, 0x62, 0x0, 0x0, @binary="7c850ea846956521ee0d1131ac3478a6aad8bd4dc4512cbfd14ac2f369f1d2c617cba91dc7211d4d81924943a129edff9377b36aad855902230546e157995f371da0dc04bdb8c8229e24425915fe366edf183fc77c76bb47135ddd1ec9ae04c42c678633630fdf5c40ded6ad1431193005686b6573d2c1c0babe53ec0ef988fabf4f5e70"}, @nested={0x9c, 0x43, 0x0, 0x1, [@typed={0x6, 0x7c, 0x0, 0x0, @str='+\x00'}, @typed={0x10, 0x2, 0x0, 0x0, @str=']]}\'(,%^%++\x00'}, @typed={0x8, 0x6d, 0x0, 0x0, @uid=r3}, @typed={0x6d, 0x85, 0x0, 0x0, @binary="52b5bcff89c7df45395c1035c09af5f7ee960a9d92076c24b35511f2766f63ad3b32ae20e1e5dfbf35b094120b505acea16d34100b4b531ec31cb47e5521553925617bfa0c222bd8e17333a3404279445f3a5bd66747e1671deb147e88b7c04a8c5a9e18fa1a2412e2"}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@private=0xa010100}]}, @generic="c0873a9fa2195039f51ba05f08c5854aa9c0d9d1f2ba846880e8c2859325f73417bbd911e03d5b80fe4aada5f2e9a124ea93ee81016dc6cd82a8eb38c08a7b0cf327583e42dc782636a351e8d1cc3b6da913603a2afd6b57f1ff24648718b2edc28b19b8e0ce50052c2f78eb4090236669febaeb08bff89baa500a09b688c717b70d09837d74cff480fa5a77ff57c924570f2cc410ebdc4ff2a372ffc3273c37fc1922ce0f15ca29f985c27c4f2ed4684db0847d23023ddb199f2f7be97d1ab7eeac7ee1"]}, 0x218}, 0x1, 0x0, 0x0, 0x40}, 0x881) chdir(&(0x7f0000000040)='./file0\x00') r4 = getpid() prlimit64(r4, 0x0, &(0x7f0000000000), 0x0) kcmp(r4, 0x0, 0x1, r0, r1) [ 1541.415429] kmemleak: 13 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:40:03 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2f85, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:40:03 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x218, 0x3a, 0x200, 0x70bd26, 0x25dfdbfc, {0xc}, [@typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x17, 0x0, 0x0, @pid=r0}, @typed={0x88, 0x62, 0x0, 0x0, @binary="7c850ea846956521ee0d1131ac3478a6aad8bd4dc4512cbfd14ac2f369f1d2c617cba91dc7211d4d81924943a129edff9377b36aad855902230546e157995f371da0dc04bdb8c8229e24425915fe366edf183fc77c76bb47135ddd1ec9ae04c42c678633630fdf5c40ded6ad1431193005686b6573d2c1c0babe53ec0ef988fabf4f5e70"}, @nested={0x9c, 0x43, 0x0, 0x1, [@typed={0x6, 0x7c, 0x0, 0x0, @str='+\x00'}, @typed={0x10, 0x2, 0x0, 0x0, @str=']]}\'(,%^%++\x00'}, @typed={0x8, 0x6d, 0x0, 0x0, @uid=r1}, @typed={0x6d, 0x85, 0x0, 0x0, @binary="52b5bcff89c7df45395c1035c09af5f7ee960a9d92076c24b35511f2766f63ad3b32ae20e1e5dfbf35b094120b505acea16d34100b4b531ec31cb47e5521553925617bfa0c222bd8e17333a3404279445f3a5bd66747e1671deb147e88b7c04a8c5a9e18fa1a2412e2"}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@private=0xa010100}]}, @generic="c0873a9fa2195039f51ba05f08c5854aa9c0d9d1f2ba846880e8c2859325f73417bbd911e03d5b80fe4aada5f2e9a124ea93ee81016dc6cd82a8eb38c08a7b0cf327583e42dc782636a351e8d1cc3b6da913603a2afd6b57f1ff24648718b2edc28b19b8e0ce50052c2f78eb4090236669febaeb08bff89baa500a09b688c717b70d09837d74cff480fa5a77ff57c924570f2cc410ebdc4ff2a372ffc3273c37fc1922ce0f15ca29f985c27c4f2ed4684db0847d23023ddb199f2f7be97d1ab7eeac7ee1"]}, 0x218}, 0x1, 0x0, 0x0, 0x40}, 0x881) chdir(&(0x7f0000000040)='./file0\x00') getpid() 02:40:03 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:40:03 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xc0ed0000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:40:03 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x218, 0x3a, 0x200, 0x70bd26, 0x25dfdbfc, {0xc}, [@typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x17, 0x0, 0x0, @pid=r2}, @typed={0x88, 0x62, 0x0, 0x0, @binary="7c850ea846956521ee0d1131ac3478a6aad8bd4dc4512cbfd14ac2f369f1d2c617cba91dc7211d4d81924943a129edff9377b36aad855902230546e157995f371da0dc04bdb8c8229e24425915fe366edf183fc77c76bb47135ddd1ec9ae04c42c678633630fdf5c40ded6ad1431193005686b6573d2c1c0babe53ec0ef988fabf4f5e70"}, @nested={0x9c, 0x43, 0x0, 0x1, [@typed={0x6, 0x7c, 0x0, 0x0, @str='+\x00'}, @typed={0x10, 0x2, 0x0, 0x0, @str=']]}\'(,%^%++\x00'}, @typed={0x8, 0x6d, 0x0, 0x0, @uid=r3}, @typed={0x6d, 0x85, 0x0, 0x0, @binary="52b5bcff89c7df45395c1035c09af5f7ee960a9d92076c24b35511f2766f63ad3b32ae20e1e5dfbf35b094120b505acea16d34100b4b531ec31cb47e5521553925617bfa0c222bd8e17333a3404279445f3a5bd66747e1671deb147e88b7c04a8c5a9e18fa1a2412e2"}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@private=0xa010100}]}, @generic="c0873a9fa2195039f51ba05f08c5854aa9c0d9d1f2ba846880e8c2859325f73417bbd911e03d5b80fe4aada5f2e9a124ea93ee81016dc6cd82a8eb38c08a7b0cf327583e42dc782636a351e8d1cc3b6da913603a2afd6b57f1ff24648718b2edc28b19b8e0ce50052c2f78eb4090236669febaeb08bff89baa500a09b688c717b70d09837d74cff480fa5a77ff57c924570f2cc410ebdc4ff2a372ffc3273c37fc1922ce0f15ca29f985c27c4f2ed4684db0847d23023ddb199f2f7be97d1ab7eeac7ee1"]}, 0x218}, 0x1, 0x0, 0x0, 0x40}, 0x881) chdir(&(0x7f0000000040)='./file0\x00') r4 = getpid() r5 = gettid() kcmp(r4, r5, 0x1, r0, r1) 02:40:03 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r1) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r1) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x800005, r1) 02:40:03 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) lsetxattr$trusted_overlay_redirect(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x8, 0x1) perf_event_open(&(0x7f0000000080)={0x2fb9b64325d58575, 0x80, 0x40, 0x5, 0x1, 0x1, 0x0, 0x6, 0x84004, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_config_ext={0x101, 0x8}, 0x0, 0xa207, 0x7ff, 0x0, 0x2, 0x8, 0x200, 0x0, 0x5, 0x0, 0x7}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0x2) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@dev={0xfe, 0x80, '\x00', 0x15}}, 0x14) r2 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$F2FS_IOC_GARBAGE_COLLECT_RANGE(r2, 0x4018f50b, &(0x7f0000000340)={0x1, 0x9, 0x8}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'xfrm0\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:40:03 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:40:03 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2010, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:40:03 executing program 3: sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x2c, 0x0, 0x100, 0x70bd2a, 0x25dfdbfd, {{}, {}, {0x10, 0x13, @udp='udp:syz2\x00'}}, ["", "", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fspick(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0) 02:40:03 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3085, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:40:03 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x218, 0x3a, 0x200, 0x70bd26, 0x25dfdbfc, {0xc}, [@typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x17, 0x0, 0x0, @pid=r2}, @typed={0x88, 0x62, 0x0, 0x0, @binary="7c850ea846956521ee0d1131ac3478a6aad8bd4dc4512cbfd14ac2f369f1d2c617cba91dc7211d4d81924943a129edff9377b36aad855902230546e157995f371da0dc04bdb8c8229e24425915fe366edf183fc77c76bb47135ddd1ec9ae04c42c678633630fdf5c40ded6ad1431193005686b6573d2c1c0babe53ec0ef988fabf4f5e70"}, @nested={0x9c, 0x43, 0x0, 0x1, [@typed={0x6, 0x7c, 0x0, 0x0, @str='+\x00'}, @typed={0x10, 0x2, 0x0, 0x0, @str=']]}\'(,%^%++\x00'}, @typed={0x8, 0x6d, 0x0, 0x0, @uid=r3}, @typed={0x6d, 0x85, 0x0, 0x0, @binary="52b5bcff89c7df45395c1035c09af5f7ee960a9d92076c24b35511f2766f63ad3b32ae20e1e5dfbf35b094120b505acea16d34100b4b531ec31cb47e5521553925617bfa0c222bd8e17333a3404279445f3a5bd66747e1671deb147e88b7c04a8c5a9e18fa1a2412e2"}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@private=0xa010100}]}, @generic="c0873a9fa2195039f51ba05f08c5854aa9c0d9d1f2ba846880e8c2859325f73417bbd911e03d5b80fe4aada5f2e9a124ea93ee81016dc6cd82a8eb38c08a7b0cf327583e42dc782636a351e8d1cc3b6da913603a2afd6b57f1ff24648718b2edc28b19b8e0ce50052c2f78eb4090236669febaeb08bff89baa500a09b688c717b70d09837d74cff480fa5a77ff57c924570f2cc410ebdc4ff2a372ffc3273c37fc1922ce0f15ca29f985c27c4f2ed4684db0847d23023ddb199f2f7be97d1ab7eeac7ee1"]}, 0x218}, 0x1, 0x0, 0x0, 0x40}, 0x881) chdir(&(0x7f0000000040)='./file0\x00') r4 = gettid() kcmp(0x0, r4, 0x1, r0, r1) 02:40:03 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x218, 0x3a, 0x200, 0x70bd26, 0x25dfdbfc, {0xc}, [@typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x17, 0x0, 0x0, @pid=r0}, @typed={0x88, 0x62, 0x0, 0x0, @binary="7c850ea846956521ee0d1131ac3478a6aad8bd4dc4512cbfd14ac2f369f1d2c617cba91dc7211d4d81924943a129edff9377b36aad855902230546e157995f371da0dc04bdb8c8229e24425915fe366edf183fc77c76bb47135ddd1ec9ae04c42c678633630fdf5c40ded6ad1431193005686b6573d2c1c0babe53ec0ef988fabf4f5e70"}, @nested={0x9c, 0x43, 0x0, 0x1, [@typed={0x6, 0x7c, 0x0, 0x0, @str='+\x00'}, @typed={0x10, 0x2, 0x0, 0x0, @str=']]}\'(,%^%++\x00'}, @typed={0x8, 0x6d, 0x0, 0x0, @uid=r1}, @typed={0x6d, 0x85, 0x0, 0x0, @binary="52b5bcff89c7df45395c1035c09af5f7ee960a9d92076c24b35511f2766f63ad3b32ae20e1e5dfbf35b094120b505acea16d34100b4b531ec31cb47e5521553925617bfa0c222bd8e17333a3404279445f3a5bd66747e1671deb147e88b7c04a8c5a9e18fa1a2412e2"}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@private=0xa010100}]}, @generic="c0873a9fa2195039f51ba05f08c5854aa9c0d9d1f2ba846880e8c2859325f73417bbd911e03d5b80fe4aada5f2e9a124ea93ee81016dc6cd82a8eb38c08a7b0cf327583e42dc782636a351e8d1cc3b6da913603a2afd6b57f1ff24648718b2edc28b19b8e0ce50052c2f78eb4090236669febaeb08bff89baa500a09b688c717b70d09837d74cff480fa5a77ff57c924570f2cc410ebdc4ff2a372ffc3273c37fc1922ce0f15ca29f985c27c4f2ed4684db0847d23023ddb199f2f7be97d1ab7eeac7ee1"]}, 0x218}, 0x1, 0x0, 0x0, 0x40}, 0x881) chdir(&(0x7f0000000040)='./file0\x00') 02:40:03 executing program 5: r0 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc3}, &(0x7f0000000100)={0x0, "3339b7878a1c91bbd7511e9f0230d3de41391b9b52b98b015a8460bbb4be26f73d7663f703da9b7df7c4c66762b16e6eb6231ce5c27f841f14881a9ebc769b6e"}, 0x48, 0xfffffffffffffffd) r1 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc3}, &(0x7f0000000100)={0x0, "3339b7878a1c91bbd7511e9f0230d3de41391b9b52b98b015a8460bbb4be26f73d7663f703da9b7df7c4c66762b16e6eb6231ce5c27f841f14881a9ebc769b6e"}, 0x48, 0xfffffffffffffffd) keyctl$update(0x2, r1, &(0x7f00000008c0)="b6", 0x1) keyctl$unlink(0x9, r1, r0) keyctl$update(0x2, r0, &(0x7f00000008c0)="b6", 0x1) r2 = request_key(&(0x7f0000000180)='.request_key_auth\x00', &(0x7f0000000000)={'syz', 0x1}, &(0x7f0000000080)='trusted.overlay.origin\x00', 0xfffffffffffffffa) keyctl$KEYCTL_MOVE(0x1e, 0x0, r0, r2, 0x0) pkey_mprotect(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r3, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000002c0)={'macvtap0\x00'}) getsockopt$sock_buf(r4, 0x1, 0x1c, &(0x7f00000001c0)=""/249, &(0x7f0000000040)=0xf9) 02:40:03 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2087, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:40:03 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3185, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1565.501312] kmemleak: 5 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:40:28 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:40:28 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3285, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:40:28 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xf6ffffff, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:40:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x5bc) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r1, 0x400c620e, 0x0) r2 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r2, 0xf507, 0x0) write$P9_RREMOVE(r1, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) r3 = syz_open_dev$ttys(0xc, 0x2, 0x1) readlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000300)=""/246, 0xf6) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000080)={0x401, 0x200, 0xd31c, 0x101, 0x35ba}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:40:28 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x218, 0x3a, 0x200, 0x70bd26, 0x25dfdbfc, {0xc}, [@typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x17, 0x0, 0x0, @pid=r2}, @typed={0x88, 0x62, 0x0, 0x0, @binary="7c850ea846956521ee0d1131ac3478a6aad8bd4dc4512cbfd14ac2f369f1d2c617cba91dc7211d4d81924943a129edff9377b36aad855902230546e157995f371da0dc04bdb8c8229e24425915fe366edf183fc77c76bb47135ddd1ec9ae04c42c678633630fdf5c40ded6ad1431193005686b6573d2c1c0babe53ec0ef988fabf4f5e70"}, @nested={0x9c, 0x43, 0x0, 0x1, [@typed={0x6, 0x7c, 0x0, 0x0, @str='+\x00'}, @typed={0x10, 0x2, 0x0, 0x0, @str=']]}\'(,%^%++\x00'}, @typed={0x8, 0x6d, 0x0, 0x0, @uid=r3}, @typed={0x6d, 0x85, 0x0, 0x0, @binary="52b5bcff89c7df45395c1035c09af5f7ee960a9d92076c24b35511f2766f63ad3b32ae20e1e5dfbf35b094120b505acea16d34100b4b531ec31cb47e5521553925617bfa0c222bd8e17333a3404279445f3a5bd66747e1671deb147e88b7c04a8c5a9e18fa1a2412e2"}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@private=0xa010100}]}, @generic="c0873a9fa2195039f51ba05f08c5854aa9c0d9d1f2ba846880e8c2859325f73417bbd911e03d5b80fe4aada5f2e9a124ea93ee81016dc6cd82a8eb38c08a7b0cf327583e42dc782636a351e8d1cc3b6da913603a2afd6b57f1ff24648718b2edc28b19b8e0ce50052c2f78eb4090236669febaeb08bff89baa500a09b688c717b70d09837d74cff480fa5a77ff57c924570f2cc410ebdc4ff2a372ffc3273c37fc1922ce0f15ca29f985c27c4f2ed4684db0847d23023ddb199f2f7be97d1ab7eeac7ee1"]}, 0x218}, 0x1, 0x0, 0x0, 0x40}, 0x881) chdir(&(0x7f0000000040)='./file0\x00') r4 = gettid() kcmp(0x0, r4, 0x1, r0, r1) 02:40:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x218, 0x3a, 0x200, 0x70bd26, 0x25dfdbfc, {0xc}, [@typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x17, 0x0, 0x0, @pid=r0}, @typed={0x88, 0x62, 0x0, 0x0, @binary="7c850ea846956521ee0d1131ac3478a6aad8bd4dc4512cbfd14ac2f369f1d2c617cba91dc7211d4d81924943a129edff9377b36aad855902230546e157995f371da0dc04bdb8c8229e24425915fe366edf183fc77c76bb47135ddd1ec9ae04c42c678633630fdf5c40ded6ad1431193005686b6573d2c1c0babe53ec0ef988fabf4f5e70"}, @nested={0x9c, 0x43, 0x0, 0x1, [@typed={0x6, 0x7c, 0x0, 0x0, @str='+\x00'}, @typed={0x10, 0x2, 0x0, 0x0, @str=']]}\'(,%^%++\x00'}, @typed={0x8, 0x6d, 0x0, 0x0, @uid=r1}, @typed={0x6d, 0x85, 0x0, 0x0, @binary="52b5bcff89c7df45395c1035c09af5f7ee960a9d92076c24b35511f2766f63ad3b32ae20e1e5dfbf35b094120b505acea16d34100b4b531ec31cb47e5521553925617bfa0c222bd8e17333a3404279445f3a5bd66747e1671deb147e88b7c04a8c5a9e18fa1a2412e2"}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@private=0xa010100}]}, @generic="c0873a9fa2195039f51ba05f08c5854aa9c0d9d1f2ba846880e8c2859325f73417bbd911e03d5b80fe4aada5f2e9a124ea93ee81016dc6cd82a8eb38c08a7b0cf327583e42dc782636a351e8d1cc3b6da913603a2afd6b57f1ff24648718b2edc28b19b8e0ce50052c2f78eb4090236669febaeb08bff89baa500a09b688c717b70d09837d74cff480fa5a77ff57c924570f2cc410ebdc4ff2a372ffc3273c37fc1922ce0f15ca29f985c27c4f2ed4684db0847d23023ddb199f2f7be97d1ab7eeac7ee1"]}, 0x218}, 0x1, 0x0, 0x0, 0x40}, 0x881) 02:40:28 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2187, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:40:28 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {0xffffffffffffffff, 0xee01}}, './file0\x00'}) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e21, 0x7f, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x100}, 0x1c) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:40:28 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) 02:40:28 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3385, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:40:28 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x218, 0x3a, 0x200, 0x70bd26, 0x25dfdbfc, {0xc}, [@typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x17, 0x0, 0x0, @pid=r2}, @typed={0x88, 0x62, 0x0, 0x0, @binary="7c850ea846956521ee0d1131ac3478a6aad8bd4dc4512cbfd14ac2f369f1d2c617cba91dc7211d4d81924943a129edff9377b36aad855902230546e157995f371da0dc04bdb8c8229e24425915fe366edf183fc77c76bb47135ddd1ec9ae04c42c678633630fdf5c40ded6ad1431193005686b6573d2c1c0babe53ec0ef988fabf4f5e70"}, @nested={0x9c, 0x43, 0x0, 0x1, [@typed={0x6, 0x7c, 0x0, 0x0, @str='+\x00'}, @typed={0x10, 0x2, 0x0, 0x0, @str=']]}\'(,%^%++\x00'}, @typed={0x8, 0x6d, 0x0, 0x0, @uid=r3}, @typed={0x6d, 0x85, 0x0, 0x0, @binary="52b5bcff89c7df45395c1035c09af5f7ee960a9d92076c24b35511f2766f63ad3b32ae20e1e5dfbf35b094120b505acea16d34100b4b531ec31cb47e5521553925617bfa0c222bd8e17333a3404279445f3a5bd66747e1671deb147e88b7c04a8c5a9e18fa1a2412e2"}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@private=0xa010100}]}, @generic="c0873a9fa2195039f51ba05f08c5854aa9c0d9d1f2ba846880e8c2859325f73417bbd911e03d5b80fe4aada5f2e9a124ea93ee81016dc6cd82a8eb38c08a7b0cf327583e42dc782636a351e8d1cc3b6da913603a2afd6b57f1ff24648718b2edc28b19b8e0ce50052c2f78eb4090236669febaeb08bff89baa500a09b688c717b70d09837d74cff480fa5a77ff57c924570f2cc410ebdc4ff2a372ffc3273c37fc1922ce0f15ca29f985c27c4f2ed4684db0847d23023ddb199f2f7be97d1ab7eeac7ee1"]}, 0x218}, 0x1, 0x0, 0x0, 0x40}, 0x881) chdir(&(0x7f0000000040)='./file0\x00') r4 = gettid() kcmp(0x0, r4, 0x1, r0, r1) 02:40:28 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2287, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:40:28 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/251, 0xfb) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:40:28 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xffff0000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1590.539880] kmemleak: 8 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:40:51 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:40:51 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3485, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:40:51 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xffffff8c, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:40:51 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000080)={&(0x7f0000000140)={0x218, 0x3a, 0x200, 0x70bd26, 0x25dfdbfc, {0xc}, [@typed={0x14, 0x8c, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x17, 0x0, 0x0, @pid=r2}, @typed={0x88, 0x62, 0x0, 0x0, @binary="7c850ea846956521ee0d1131ac3478a6aad8bd4dc4512cbfd14ac2f369f1d2c617cba91dc7211d4d81924943a129edff9377b36aad855902230546e157995f371da0dc04bdb8c8229e24425915fe366edf183fc77c76bb47135ddd1ec9ae04c42c678633630fdf5c40ded6ad1431193005686b6573d2c1c0babe53ec0ef988fabf4f5e70"}, @nested={0x9c, 0x43, 0x0, 0x1, [@typed={0x6, 0x7c, 0x0, 0x0, @str='+\x00'}, @typed={0x10, 0x2, 0x0, 0x0, @str=']]}\'(,%^%++\x00'}, @typed={0x8, 0x6d, 0x0, 0x0, @uid=r3}, @typed={0x6d, 0x85, 0x0, 0x0, @binary="52b5bcff89c7df45395c1035c09af5f7ee960a9d92076c24b35511f2766f63ad3b32ae20e1e5dfbf35b094120b505acea16d34100b4b531ec31cb47e5521553925617bfa0c222bd8e17333a3404279445f3a5bd66747e1671deb147e88b7c04a8c5a9e18fa1a2412e2"}, @typed={0x8, 0x40, 0x0, 0x0, @ipv4=@private=0xa010100}]}, @generic="c0873a9fa2195039f51ba05f08c5854aa9c0d9d1f2ba846880e8c2859325f73417bbd911e03d5b80fe4aada5f2e9a124ea93ee81016dc6cd82a8eb38c08a7b0cf327583e42dc782636a351e8d1cc3b6da913603a2afd6b57f1ff24648718b2edc28b19b8e0ce50052c2f78eb4090236669febaeb08bff89baa500a09b688c717b70d09837d74cff480fa5a77ff57c924570f2cc410ebdc4ff2a372ffc3273c37fc1922ce0f15ca29f985c27c4f2ed4684db0847d23023ddb199f2f7be97d1ab7eeac7ee1"]}, 0x218}, 0x1, 0x0, 0x0, 0x40}, 0x881) r4 = getpid() r5 = gettid() kcmp(r4, r5, 0x1, r0, r1) 02:40:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) 02:40:51 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2387, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:40:51 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5ca0, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r0, 0x400c620e, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000100)={{0x1, 0x1, 0x18, r1, {0xf53}}, './file0\x00'}) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) ioctl$sock_ipv6_tunnel_SIOCADD6RD(0xffffffffffffffff, 0x89f9, &(0x7f0000000000)={'ip6_vti0\x00', &(0x7f0000000080)={'sit0\x00', 0x0, 0x29, 0x6, 0x9, 0x0, 0x56, @ipv4={'\x00', '\xff\xff', @multicast1}, @mcast2, 0x7800, 0x8, 0xfff, 0xd8c6}}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'macvtap0\x00'}) 02:40:51 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r0) pkey_mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x9, r0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r1, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') pkey_mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) 02:40:51 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) lstat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) r4 = getpid() r5 = gettid() kcmp(r4, r5, 0x1, r0, r1) 02:40:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) 02:40:51 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2487, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:40:51 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3585, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:40:51 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xfffffff6, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:40:51 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r0, 0xc018937a, &(0x7f0000000340)={{0x1, 0x1, 0x18, r0, {0xfffffffffffffffa}}, './file0\x00'}) write$P9_RSTAT(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="470000007d020000004000060006000000a0000000070300000000000000000000000600000000800000070700000000000001000006005c6428402a280500282a2a40260100009d877820b5de80f58b0ee89585"], 0xfc5e) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000280)=@v2={0x3, 0x2, 0x1, 0x7ff, 0xae, "7f6ffd9311311dbb952b7468f55bda35096e334c7691a51c4e65831984f95b6257d6ed7e2d41c3c2e66c48537101fcf6fab312b949b4935e6b2a9eeab9d35f1201462c36669843eba4eb7d51a3947c406e9edd90a61f2f2b6cd9f2b2c64f99b36d1e0ec98e6a4138e87cdfbd4f5b9dbfd362a7fa8afdb15a402402e367ca0430f487d29ada838928c01f1da3e1109fda9524a3235a3dfc00800a003e793f2eea9276ebf67665662822fa20d1ea18"}, 0xb7, 0x2) write$P9_ROPEN(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0x71, 0x2, {{0x1, 0x4, 0x6}, 0x3}}, 0x18) [ 1616.422370] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:41:18 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) r4 = getpid() r5 = gettid() kcmp(r4, r5, 0x1, r0, r1) 02:41:18 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3685, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:41:18 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:41:18 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xedc000000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:41:18 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2587, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:41:18 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:41:18 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x0) pkey_mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000000, r0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r1, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') r2 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r2) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r2) pkey_mprotect(&(0x7f0000ffa000/0x1000)=nil, 0x1000, 0x1, r2) 02:41:18 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) 02:41:19 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000000, 0xffffffffffffffff) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000000)={0x0, 0x6}, 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r1, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x1}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r2, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:41:19 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3785, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:41:19 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2687, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:41:19 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0xb40b4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5c94ce39, 0xeaab00}, 0x0, 0x0, 0x7}, 0x0, 0x1, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) readlink(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000080)=""/186, 0xba) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) readlink(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000280)=""/29, 0x1d) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readlink(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)=""/34, 0x22) 02:41:19 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) 02:41:19 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)) r3 = getpid() r4 = gettid() kcmp(r3, r4, 0x1, r0, r1) 02:41:19 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x1000000000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:41:19 executing program 5: pkey_mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:41:19 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2787, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:41:19 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3885, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1641.657492] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:41:43 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) r3 = getpid() r4 = gettid() kcmp(r3, r4, 0x1, r0, r1) 02:41:43 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:41:43 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x8000000000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:41:43 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x6, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:41:43 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xf, 0x1, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x4, 0x3d, 0x8, 0x3, 0x0, 0x8, 0x4a20, 0x4, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000000), 0x3}, 0xc181, 0x695, 0xd5c4, 0x0, 0x8, 0xfffffbff, 0xe56, 0x0, 0x80, 0x0, 0x6}, 0xffffffffffffffff, 0x4, r0, 0x1) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:41:43 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) 02:41:43 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2887, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:41:43 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3985, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:41:43 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2987, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:41:43 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3a85, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:41:43 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f0000000100)={0x1a, 0x17, 0xc, 0x1, 0x3, 0x9, 0x2, 0x15a, 0x1}) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x30, 0xdc, 0x5, 0x1, 0x0, 0x7, 0xd000, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xf8a, 0x0, @perf_config_ext={0xffffffffffffffff, 0x3}, 0x40000, 0x2, 0x73, 0x3, 0x2, 0x6, 0xb253, 0x0, 0x3a93, 0x0, 0x4000000000000000}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0xe) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x7b, 0x1}, 0x7) 02:41:43 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) 02:41:43 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getpid() r2 = getpid() r3 = gettid() kcmp(r2, r3, 0x1, r0, r1) 02:41:43 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x100000000000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:41:43 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2a87, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:41:43 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() prlimit64(r0, 0x0, &(0x7f0000000000), 0x0) prlimit64(r0, 0x0, &(0x7f0000000280)={0x80000000, 0x21c2}, &(0x7f00000002c0)) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x7, 0x1, 0x3f, 0x20, 0x0, 0x3, 0x80030, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0xdf, 0x74ceb519a0223ef0, @perf_config_ext={0x7f, 0x1382}, 0x80, 0x0, 0xffff80a0, 0x7, 0x6, 0x0, 0x453f, 0x0, 0x9, 0x0, 0x2be}, r0, 0xd, 0xffffffffffffffff, 0x8) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) prlimit64(r0, 0x0, &(0x7f0000000100)={0xffffffffffffffdb, 0x5}, &(0x7f0000000140)) [ 1666.169309] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:42:07 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) 02:42:07 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:42:07 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x200000000000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:42:07 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2b87, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:42:07 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3b85, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:42:07 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() r3 = gettid() kcmp(r2, r3, 0x1, r0, r1) 02:42:07 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) write$P9_RSTAT(r0, &(0x7f0000000080)={0x47, 0x7d, 0x2, {0x0, 0x40, 0x0, 0x1f, {0x0, 0x3, 0x3}, 0x1880000, 0x6d8, 0x3092, 0xfad, 0x1, '\x00', 0x1, '\x00', 0x1, '\x00', 0xa, '())\\}*#\xec-{'}}, 0x47) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:42:07 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r0) pkey_mprotect(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3000003, r0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r1, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:42:07 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:42:07 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = gettid() kcmp(r1, r2, 0x1, r0, 0xffffffffffffffff) 02:42:07 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2c87, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:42:07 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) 02:42:07 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3c85, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:42:07 executing program 3: sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x20, 0x2, 0x6, 0x801, 0x0, 0x0, {0x1, 0x0, 0x8}, [@IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}]}, 0x20}, 0x1, 0x0, 0x0, 0x48000}, 0x48800) r0 = perf_event_open(&(0x7f0000000200)={0x3, 0x80, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x5) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r1 = getpid() prlimit64(r1, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) r2 = fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x40, 0x8, 0x8, 0x2b, 0x0, 0x1, 0x8000, 0xb, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x800, 0x4, @perf_config_ext={0xc10, 0x9}, 0x0, 0x9, 0x4f06, 0x8, 0x9, 0x0, 0xff, 0x0, 0xbc9, 0x0, 0x20000000005}, r1, 0xd, r2, 0xb) ioctl$sock_ipv6_tunnel_SIOCADDPRL(0xffffffffffffffff, 0x89f5, &(0x7f0000000000)={'syztnl0\x00', &(0x7f0000000080)={'syztnl1\x00', 0x0, 0x2f, 0x70, 0x14, 0x3, 0x60, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @private1={0xfc, 0x1, '\x00', 0x6}, 0x80, 0x700, 0x80, 0xff}}) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x948002, 0x0) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r5, 0x400c620e, 0x0) write$P9_RSTAT(r5, &(0x7f0000000300)={0x4c, 0x7d, 0x2, {0x0, 0x45, 0x5, 0x360a, {0x8, 0x4, 0x1}, 0x100100000, 0x5, 0xe0, 0x7, 0x1, ')', 0x8, 'syztnl0\x00', 0x8, 'syztnl1\x00', 0x1, ')'}}, 0x4c) ioctl$sock_FIOGETOWN(r4, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r4, 0x400c620e, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x32, &(0x7f0000000040)={@dev={0xfe, 0x80, '\x00', 0x32}, r3}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f0000000280)={'sit0\x00', r3, 0x4, 0x33, 0x6, 0x1ff, 0x1c, @empty, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x80, 0x80, 0xcff, 0x8000}}) 02:42:07 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x700000000000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:42:07 executing program 6: r0 = getpid() r1 = gettid() kcmp(r0, r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 02:42:07 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') r1 = syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x4, 0x3, &(0x7f00000002c0)=[{&(0x7f0000000100)="79e84e30167a262008b731cef3f7d5d008f38cee68c7f72b750b0795b1ad42b42a2fa6371c6572a376243d73180464ab496810f89db456390f62d9cd3fe8a254b46112f8468c410a3d514462e7c81165", 0x50, 0x2a}, {&(0x7f0000000180)="f7245ce646ad5c420e9a79eddfbc7cc0ca830218c8afb84a4bcd1558c3d2f39e2746c8a5ab9aee31284895c15a538535ca77ee1d99b8d9f9b2534346661474425cd0fb2aac4b49a55fd4383438ad2ef6575c6c9df1ebea49721e5965902a0465a467adb54a469b7eb0b6f80eea859a7ea76e1c", 0x73, 0x1658}, {&(0x7f0000000200)="f681b20d509f6bb5c885ae0b65e916b3cf1ff91fbf4aebb4d3ab5fe9c8ba9a721c37a29f0c56346b031456f04ae4ec871531e2dfb542f9a2b6d957aa428c75948f45be96faa53ab10829bcf25316dfcc9c0c2b7187cb06e3db55431a38225ffb37476125501f6db2c2f1c94902a5148ec3cf8f67cae4a8e8bc12664b5b4f261184f04f1e5be1668f5789ef0b3e1df75576f4ed1577a260127302f7407579636eac540b3394e4bac9f08b1c8c7d49320906e401873a44ec0298f6b8c70fa2bf", 0xbf, 0x9}], 0x180000, &(0x7f0000000340)={[{'#**'}, {'-[\x00'}, {'trusted.overlay.origin\x00'}], [{@smackfstransmute={'smackfstransmute', 0x3d, '!{){!)*@*+!W}'}}, {@subj_role={'subj_role', 0x3d, '/:^'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@dont_appraise}, {@context={'context', 0x3d, 'staff_u'}}, {@euid_gt={'euid>', 0xee00}}, {@euid_eq={'euid', 0x3d, 0xee00}}]}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000440)=ANY=[@ANYBLOB="01000000010000001800004213c31b3f58f43cffa7ab7ca3e555ec8965f861a5619762d575471a3c221d1253b637984a15de74051423cb81fb83c724e5153da3a801719538efac9b2f5cdaec06e4d1927f4b98486513599b152a32a06b1969becfc622e640b6f908b10e9ce4cad3408b60b7951b0ffd81eee3004e23935407b6add360023993c61590ef41f256db40438780cd9e", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32=0xee00, @ANYBLOB='./file0\x00']) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000400)={0x0, r2, 0x922, 0x838, 0x400}) [ 1690.224914] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:42:31 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) 02:42:31 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x800000000000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:42:31 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:42:31 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2d87, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:42:31 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/61, 0x3d) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:42:31 executing program 6: r0 = getpid() r1 = gettid() kcmp(r0, r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 02:42:31 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3d85, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:42:31 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x1000000, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) readv(r0, &(0x7f0000000480)=[{}, {&(0x7f0000000040)=""/122, 0x7a}, {&(0x7f0000000100)=""/173, 0xad}, {&(0x7f00000001c0)=""/73, 0x49}, {&(0x7f0000000240)=""/179, 0xb3}, {&(0x7f0000000300)=""/76, 0x4c}, {&(0x7f0000000380)}, {&(0x7f00000003c0)=""/131, 0x83}], 0x8) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:42:31 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) 02:42:31 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000000), &(0x7f0000000040)=0x40) 02:42:31 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000280)={0x0, 0x0}) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x7, 0x7f, 0x89, 0x3, 0x0, 0x3, 0x41, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x81, 0x2, @perf_config_ext={0x800, 0xfffffffffffffe00}, 0xa, 0x0, 0x400, 0x4, 0x36, 0x6, 0xea13, 0x0, 0x9, 0x0, 0x1}, r1, 0xc, r0, 0x8) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/80, 0x50) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:42:31 executing program 6: r0 = getpid() r1 = gettid() kcmp(r0, r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 02:42:31 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2e00, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:42:31 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3e85, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:42:31 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x900000000000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:42:31 executing program 1: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) 02:42:31 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2e87, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:42:31 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3f00, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:42:47 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private1={0xfc, 0x1, '\x00', 0x1}}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:42:47 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:42:47 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xa00000000000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:42:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) 02:42:47 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x2f87, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:42:47 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3f85, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:42:47 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') fsconfig$FSCONFIG_CMD_RECONFIGURE(0xffffffffffffffff, 0x7, 0x0, 0x0, 0x0) 02:42:47 executing program 6: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = gettid() kcmp(r1, r2, 0x1, r0, 0xffffffffffffffff) 02:42:47 executing program 6: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = gettid() kcmp(r1, r2, 0x1, r0, 0xffffffffffffffff) 02:42:47 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:42:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) [ 1730.455553] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:43:11 executing program 6: r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = gettid() kcmp(r1, r2, 0x1, r0, 0xffffffffffffffff) 02:43:11 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:43:11 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000004, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r0) pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4, r0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r1, &(0x7f0000000000)=@random={'btrfs.', 'G\x06\x8b\xe5\xf9\tza)7V4B\x13\x7f\xcd\xbcQ\xa9\x0e\xe7\x00G\xd8\'\xcc\xd9\xefN\xf7\xf6\xa0\xac\xeeR`\xa5\xff\xbfS\xd8\xdc\xbcq\xd9\xbd\xc7\xd8d\x0f'}) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x1000009, 0x30, 0xffffffffffffffff, 0x0) 02:43:11 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) write$P9_RSETATTR(r0, &(0x7f0000000000)={0x7, 0x1b, 0x2}, 0x7) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:43:11 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3087, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:43:11 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4084, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:43:11 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xb00000000000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:43:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) 02:43:11 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4085, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:43:11 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3187, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:43:11 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = gettid() kcmp(r1, r2, 0x1, r0, 0xffffffffffffffff) 02:43:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) 02:43:11 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) 02:43:11 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) 02:43:11 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x1000000000000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:43:11 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4185, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:43:11 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3287, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1753.583959] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1757.325087] hpet: Lost 1 RTC interrupts 02:43:35 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffa}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:43:35 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r1) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r1) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1, r1) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:43:35 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:43:35 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = gettid() kcmp(r1, r2, 0x1, r0, 0xffffffffffffffff) 02:43:35 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) 02:43:35 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4285, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:43:35 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3387, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:43:35 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2000000000000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:43:35 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) 02:43:35 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = gettid() kcmp(r1, r2, 0x1, r0, 0xffffffffffffffff) 02:43:35 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3487, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:43:35 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6201, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:43:35 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000040)={{0x1, 0x1, 0x18, r1, {r0}}, './file0\x00'}) r3 = syz_open_dev$mouse(&(0x7f00000000c0), 0x31, 0x58280) write$P9_RSTAT(r3, &(0x7f0000000100)={0x42, 0x7d, 0x1, {0x0, 0x3b, 0x101, 0x34, {0x781024730960b1dc, 0x3, 0x6}, 0x80000000, 0x4, 0x10001, 0x4, 0x4, '.#!\\', 0x1, '&', 0x1, '\x00', 0x2, '$@'}}, 0x42) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x840}, 0x10) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r2, 0xc018937d, &(0x7f0000000080)={{0x1, 0x1, 0x18, r4, {0x81}}, './file0\x00'}) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x32, &(0x7f0000000000)={@private0={0xfc, 0x0, '\x00', 0x81}}, 0x14) ioctl$TCSETS2(r1, 0x402c542b, &(0x7f0000000300)={0x0, 0x10001, 0x80000000, 0x3ff, 0x92, "c23159ea1613429b0a7ec5b42c55fe876b0812", 0x8, 0x865}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_rx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) r5 = open_tree(r2, &(0x7f0000000340)='./file0\x00', 0x80001) tee(0xffffffffffffffff, r5, 0x8, 0x1) 02:43:35 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) 02:43:35 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = gettid() kcmp(r1, r2, 0x1, r0, 0xffffffffffffffff) 02:43:35 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x2010000000000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:43:35 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3587, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:43:35 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6485, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:43:51 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xe, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='./file0\x00') write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x41, 0x7d, 0x1, {0x0, 0x3a, 0x3, 0x5, {0x1, 0x4, 0x1}, 0x12000000, 0x9, 0x153f, 0x80000001, 0x1, '\'', 0x0, '', 0x5, '\r!\\\x15\x04', 0x1, '@'}}, 0x41) setxattr$trusted_overlay_redirect(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x8, 0x3) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:43:51 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:43:51 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x8cffffff00000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:43:51 executing program 5: r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0xad1f010e5d74be6c, r0) r1 = pkey_alloc(0x0, 0x1) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pkey_mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x1, r1) r3 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1000002, r3) fremovexattr(r2, &(0x7f0000000000)=@random={'osx.', 'trusted.overlay.nlink\x00'}) pkey_mprotect(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x4, 0xffffffffffffffff) r4 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r4) pkey_mprotect(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x1800000, r0) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r4) pkey_mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, r3) 02:43:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f00000000c0)) 02:43:51 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = gettid() kcmp(r1, r2, 0x1, r0, 0xffffffffffffffff) 02:43:51 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3687, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:43:51 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6585, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:43:51 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000000)={0x40, 0x7d, 0x2, {0x0, 0x39, 0x9, 0x3, {0x4, 0x1, 0x1}, 0x2080000, 0x1, 0x1, 0xfff, 0x1, '\x00', 0x3, '-\xa3,', 0x1, '!', 0x1, '@'}}, 0x40) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:43:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f00000000c0)) 02:43:51 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = gettid() kcmp(r1, r2, 0x1, r0, 0xffffffffffffffff) 02:43:51 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6685, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:43:51 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xf6ffffff00000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:43:51 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3787, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:43:51 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1000002, r0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r1, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:43:51 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x240, 0x24) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:43:51 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, 0x0, &(0x7f00000000c0)) [ 1794.329478] kmemleak: 2 new suspected memory leaks (see /sys/kernel/debug/kmemleak) [ 1797.601744] hpet: Lost 3 RTC interrupts [ 1798.185822] hpet: Lost 1 RTC interrupts [ 1799.321819] hpet: Lost 2 RTC interrupts 02:44:15 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:44:15 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = gettid() kcmp(r1, r2, 0x1, r0, 0xffffffffffffffff) 02:44:15 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x80, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:44:15 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 02:44:15 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6785, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:44:15 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3887, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:44:15 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xffff000000000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:44:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x0, 0x7}, &(0x7f00000000c0)) 02:44:15 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) fadvise64(r1, 0x1, 0x1, 0x2) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:44:15 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r0, 0x400c620e, 0x0) recvmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000080)=@abs, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000100)=""/74, 0x4a}], 0x1, &(0x7f0000000280)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x78}, 0x80002062) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:44:15 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r1 = gettid() kcmp(0x0, r1, 0x1, r0, 0xffffffffffffffff) 02:44:15 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x0, 0x7}, &(0x7f00000000c0)) 02:44:15 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x3f00, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:44:15 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6885, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:44:16 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x0, 0x7}, &(0x7f00000000c0)) 02:44:16 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0xffffffff00000000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1818.953068] 9pnet: Insufficient options for proto=fd 02:44:31 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4000, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:44:31 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB, @ANYBLOB="9bcc54efc66f93a8487030c28973b57b9d3bd28066e3422f724a68ede3729a4ee49b6d0d8de2d97ff064d8b369b607af9d249d806b83bbfcb97513b62d6e963502cc46e9dcd4ace775cdbb637d2b04477dc0681cb20ff842869f7f2a76772341aa25aa71f004b2598853cc249379a094b363ae0aa706d65dc6e985057847582296816595c31468a970f2fe2f1caedb21eebe6f0c40cf59286fda37ea3a946f6ab7e3d4845dc2804ad14ed9a527872e6922f392ab25e86f1d65f2fb5879f83da3bb1126336c5c6d6795afa7b1ae2993f9cc095989", @ANYRESDEC], 0x5bc) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = syz_open_dev$rtc(&(0x7f00000004c0), 0x4, 0x4001) fcntl$F_GET_FILE_RW_HINT(r1, 0x40d, &(0x7f0000000500)) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000140)={'ip6gre0\x00', &(0x7f0000000280)={'syztnl2\x00', 0x0, 0x4, 0x3, 0xff, 0xfff, 0x20, @ipv4={'\x00', '\xff\xff', @remote}, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, 0x10, 0x8000, 0x2, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000380)={'ip6tnl0\x00', &(0x7f0000000300)={'ip6tnl0\x00', r2, 0x29, 0x81, 0x1f, 0x4, 0x28, @remote, @loopback, 0x7800, 0x8000, 0x200, 0x6}}) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file0/file0\x00') 02:44:31 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') creat(&(0x7f0000000040)='./file0\x00', 0x8) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, &(0x7f0000000000)={0x1f, 0x1, 0x800, 0xff, 0xc, "c27751cdf843826d"}) 02:44:31 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r1 = gettid() kcmp(0x0, r1, 0x1, r0, 0xffffffffffffffff) 02:44:31 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6985, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:44:31 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7}, &(0x7f00000000c0)) 02:44:31 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:44:31 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x22, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:44:31 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6a85, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:44:31 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() r1 = gettid() kcmp(0x0, r1, 0x1, r0, 0xffffffffffffffff) 02:44:31 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f0000000000)=@random={'trusted.', 'trusted.overlay.origin\x00'}) 02:44:31 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4084, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:44:31 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x2c, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:44:31 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7}, &(0x7f00000000c0)) 02:44:31 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x800000000000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:44:31 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6b85, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1819.209687] 9pnet: Insufficient options for proto=fd 02:44:31 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) [ 1834.482522] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:44:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7}, &(0x7f00000000c0)) 02:44:56 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:44:56 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6c85, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:44:56 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x200000f, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1000005, 0xffffffffffffffff) 02:44:56 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() gettid() kcmp(r1, 0x0, 0x1, r0, 0xffffffffffffffff) 02:44:56 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x22, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:44:56 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000100)={0x3e, 0x7d, 0x2, {0x0, 0x37, 0x7ff, 0x8, {0x10, 0x1, 0x6}, 0x48040000, 0x3, 0x3, 0x9, 0x1, '\x00', 0x1, '\x00', 0x1, '&', 0x1, '\\'}}, 0x3e) getpeername(0xffffffffffffffff, &(0x7f0000000080)=@pppoe={0x18, 0x0, {0x0, @local}}, &(0x7f0000000000)=0x80) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:44:56 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4787, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1844.404722] 9pnet: Insufficient options for proto=fd 02:44:56 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, 0x0) 02:44:56 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() gettid() kcmp(r1, 0x0, 0x1, r0, 0xffffffffffffffff) 02:44:56 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6d85, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:44:57 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4887, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:44:57 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000000)={0x0, r0, 0x8, 0x401, 0x59f9, 0x1000}) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) ioctl$FICLONE(r1, 0x40049409, r0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ftruncate(r0, 0x400) 02:44:57 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x22, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1844.681566] 9pnet: Insufficient options for proto=fd 02:45:10 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x2c, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:45:10 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, 0x0) 02:45:10 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x20, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0xc008, 0x0, 0xfff, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket(0x10, 0xa, 0x10001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x8, 0x6, 0x8e, 0x1f, 0x0, 0xffffffff, 0x600, 0x4, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f00000000c0), 0x4}, 0x2400, 0x8000, 0x1d000000, 0x7, 0x811, 0x3, 0x1, 0x0, 0x5, 0x0, 0x68bb}, 0xffffffffffffffff, 0xf, r2, 0x1a) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000380)='./file0\x00', 0x40, 0x100) r4 = socket$packet(0x11, 0x2, 0x300) getsockopt$IP_VS_SO_GET_SERVICE(0xffffffffffffffff, 0x0, 0x483, &(0x7f00000003c0), &(0x7f0000000440)=0x68) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) fcntl$dupfd(r3, 0x406, r4) sendfile(r1, r0, 0x0, 0x1cf) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) mknod$loop(&(0x7f0000000000)='./file0\x00', 0x800, 0x0) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)=""/237, 0xed) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:45:10 executing program 5: r0 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x12) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r0) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r1) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r1) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4, r1) pkey_mprotect(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x507cbf8553fb8e21, r0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r2, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:45:10 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6e85, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:45:10 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() gettid() kcmp(r1, 0x0, 0x1, r0, 0xffffffffffffffff) 02:45:10 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4987, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:45:10 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, 0x0, 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) [ 1857.760871] 9pnet: Insufficient options for proto=fd 02:45:10 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6f85, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:45:10 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, 0x0) 02:45:10 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = gettid() kcmp(r1, r2, 0x0, r0, 0xffffffffffffffff) 02:45:10 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4a87, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:45:10 executing program 5: sendmsg$DEVLINK_CMD_RATE_NEW(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES16=0x0, @ANYBLOB="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"], 0x1038}, 0x1, 0x0, 0x0, 0x20044c00}, 0x8000) pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f0000001140)=@known='user.incfs.size\x00') 02:45:10 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x3, &(0x7f0000ffa000/0x4000)=nil, 0x5) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) mmap$usbmon(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 02:45:10 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x22, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:45:10 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7085, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1858.275699] 9pnet: Insufficient options for proto=fd 02:45:27 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = gettid() kcmp(r1, r2, 0x0, r0, 0xffffffffffffffff) 02:45:27 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') setsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3a, &(0x7f0000000000)=0x1f, 0x4) 02:45:27 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, 0x0, 0x0) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:45:27 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x7185, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:45:27 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4b87, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:45:27 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x22, 0xee00}}]}}) 02:45:27 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:45:27 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x420000, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000100)) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r2, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r2, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r2, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000380)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(0xffffffffffffffff, 0xc0182101, &(0x7f0000000440)={r3}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r2, 0x40182103, &(0x7f0000000640)={r3, 0x3, r1, 0x7, 0x80000}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x16, &(0x7f0000000000), &(0x7f0000000080)=0x4) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r4, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) sendmsg(r4, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000280)="2464440d6c79c8eee6a98e56c74d94907c13b27c65c4a8d9bc337af3cdbe891ed98dc1df46e35c4c195058771767a8458d7bf885dea6c62517b49ea7302b2934d996701a62a4d780ce2101e3dbfdf4fa97a39d89047d3932968f3bc9bd2656efe39b86acd28a3f", 0x67}, {&(0x7f0000000140)="c5f5721a0a704dedf2681cde8b788a9018bd86193fb96a42280308", 0x1b}, {&(0x7f0000000300)="084062f5c3f41e008f4585e422082eebcfea8f7b91544d2aff4cc2d173454ecc30251eccb552cc62036bc9779c503773609ea6ee27ca5ebe9174ed4e0dc5b1911a036e84cc4d6ce05ecc16f07731a9b27a53810deeab88ed78eac64d5a51e980f33ced20f335a183fbdd1115176fe70d", 0x70}, {&(0x7f0000000380)="028887c9d6f515d4cc0f8b03c4d70e5c23bf71783da3277dd66030fb35a6d825439a443f32ebb40b864874024e8a6e74468575c5d57c004c20ff35daf8358e68e8a8a00453a5550adf70fcd3233986069101af0639f3e013420342e528e1", 0x5e}, {&(0x7f0000000400)="b2a573db67b3a7bd0a695880405e7f214d5dae25687335a9beee03b97477ec755248ab486efdd8f0031e84e839889c7ba3a1eadf9c469961b5a8af3ca4d83b0e798ccf4ea4d1e21e5fe0e290f4f8093a4c896ed733fb0676894aa571386139e8d2fe11f03c97b7b2f5ced90964d3c354abbd6dd75ae5838d155026", 0x7b}, {&(0x7f0000000480)="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", 0xfc}], 0x6}, 0x4) 02:45:28 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = gettid() kcmp(r1, r2, 0x0, r0, 0xffffffffffffffff) 02:45:28 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f0000000000)=@known='user.incfs.id\x00') 02:45:28 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8522, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:45:28 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4c87, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:45:28 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x2, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xc3, 0x1ec2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:45:28 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$SNDRV_TIMER_IOCTL_TREAD(r1, 0x40045402, &(0x7f0000000000)) [ 1891.007144] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:45:53 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8523, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:45:53 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000280)=""/83, 0x53, 0x1) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) r1 = eventfd2(0x8, 0x800) write$binfmt_script(r1, &(0x7f0000000080)=ANY=[@ANYRES64, @ANYRES32], 0x100) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:45:53 executing program 1: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x3, &(0x7f0000ffa000/0x4000)=nil, 0x5) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) mmap$usbmon(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 02:45:53 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:45:53 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4d87, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:45:53 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x4, r1) fremovexattr(r0, &(0x7f00000000c0)=@known='security.apparmor\x00') 02:45:53 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x2c, 0xee00}}]}}) 02:45:53 executing program 6: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = gettid() kcmp(r0, r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 02:45:53 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x8}, 0x11010, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x4000, 0x0, 0x0, 0x3) pkey_alloc(0x0, 0x0) mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x12, &(0x7f0000000200)=0x33e0, 0x4) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) mbind(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0x81, 0x4) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) get_mempolicy(&(0x7f0000000140), &(0x7f0000000180), 0x3, &(0x7f0000ffa000/0x4000)=nil, 0x5) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r1, r0, 0x0, 0x9bbb) mmap$usbmon(&(0x7f0000ff4000/0xc000)=nil, 0xc000, 0x0, 0x13, 0xffffffffffffffff, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) 02:45:53 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x2000000, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@random={'btrfs.', '#D]\\^&\x00'}) 02:45:53 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8524, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:45:53 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, @perf_bp={0x0}, 0xa0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$F2FS_IOC_SET_PIN_FILE(r1, 0x4004f50d, &(0x7f0000000080)) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:45:53 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4e87, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:45:53 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8525, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:45:53 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x300000e, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:45:53 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x1) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/disk', 0x301000, 0x9a) setxattr$trusted_overlay_redirect(&(0x7f0000000280)='./file0/file0\x00', &(0x7f00000002c0), &(0x7f0000000300)='./file0\x00', 0x8, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}, r1}, 0x14) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'ip6_vti0\x00', &(0x7f0000000080)={'syztnl2\x00', r1, 0x2f, 0x3f, 0x1f, 0x101, 0x4, @private1, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x20, 0x8000, 0x8, 0xb6520b3}}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 1917.122113] kmemleak: 7 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:46:17 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:46:17 executing program 5: pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r1) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r1) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2000000, r1) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:46:17 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x4f87, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:46:17 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8526, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:46:17 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:46:17 executing program 6: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpid() r3 = gettid() kcmp(r2, r3, 0x1, r0, r1) 02:46:17 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}, 0x22}]}}) 02:46:17 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x2}, 0x91c, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x1, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:46:17 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='system.sockprotoname\x00') 02:46:17 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8527, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:46:17 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)=""/142, 0x8e) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) memfd_create(&(0x7f0000000140)='\x00', 0x4) 02:46:17 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x5087, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:46:17 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:46:17 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8528, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:46:17 executing program 5: pkey_mprotect(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') pkey_mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) 02:46:17 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x5187, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1941.948727] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:46:52 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:46:52 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:46:52 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pkey_mprotect(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x5, 0xffffffffffffffff) r1 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000003, r1) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:46:52 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffff000, 0x7}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r1 = inotify_init1(0x0) r2 = inotify_add_watch(r1, &(0x7f0000000040)='.\x00', 0x2000003) r3 = inotify_init1(0x0) r4 = inotify_add_watch(r3, &(0x7f0000000000)='./file0\x00', 0xa4000004) inotify_rm_watch(r1, r4) inotify_rm_watch(r0, r2) inotify_rm_watch(r0, 0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x814) inotify_rm_watch(0xffffffffffffffff, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) inotify_rm_watch(r0, r4) inotify_rm_watch(0xffffffffffffffff, 0x0) inotify_rm_watch(r1, 0x0) inotify_rm_watch(0xffffffffffffffff, r4) 02:46:52 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8529, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:46:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:46:52 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x5287, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:46:52 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:46:52 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x852a, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:46:52 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getsockopt(r0, 0xf38, 0xffffebe5, &(0x7f0000000280)=""/121, &(0x7f0000000100)=0x79) preadv2(r0, &(0x7f0000000680)=[{&(0x7f0000000300)=""/223, 0xdf}, {&(0x7f0000000400)=""/234, 0xea}, {&(0x7f0000000500)=""/11, 0xb}, {&(0x7f0000000540)=""/183, 0xb7}, {&(0x7f0000000600)=""/93, 0x5d}], 0x5, 0x9e91, 0xe8, 0x17) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0={0xfc, 0x0, '\x00', 0x1}, r1}, 0x14) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000000)={@loopback, 0x30, r1}) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000700), 0x143400, 0x0) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000740), &(0x7f0000000780)=0xc) r3 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x3, 0x2, 0x8, 0x98, 0x0, 0x1, 0x800, 0x4, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0xd3b, 0x2, @perf_config_ext={0xffffffffffffffc0, 0xe8}, 0x4009, 0xff, 0x7, 0x7, 0x20, 0x3, 0x2, 0x0, 0x2, 0x0, 0x7}, 0xffffffffffffffff, 0x3, r3, 0xa) 02:46:52 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$packet(0x11, 0x2, 0x300) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000040)=0x9) fremovexattr(r1, &(0x7f0000000000)=@random={'os2.', 'trusted.o~erla\xa8\x05\x00\x00\x00\x00\x00\x00\x00'}) 02:46:52 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x5387, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:46:52 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x852b, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:47:08 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:47:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:47:08 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x5487, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:47:08 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x852c, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:47:08 executing program 5: pkey_mprotect(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') ioctl$KDSETMODE(0xffffffffffffffff, 0x4b3a, 0x1) 02:47:08 executing program 3: perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x10, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) ioctl$BTRFS_IOC_LOGICAL_INO_V2(r0, 0xc038943b, &(0x7f0000000080)={0x80, 0x28, '\x00', 0x1, &(0x7f0000000000)=[0x0, 0x0, 0x0, 0x0, 0x0]}) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/52, 0x34) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:47:08 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x42, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r2, 0x400c620e, 0x0) write$P9_RREMOVE(r2, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:47:08 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}], [], 0x2}}) [ 1975.776213] hpet: Lost 1 RTC interrupts 02:47:08 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) recvfrom$packet(0xffffffffffffffff, &(0x7f0000000140)=""/37, 0x25, 0x40000040, &(0x7f0000000280)={0x11, 0xf6}, 0x14) r0 = getpid() r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) sendmmsg$sock(0xffffffffffffffff, &(0x7f0000002c80)=[{{&(0x7f00000002c0)=@pppoe={0x18, 0x0, {0x0, @remote, 'lo\x00'}}, 0x80, &(0x7f0000000400)=[{&(0x7f0000000340)="27a825a3c5ea82469587ecc8ca5439946a9742930e4634e70f725b4a7f68bf7206ecf21a8d26cd344a704b3ceb74239f28fbacfdda55f516fe7df002ebd94ca60fd8ec9cac11afcf8f08f182fceff541934794b848b743b951c22770d8cb0f50788d8d9c9ed6500e258b64248803a43843248e16786cab24a8c2c2f9da97014671bc1cd652bbe6d29b0c643bb81dfa991ea6b65e5779d7427907e53e50309431ef", 0xa1}], 0x1, &(0x7f0000000440)=[@txtime={{0x18, 0x1, 0x3d, 0x7f}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0x400}}, @timestamping={{0x14}}, @timestamping={{0x14, 0x1, 0x25, 0xffffffff}}, @mark={{0x14, 0x1, 0x24, 0xd47}}, @txtime={{0x18, 0x1, 0x3d, 0x100000001}}, @mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x7}}, @timestamping={{0x14, 0x1, 0x25, 0x2}}], 0xf0}}, {{0x0, 0x0, &(0x7f0000000600)=[{&(0x7f0000000540)="a3398d6e17d7ff84d29481dd", 0xc}, {&(0x7f0000000580)="70c9a04a357459037e62a8d2fe6dce0712b525ea3e786aab57a63f788b3620c9a9aceb106b6396d0ea68d80ea59afcccfd64e0a1783dedf093b56534ffa80f3acffa14119aff3e", 0x47}], 0x2, &(0x7f0000000640)=[@mark={{0x14, 0x1, 0x24, 0x9}}, @mark={{0x14, 0x1, 0x24, 0x7fffffff}}, @txtime={{0x18, 0x1, 0x3d, 0x10001}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}], 0x60}}, {{&(0x7f00000006c0)=@pppol2tpv3={0x18, 0x1, {0x0, r1, {0x2, 0x4e20, @broadcast}, 0x3, 0x3, 0x4, 0x4}}, 0x80, &(0x7f0000001740)=[{&(0x7f0000000740)="686c6f5a46bea84ec0c0253d1b79223e99ec0356c7093e5a216b577df39a6be0253c426d48405be14a64bb0c982b97a66d5ad79c415b00669233ec276906062176ab892e6dcb87e9250ac30c31e0bbb9b137411c106904d806e81bc263c03b549081ed6684103bf851ce1fdc0c9a6d459451714ffa490f515bed3cf036d129233f2d4efbfe72896f4b3d13bb285169a0590ca22d5bdda098f101958ec7488d552f0ad52bfd2c430fd39d774e242f29369bf0899969ec8207ad739c81dd4cc4a0da172341071c18ffcfa5d8c6294ac2945207675e114d48bbd81a47e54c6ea5f3d0ba5813e9181580d5b6b6d3cd55ecabd4fc76e8d102edcc9cf1204c937adddfc7acec26331c7470d1257670dd42cd930c54e76067c9e5498c223dacf0b52c6434b5db05958ccbe1bc57103542f602751b1544528c62f88c33a544daa8bdf6eeba134d8f6633d88baca3acc308235d2dac544f5545d296a1c13cd6ee522e91299049ab77720063f422f016d115aa4ce5543df5d2f2187f7c6fdae0e6265c75bef76be5276e3251825723f95d54d1edb3e0f683670a4119ab200f17729753a1dbb69223c868651cf3868ba9775d1c8030f8bc5102522bc48dd01eed3979670cd93517a6cf6720d21a419137dd1fafeab4ec340155a2870f14cb5281fdbfb78db33b18fbe482574a232841f7f28ed7b48af1dfc4cde7c4afca1d6334aecd9bbf29bdb0c5d5ab9667624591724725304b13f270aff5fbfcbdfe8441dee32acfa670dfb2b695a668421887c4ace57b18bcc9a33af6d64e5b5807161742c9bb7515eb1037619308fce0deb423fa0b72c89a3f6798f4e9343e76723a14649a2d0809c69a1bae9513ed205661e77af267746c2a16949f7281b15b855f796e096b808a712197aa3d124efac9e12be67912bd02e219ce0826836e99e4b5434a62635bf3635e6925f032912b3eb5e41b4953530d5213f8af34326d3d22dba14d0c38987111b1e522d6128d24155beffbf9d4e7ada02aa766a11877712d087e816daf48d329e23a2f00c72bf75b51de0eaa4e2957e7bfde4557c223ef3c25bdcfbf3a1b2de395c70ac2f92bd4826895b259ddf7d15a1947492fc22d9d15d6e1134f94ead0252b16b1b61114fb8da45c08082eed63f8784711c7e3ef231a32ceaaf953200c8c84fb4de0ee64db2ebecdeb0f1fa720eae886203296f5c87dd0d5708e854fa861eb54be2706a8af4797b08541dcfa9b161b817c165ff937ad799e936ba894d9a1e0f19a35fe4c9318dc70afb0006ef5a68666e936a00ada2e6f25058f3608acbdf5665e6f5a5bf9458862075385c188a0b8adbf6ac2c932ec7b8cd26e77e47d9d9bbe70213596615f12f27263b6847dc54ea7b714ef910a93ef3cd6215549a5a40c10cfd4d46af9c95001dbd63f9dfbb32065a23941e1d7186a6951a5feef050e7ae3a7aebcde1675c7ce352ddcba4c259fe6c95dedbeb8a4a156cf2bc1ead00771c016b14f9448dea60dbf32ff7e9fbd592c6b543e2128c7df255ac8bfbca09f10732c931f2d124c5b2ac038d107abfe6c49c934a59d2ff991f27bb8abded0de9aad5ccbc8fd580e0e421c95bed0639bd29a49ba23c3a733897694b011826b7ac9d116237fa111be7226840e84645d7cdbd6c7e9905754a9301f396a26155a06dee8faf13381e98f5269307758d0481355e95092add0cd345aecfc345b8f8722bb6743d258e22093d3f67e3ae3e30f93323b30f1d2901bc1d980fcdee341f69f5df8e5ca63e95aecbed6b5e9df582bbe73153752436d4eae0d9b643f3132015a1d4555d4ca6d1f8cfc86b2a5f90b4218072917d91bf901f11715db6dc54dcbfe0ac1bcdbeb11d314949c4fa3136e8bfbafd8612f28c1c1505d287b6f7bd2a881f8892c3380357c7aa6edd0a9f217a3607d55cbeeb60f6a380a2beafb54feeb40c6760bc25f7920988f434c59af7d38ea25e4dc1ff966122eef2192b1808ff68eb284505bcf1f514c90917ec29d757be3c2da98f912a2bb448d1c20d72f91f1e17828b6b54e6c8512771b2f591246ff428cfe1a90e7fbffba64c2f7b6c7013234671311563a5d1865e4df2ed82ff7a5a2a3387da3cb8f8f9a31676226cebc85f084cc702f3e65a9f8328831fc4cd9e77d06462e86d53d18c911c365ebf18b152125d18492ad3db3d61114efe900bad2b908dcb0179efc5a9b19cff4298976a8ded6774a4c6f7d5913e48a7892f2431319a5c2d6ac6df6a5c3506bbea5edb813980b7ead3699218a125138ffba0d7685c8e69ac36e14574ee6e3f793ce99f7251d43250388cdcc8431073f58c6b5a0248b278fd4f880181dc1ee5e6f0e448085aaaa3c952cb44244b93caf54912f1f4d50bb1dd88f7cf7e63071ea593e7e3e148b56ee6eb82725ef176f4d55f1dfdb8f5d2a415d5b527d651705f3d4da37e3249aefe9cae38e3f090dfc8158b6862b9c04ceb1ce351ae290a1dc798f405b9a716e73ba5bfc44dd4e02c0b576e68b2c3860c64cb50187920fd9176cf35712a6dfc56500386107bfcd6a33423bbdbc3a9f6a0b766332627b710dc30d494b7987dc8e204caf08fabe902e929709d70d9909da1907681ddd8b3f3294e0685bd3e8e270128a8d3995c8e2639a05549efe197786ad42d1f0a4e8d098aeb67730ed0fd1a30e3b6f8ddb34e44b6c959d8cd9db0f2d465bfe1f82cebe9c46e3ad1e13819e2f4de46bbf0a542cb25e3d02827dcf7b34820c6bbeed7692a1e2b71fcf63d8a045d9e85159c4f9718c1e42944b55229e92e122dc24c7915ef9435948aaf0cb1b55d43604bdd57315f55a514c845770cd4a7ecc08c449a06ef92f8e32d8467cb94f891f0c9d546b2e21335a3b2db5d67d34490cb36d9f0022db1ee08da5777c0eb1897d01046d0da486f546c5059d12e86cc47f91205d0679322c2bf802beee6e067e1dcc9e8f7be056edf2e678421e2a80c69eef7a988a58c295f4bdd89492898ea78a37a683868372bbc5ddb435bb65e8b741106277ad92f32700f14629133a9d5732d47e2e57bfe1ac9d9f78eac0c8d97fbe530d8a35cffd1a61bf270382bae5a491a76e9ddbe2a326be759f61269b44f12490d9b6af177c1d1de3ef3b906887b32f4205df7888e4dae1722d46e9a087df9c5665b013df5484b2102d437b3fe2b7e5aaaaf14cc365399c1ffe4b145643e5a92e85d5f2350353c95f9104dc1a788614f9bc068e5aaaa9841f62f893cc756d61af89953b9ba00c8d99ba6bc962d422b7c4db938f17912874d26d8007da39f2e6d95481d324a979c921fde9c2acd8558e631f5f671475b384e27e2d5bf33db74c52e681201dbcd07d324212b38d9e3a229b3358e68c19770bda4904ccf350da5d8bbe3993609adeae1def5b1580cae9f0a318214417c53662bdad80c87e4613bb6537f9a06582eff5e81900c74fe9252ec74dcc1a6462952439ccc00c5cd4ec0caf85fadd0e76838e1a48884497adce7e5d26a19813b28271bbe109b31616c98420e6edb010379a52125f3c178cafc24e2a3299955e4cea213fea0952a8863db6042c78b0e80948e7ba3380e943a327516839d901a59341564bdd6080119d84f2d2e73299303d61c953823a98d8a65dbeba738206c8bae2a0d9eedc095c43f6ffdc8c6df1895beb711ec2389c5daf6ff7a3aec797c87efbc64d796db60d2ba55e53acc0cd604404e65d28fbe7ab7c5dc4eaa751af4251170baae8198fe8d6aaee903b347bc1abfa05b152c5127d7ccedc61f9cbde1a55e1a4b4bb014481444a7a10001e9b7744f12e657c9ceecffd63e05af4b3daf75275d66d2b372a47168815a960d825ddf95653fccd5f4a9a045e23b3320b7d4fc93c60435003ee2d4eeedfe1d5d3338c3ab273b7e5f544506e489e024f3eac92bdd53acafd2004f10b6e165cb568699278aea948426cc3374c18e425a2085a530ec8bd871c5a1b2e35c7b72a1fe8f17dc2b12546876dc807c4cdc6f7b25fbb7d0a1ed3f6996cdb1fb843b4236b87625b4d6cf3cd1c6a1ceb1429a1a9cdd83057c3f70b7069d78edf43589d7c78a1fc9b1c485b575255882e94409e1b593a1a770ac8234955bbc85d18de0c4d7fe2ed504edeb0c615b27c630a8e6fc923ca4b0cea1fcc72315aa04b7062a730e3ccf088941f02a19d7ead1cd7d3ad996f6733112bc9d3ad93d88f2b874ab6c6db15d096c7cfa81980dfc4c8823823490246643e5404319c009a529a7561eae2edc66c182e77594f9f6584b8163e92f7031aebf9c29d702137ad748a642aadd6fcefa32f81b2bd53cac46fee163a366328d0cccb279ce776094fc8972359c7691f7f16d1d79de3060f60f1c9fcb425ddcbb8fba300346c064f3a84ded149edade56270f2185d313332b1f88be2066de6bd00e5ae466facddd76e13a228ca2ecd217ec0399faab13ef0531b320694c1d656794690dc729438b8d26725b38613854df26b58d9d31ba683ee946fbad6987fcf86aba833eeb89fa31f0ec059096afb361553a6f85b3e8faaceb84fba670656f87a946f835a6c7b0e538bd9c136265a593dc877151126fca97b830c884b345d188b5721aed37a90320fc79b7370c95e7d7d070f385ab683611218ce6851c3e3adcbe0c2f9d22b1551e3e7c903904e92169e9130ebf102ecbe267d71ee4484a289d6e7f6a55820e98bf50c85772ce4963c4eadc6217a98b5d553eacdf6470dfa759ccedf0d37e1330afd8d3fb8dc95fbb1ff44365573eb52fc938bf2276f4c3deb92f42dc753272e5337a204f9f863234f27935e5defb8ee499aa660ba0df0d0d67cd1cf025d31cd980c8150fabebfe0bf47f7094201b91ba681d92cf27a7ec5e509707676acc9b5125f0d4cb26efa040731e1f81526bbd40abf0a22e9fab238d4676c169e03cba76739aefba758e47ef7f515b1b7dfb2bed196821f196051809574b5d33f385a7bb871d89cea9498b34005dba5005f9a8f42af72d129e33aed29c88af12f05cce7de015e88311082a6b09e5374e1fb73c993ff00be9cb02abefa49afbcf9bf9e96c54d5204bca40b5fb85a6daec54d71a0c850be8ebe9a75e6dca08c02cb5317994f28ee5f2fe029fac0e2b4fd56678780988fb6a47e4ad398159df907d3c5952300701eef1cd546482d8fc276e085a7f2f3c226b93e305c8cf31bf2bafb4565c13d1232cab982770f50ec4da96ce564412e8ad57e05209b8a98baebf73dae0808552a60aa75e027642856fb89d3a8e0fc660bebf0532055b804ece02867c10392431d6133ed17c8d4b694a10bc14f41bbfb826cb490682f3af83e86f2234c176b9138bc35a62ce69f7300cc8ea65bdfde6a4ce1927283146739ecae0e94b8fe3dae516fccdb93df70027d6f824d6d9577b6965118f037667b20440dd7cf4e76821d1ed8c2f5c30b84fbc3c1c5ce20bb47114959db4ff00223ea107c1b8240dda4b08feb32fe87f9f263e4b0c55c81d678ab67f657b1f2c4d7c6a1a4aecf827cd9637f58ba35ccddea37a6cde4f8d6b2534a7de20c34a178d01f148567cf016e32e8ff479de522c698daa1e2143594fa3b1527df2811c77cedac1fcb5ae14d186f3ebcc98e5a9a1b4d8addf1416b2901049ce11d871ac21d13f61c84c3ddfbd63333090fe4e8b643a4df974b3d1820af4d2de97d1c41dde79e508863a369f21ddac77dd367734f48ee82f047c8f3dd68bdec6a65aeaf24f2cba8e476433b7011f23e779993016d871b981be4c334508d08fcb97358c78dccb3d86e940d851915fcb16492f871d5b65e7036f6c5b6820d47199f3ef222", 0x1000}], 0x1, &(0x7f0000001780)=[@txtime={{0x18, 0x1, 0x3d, 0x2}}, @timestamping={{0x14, 0x1, 0x25, 0xffffff00}}, @txtime={{0x18, 0x1, 0x3d, 0x5}}], 0x48}}, {{&(0x7f0000001800)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x4, 0x3, 0x0, 0x4, {0xa, 0x4e23, 0x4, @private2, 0x100}}}, 0x80, &(0x7f00000029c0)=[{&(0x7f0000001880)="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", 0x1000}, {&(0x7f0000002880)="94a3267cd5602ed05cf9bca9cb6531459d6430085e106f1ad9c1000602bc114a08110a7580790b8da7115f00db3fad00cabf119088ea6a0adc0f25b7e3a4ebfe0ee651477c0346029a2589aa2b55dc1026f5f50a9099b1f55e403db24fe33fa045393f50f6874b25c8898b4b589e06324157a9dabe95a2c9014bb4e46c5ba3d1d5d0388bb0f49b006dd2e2b9d6311fc1a0d347bb46e2c62132b893299498d5a7fab0b6d1e13c56ab5d", 0xa9}, {&(0x7f0000002940)="49d21bca75", 0x5}, {&(0x7f0000002980)="4e8141df926eb6c06fc3f9a03cdaaa7e78e66cb702e2d59e7b63dbf3c36db2175e0dd6074762e6970728ae299fae8880b292e5464c05eba5fd5525", 0x3b}], 0x4, &(0x7f0000002a00)=[@mark={{0x14, 0x1, 0x24, 0xffffffff}}, @txtime={{0x18, 0x1, 0x3d, 0x3d0d}}, @mark={{0x14, 0x1, 0x24, 0x3f}}, @mark={{0x14, 0x1, 0x24, 0x3}}, @txtime={{0x18, 0x1, 0x3d, 0x7793}}, @mark={{0x14, 0x1, 0x24, 0x4}}], 0x90}}, {{&(0x7f0000002ac0)=@xdp={0x2c, 0x4, 0x0, 0x13}, 0x80, &(0x7f0000002c40)=[{&(0x7f0000002b40)="66f3f1622971922bdc4042a15c68c2c0dbe89d71350a752ef635186bf50f5b1e7ff09723a35e7ada7c0d0104a463c482c090aa448a608ffe5cfe63203eb4ad2b65892dd65218fbfd2f6ddb4abf2ef8a3d77f36ddff605dbc173db7decd12a7318bd1a254d359a6185be7396de49ef1c0dad8e2dd01b3c4bf7019d9d095fcadcd7e6c82e3fa02b8e23a0d693f25b42e7f0e645a56ccd3d193b91ff48cff423d09102b0e81168499704f63ae84d50837fe9d07c4822de71f4be2c794d62766870569acb934ed411f3be842702c0e227479529f0a0fa0589f9bf10f2d170133418d3d533f83ac54831d11019de464169c7ad657342e2acf", 0xf6}], 0x1}}], 0x5, 0x800) prlimit64(r0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) syz_open_procfs(r0, &(0x7f00000000c0)='net/igmp\x00') r2 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000000), 0x50481, 0x0) write$P9_RCREATE(r2, &(0x7f0000000100)={0x18, 0x73, 0x2, {{0x80, 0x1, 0x2}, 0x3b0}}, 0x18) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:47:08 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x6c01, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:47:08 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x852d, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:47:08 executing program 3: ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x2}}, './file0\x00'}) setsockopt$netlink_NETLINK_RX_RING(r0, 0x10e, 0x6, &(0x7f0000000100)={0x9, 0x7fff, 0x86, 0xfff}, 0x10) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000080)=""/67, 0x43) readlink(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)=""/165, 0xa5) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_GET(r0, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0xac, 0x4, 0x8, 0x3, 0x0, 0x0, {0xa, 0x0, 0x1}, [@CTA_TIMEOUT_DATA={0x24, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_DCCP_RESPOND={0x8, 0x2, 0x1, 0x0, 0x10000}, @CTA_TIMEOUT_DCCP_CLOSEREQ={0x8, 0x5, 0x1, 0x0, 0xcd}, @CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0x1}]}, @CTA_TIMEOUT_DATA={0x3c, 0x4, 0x0, 0x1, @fccp=[@CTA_TIMEOUT_DCCP_OPEN={0x8, 0x4, 0x1, 0x0, 0xfffffffc}, @CTA_TIMEOUT_DCCP_RESPOND={0x8, 0x2, 0x1, 0x0, 0x3ff}, @CTA_TIMEOUT_DCCP_REQUEST={0x8, 0x1, 0x1, 0x0, 0x31f}, @CTA_TIMEOUT_DCCP_CLOSING={0x8, 0x6, 0x1, 0x0, 0x1}, @CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_DCCP_PARTOPEN={0x8, 0x3, 0x1, 0x0, 0x3}, @CTA_TIMEOUT_DCCP_TIMEWAIT={0x8, 0x7, 0x1, 0x0, 0xda}]}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz0\x00'}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8869}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8a47}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x1ff}]}]}, 0xac}}, 0xe804) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:47:08 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x42, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r2, 0x400c620e, 0x0) write$P9_RREMOVE(r2, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:47:08 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}], [], 0x7}}) 02:47:08 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8718, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:47:08 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:47:08 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x852e, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 1976.059819] perf: interrupt took too long (2512 > 2500), lowering kernel.perf_event_max_sample_rate to 79000 [ 1988.786911] kmemleak: 25 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:47:31 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:47:31 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:47:31 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}], [], 0x8}}) 02:47:31 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) pkey_mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2, 0xffffffffffffffff) mremap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4000, 0x3, &(0x7f0000ffb000/0x4000)=nil) fremovexattr(r0, &(0x7f00000000c0)=@random={'os2.', '\xed--^$\x00'}) r1 = pkey_alloc(0x0, 0x2) r2 = pkey_alloc(0x0, 0x1) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r2) r3 = pkey_alloc(0x0, 0x2) pkey_mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, r3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r3) pkey_mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x4, r3) pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x1, r3) pkey_mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2, r1) pkey_mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x31b0180c4d785d14, r1) pkey_mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x8, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x2000000, r3) 02:47:31 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8719, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:47:31 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x852f, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:47:31 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x42, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r2, 0x400c620e, 0x0) write$P9_RREMOVE(r2, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:47:31 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x7) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) [ 1999.056485] hpet: Lost 1 RTC interrupts 02:47:31 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') ioctl$sock_inet6_tcp_SIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000000)) 02:47:31 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8530, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:47:31 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x871a, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:47:31 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x42, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r2, 0x400c620e, 0x0) write$P9_RREMOVE(r2, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) 02:47:31 executing program 3: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) write$P9_RSTAT(0xffffffffffffffff, &(0x7f0000000080)={0x44, 0x7d, 0x2, {0x0, 0x3d, 0x0, 0x8, {0x0, 0x4}, 0x2000000, 0x4, 0x3000000, 0x1, 0x5, '\\-$*\\', 0x1, '\x00', 0x1, '\x00', 0x3, '.%&'}}, 0x44) mmap$perf(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0xc, 0x4010, r0, 0x1) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 1999.312742] perf: interrupt took too long (3149 > 3140), lowering kernel.perf_event_max_sample_rate to 63000 02:47:31 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x871b, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:47:31 executing program 5: openat$incfs(0xffffffffffffffff, &(0x7f0000000000)='.log\x00', 0x20880, 0x10) pkey_mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000005, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:47:31 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8531, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:47:31 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x2, 0x9, 0xff, 0x6, 0x0, 0x5, 0x40, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0xfff, 0x20, 0x9, 0x1, 0x6, 0x4, 0x0, 0x3, 0x0, 0xffffffffffff0b2e}, r0, 0x6, 0xffffffffffffffff, 0x1) [ 1999.415829] perf: interrupt took too long (3971 > 3936), lowering kernel.perf_event_max_sample_rate to 50000 [ 1999.495561] perf: interrupt took too long (5022 > 4963), lowering kernel.perf_event_max_sample_rate to 39000 02:47:47 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x871c, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:47:47 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_rx_ring(r1, 0x107, 0x5, &(0x7f00000002c0)=@req={0x401, 0x8}, 0x10) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000100)={&(0x7f0000000000/0x3000)=nil, &(0x7f0000002000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000000000/0x3000)=nil, &(0x7f0000002000/0x1000)=nil, &(0x7f0000004000/0x1000)=nil, &(0x7f0000000000/0x1000)=nil, &(0x7f0000002000/0x1000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000000)="f364c775750c9710d5d503b62d35538b26e6e826d7d357cbbf01ffd6829c7a095361d05fdb8fd8fe8effcc59e83ddbb2e7613efa9cf71d66d63682df5b04c415f0bfa7b8ec770572e43ccd1fd525678f24f2020fef7b161990362949", 0x5c, r1}, 0x68) 02:47:47 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x42, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r2, 0x400c620e, 0x0) write$P9_RREMOVE(r2, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) 02:47:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = gettid() kcmp(r0, r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) (fail_nth: 1) 02:47:47 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:47:47 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}], [], 0x9}}) 02:47:47 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private0}, 0x14) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 02:47:47 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8532, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 2014.863949] FAULT_INJECTION: forcing a failure. [ 2014.863949] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2014.866542] CPU: 1 PID: 14924 Comm: syz-executor.1 Not tainted 5.10.161 #1 [ 2014.868026] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2014.870147] Call Trace: [ 2014.870722] dump_stack+0x107/0x167 [ 2014.871521] should_fail.cold+0x5/0xa [ 2014.872561] _copy_to_user+0x2e/0x180 [ 2014.872608] simple_read_from_buffer+0xcc/0x160 [ 2014.872634] proc_fail_nth_read+0x198/0x230 [ 2014.872657] ? proc_sessionid_read+0x230/0x230 [ 2014.872676] ? security_file_permission+0x24e/0x570 [ 2014.872694] ? perf_trace_initcall_start+0x101/0x380 [ 2014.872725] ? proc_sessionid_read+0x230/0x230 [ 2014.872743] vfs_read+0x228/0x580 [ 2014.872771] ksys_read+0x12d/0x260 [ 2014.872791] ? vfs_write+0xa30/0xa30 02:47:47 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) (fail_nth: 1) [ 2014.872818] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2014.872844] do_syscall_64+0x33/0x40 [ 2014.872865] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2014.872879] RIP: 0033:0x7fa48643969c [ 2014.872899] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 02:47:47 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8533, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:47:47 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x871d, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 2014.872910] RSP: 002b:00007fa4839fc170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2014.872932] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa48643969c [ 2014.872944] RDX: 000000000000000f RSI: 00007fa4839fc1e0 RDI: 0000000000000004 [ 2014.872955] RBP: 00007fa4839fc1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2014.872967] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 02:47:47 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = pkey_alloc(0x0, 0x3) pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2, r0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r1, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') [ 2014.872979] R13: 00007ffc2632d69f R14: 00007fa4839fc300 R15: 0000000000022000 [ 2015.006825] FAULT_INJECTION: forcing a failure. [ 2015.006825] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2015.009378] CPU: 1 PID: 14934 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2015.010855] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2015.012591] Call Trace: [ 2015.013143] dump_stack+0x107/0x167 [ 2015.013895] should_fail.cold+0x5/0xa [ 2015.014690] _copy_from_user+0x2e/0x1b0 [ 2015.015519] __do_sys_prlimit64+0xb5/0xa80 [ 2015.016404] ? __ia32_compat_sys_getrlimit+0x190/0x190 [ 2015.017498] ? fput_many+0x2f/0x1a0 [ 2015.018249] ? ksys_write+0x1a9/0x260 [ 2015.019039] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2015.020033] do_syscall_64+0x33/0x40 [ 2015.020805] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2015.021853] RIP: 0033:0x7fa88322fb19 [ 2015.022614] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2015.026514] RSP: 002b:00007fa8807a5188 EFLAGS: 00000246 ORIG_RAX: 000000000000012e [ 2015.028067] RAX: ffffffffffffffda RBX: 00007fa883342f60 RCX: 00007fa88322fb19 [ 2015.029530] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000000 [ 2015.030982] RBP: 00007fa8807a51d0 R08: 0000000000000000 R09: 0000000000000000 [ 2015.032456] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000001 [ 2015.033911] R13: 00007fffce6f4cef R14: 00007fa8807a5300 R15: 0000000000022000 02:47:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = gettid() kcmp(r0, r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 02:47:47 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x871e, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:47:47 executing program 5: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x1000, 0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x65000080) pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fremovexattr(r1, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:47:47 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8534, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:47:47 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:47:47 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) (fail_nth: 2) 02:47:47 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x42, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r2, 0x400c620e, 0x0) write$P9_RREMOVE(r2, 0x0, 0x0) 02:47:47 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = gettid() kcmp(r0, r1, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) 02:47:47 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8535, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) [ 2015.307149] FAULT_INJECTION: forcing a failure. [ 2015.307149] name fail_usercopy, interval 1, probability 0, space 0, times 0 02:47:47 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}], [], 0xa}}) [ 2015.310100] CPU: 0 PID: 15059 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2015.311768] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2015.313672] Call Trace: [ 2015.314281] dump_stack+0x107/0x167 [ 2015.315114] should_fail.cold+0x5/0xa [ 2015.315981] _copy_to_user+0x2e/0x180 [ 2015.316857] __do_sys_prlimit64+0x546/0xa80 [ 2015.317838] ? __ia32_compat_sys_getrlimit+0x190/0x190 [ 2015.319021] ? perf_trace_run_bpf_submit+0xf5/0x190 [ 2015.320168] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2015.321266] do_syscall_64+0x33/0x40 [ 2015.322148] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2015.323298] RIP: 0033:0x7fa88322fb19 [ 2015.324144] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2015.328260] RSP: 002b:00007fa8807a5188 EFLAGS: 00000246 ORIG_RAX: 000000000000012e [ 2015.329987] RAX: ffffffffffffffda RBX: 00007fa883342f60 RCX: 00007fa88322fb19 [ 2015.331581] RDX: 0000000020000080 RSI: 0000000000000000 RDI: 0000000000000000 [ 2015.333206] RBP: 00007fa8807a51d0 R08: 0000000000000000 R09: 0000000000000000 [ 2015.334809] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000001 [ 2015.336394] R13: 00007fffce6f4cef R14: 00007fa8807a5300 R15: 0000000000022000 [ 2015.338148] hpet: Lost 1 RTC interrupts [ 2031.751149] kmemleak: 32 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:48:12 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = gettid() kcmp(r0, r1, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) [ 2040.425300] FAULT_INJECTION: forcing a failure. [ 2040.425300] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2040.428055] CPU: 0 PID: 15188 Comm: syz-executor.3 Not tainted 5.10.161 #1 [ 2040.429481] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 2040.431161] Call Trace: [ 2040.431748] dump_stack+0x107/0x167 [ 2040.432494] should_fail.cold+0x5/0xa [ 2040.433284] _copy_to_user+0x2e/0x180 [ 2040.434067] simple_read_from_buffer+0xcc/0x160 [ 2040.435024] proc_fail_nth_read+0x198/0x230 [ 2040.435938] ? proc_sessionid_read+0x230/0x230 [ 2040.436877] ? security_file_permission+0x24e/0x570 [ 2040.437894] ? perf_trace_initcall_start+0x101/0x380 [ 2040.438933] ? proc_sessionid_read+0x230/0x230 [ 2040.440027] vfs_read+0x228/0x580 [ 2040.440766] ksys_read+0x12d/0x260 [ 2040.441497] ? vfs_write+0xa30/0xa30 [ 2040.442265] ? rcu_read_lock_sched_held+0x3e/0x80 [ 2040.443260] do_syscall_64+0x33/0x40 [ 2040.444021] entry_SYSCALL_64_after_hwframe+0x61/0xc6 [ 2040.445068] RIP: 0033:0x7fa8831e269c [ 2040.445833] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2040.449567] RSP: 002b:00007fa8807a5170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2040.451114] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fa8831e269c [ 2040.452562] RDX: 000000000000000f RSI: 00007fa8807a51e0 RDI: 0000000000000004 [ 2040.454018] RBP: 00007fa8807a51d0 R08: 0000000000000000 R09: 0000000000000000 [ 2040.455464] R10: 00000000200000c0 R11: 0000000000000246 R12: 0000000000000001 [ 2040.456925] R13: 00007fffce6f4cef R14: 00007fa8807a5300 R15: 0000000000022000 [ 2040.458578] hpet: Lost 1 RTC interrupts 02:48:12 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}], [], 0xb}}) 02:48:12 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) (fail_nth: 3) 02:48:12 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x42, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r2, 0x400c620e, 0x0) 02:48:12 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x871f, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:48:12 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8536, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:48:12 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:48:12 executing program 5: pkey_mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4, 0xffffffffffffffff) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r1 = socket$unix(0x1, 0x2, 0x0) bind$unix(r1, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000000)=0x1, 0x4) r2 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000001280)={&(0x7f00000001c0)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) recvmmsg$unix(r1, &(0x7f0000000b40)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)}}], 0x1, 0x0, &(0x7f0000000c00)) fremovexattr(r0, &(0x7f00000000c0)=@known='trusted.overlay.origin\x00') 02:48:13 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8537, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:48:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = gettid() kcmp(r0, r1, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) 02:48:13 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8720, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:48:13 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x42, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f0000000100)) 02:48:13 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8721, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:48:13 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) 02:48:13 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:48:13 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x42, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) 02:48:13 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8538, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:48:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = gettid() kcmp(r0, r1, 0x5, 0xffffffffffffffff, 0xffffffffffffffff) 02:48:13 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}], [], 0x10}}) 02:48:13 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8722, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:48:13 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000080), 0x42, 0x0) 02:48:13 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) 02:48:13 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = gettid() kcmp(r0, r1, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) [ 2053.976355] kmemleak: 12 new suspected memory leaks (see /sys/kernel/debug/kmemleak) 02:48:34 executing program 3: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xf, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) 02:48:34 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8539, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:48:34 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8723, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:48:34 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = gettid() kcmp(r0, r1, 0x7, 0xffffffffffffffff, 0xffffffffffffffff) 02:48:34 executing program 6: perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)=""/63, 0x3f) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r0, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) write$binfmt_elf64(r1, &(0x7f0000000a00)=ANY=[@ANYBLOB], 0x5bc) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[], 0xfdef) 02:48:34 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) fcntl$dupfd(0xffffffffffffffff, 0x406, r1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x18cd, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00', 0x0, 0x40) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f0000000240)=""/17, 0x11}, {&(0x7f0000000280)=""/183, 0xb7}, {&(0x7f0000000340)=""/158, 0x9e}, {&(0x7f0000000400)=""/172, 0xac}, {&(0x7f00000004c0)=""/116, 0x74}, {&(0x7f0000000580)=""/126, 0x7e}], 0x6) syz_open_dev$tty20(0xc, 0x4, 0x0) 02:48:34 executing program 0: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(r1, 0x80047210, &(0x7f0000000000)) r2 = clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = getpid() prlimit64(r5, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) r6 = syz_open_procfs(r2, &(0x7f0000000540)='net/kcm\x00') r7 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x941000, 0x0) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000100)) ioctl$BINDER_FREEZE(r7, 0x400c620e, 0x0) mount$9p_fd(0x0, &(0x7f0000000600)='./file1\x00', &(0x7f0000000640), 0x8, &(0x7f0000000680)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[{@afid}, {@cache_mmap}, {@dfltuid={'dfltuid', 0x3d, 0xee00}}, {@version_9p2000}, {@cache_none}, {@aname={'aname', 0x3d, ')).@^'}}], [{@fsname}, {@obj_type={'obj_type', 0x3d, '9p\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, '9p\x00'}}, {@smackfsroot}]}}) clone3(&(0x7f0000000580)={0x90000, &(0x7f0000000200), &(0x7f0000000400), &(0x7f0000000440), {0x8}, &(0x7f0000000480)=""/51, 0x33, &(0x7f00000004c0)=""/30, &(0x7f0000000500)=[r5], 0x1, {r6}}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e733d6675110c4d00000008", @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4, @ANYBLOB=',dfltuid=', @ANYRESHEX=0xee00, @ANYBLOB=',\x00']) openat(r0, &(0x7f0000000080)='./file1\x00', 0x0, 0x1e0) sendmsg$nl_generic(r3, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000140)={&(0x7f0000000300)={0xf0, 0x13, 0x300, 0x70bd2b, 0x25dfdbff, {0xf}, [@nested={0xc, 0x77, 0x0, 0x1, [@typed={0x7, 0x8a, 0x0, 0x0, @str='9p\x00'}]}, @generic="39734775f73f5e680a7c39674b4f57ecd5633af8bf70a946f8d3cb0612f09a50c1ea7235c8d34c33b2f7f660e764ddbbb82be50dad688dd516495385b40f68749fdda348b5545b4652e9d91dacbad616c304d9008c8258d37632f14f33dac5e89b514ab7200c8a4c7c36ff5d9a6d1f570629bb7e4b572aff1378d6ce14c222e84a", @generic="bf4e543ba5dba1b9e9d7255ad3ca8c75286eb04e2255cbcf0792b913161df191c88488c61318a61ea93bd3cd5a2e82c88e1ab680bd550eb2b2f3e93d12b29fce61f3407a22a4bcc5774d08753cf3cc"]}, 0xf0}}, 0x4000) 02:48:34 executing program 2: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x853a, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) 02:48:34 executing program 1: perf_event_open(&(0x7f0000001d80)={0x2, 0xfffffffffffffdec, 0x94, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8}}, 0x0, 0x10, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = gettid() r2 = getpid() prlimit64(r2, 0x0, &(0x7f0000000080)={0x7, 0x7}, &(0x7f00000000c0)) ptrace$poke(0x4, r2, &(0x7f0000000000), 0x40000000000) kcmp(r0, r1, 0x1, 0xffffffffffffffff, 0xffffffffffffffff) 02:48:34 executing program 4: syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x8724, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@dfltuid={'dfltuid', 0x3d, 0xee00}}]}}) VM DIAGNOSIS: 02:53:36 Registers: info registers vcpu 0 RAX=ffffffff83e219f0 RBX=ffffffff84e322c0 RCX=ffffffff83e0973c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e21db3 RBP=fffffbfff09c6458 RSP=ffffffff84e07e40 R8 =0000000000000001 R9 =ffff88806ce3c12b R10=ffffed100d9c7825 R11=0000000000000001 R12=0000000000000000 R13=ffffffff85670b08 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e219fe RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fc98fac2000 CR3=000000001a934000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000006000000030000000200000000 XMM02=61746f7420636578650a0a0100010101 XMM03=7473657220726f74756365786511006c XMM04=007a7a75662063657865090073747261 XMM05=006574616469646e616320636578650e XMM06=0a00657a696d696e696d20636578650d XMM07=6365786508006873616d732063657865 XMM08=726f74756365786511006c61746f7420 XMM09=20636578650900737472617473657220 XMM10=69646e616320636578650e007a7a7566 XMM11=6d696e696d20636578650d0065746164 XMM12=006873616d7320636578650a00657a69 XMM13=20636578650b006e6567206365786508 XMM14=6e696820636578650a00656761697274 XMM15=0000736465657320636578650a007374 info registers vcpu 1 RAX=ffffffff83e219f0 RBX=ffff88800852b300 RCX=ffffffff83e0973c RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff83e21db3 RBP=ffffed10010a5660 RSP=ffff88800856fe78 R8 =0000000000000001 R9 =ffff88806cf3c12b R10=ffffed100d9e7825 R11=0000000000000001 R12=0000000000000001 R13=ffffffff85670b08 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff83e219fe RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055809f611678 CR3=000000001a934000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000004183bfd7c0000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000