ock_acquire+0x62f/0x4c20 [ 378.248837] do_futex+0x2e4/0x26d0 [ 378.252401] ? mark_held_locks+0x130/0x130 [ 378.256660] ? debug_smp_processor_id+0x1c/0x20 [ 378.261344] ? exit_robust_list+0x280/0x280 [ 378.265678] ? debug_smp_processor_id+0x1c/0x20 [ 378.270356] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 378.275919] ? check_preemption_disabled+0x48/0x280 [ 378.280966] ? perf_trace_lock_acquire+0x15b/0x800 [ 378.285919] ? graph_lock+0x270/0x270 [ 378.289729] ? graph_lock+0x270/0x270 [ 378.293564] ? find_held_lock+0x36/0x1c0 [ 378.297643] ? graph_lock+0x270/0x270 [ 378.301481] ? find_held_lock+0x36/0x1c0 [ 378.305577] ? find_held_lock+0x36/0x1c0 [ 378.309678] ? find_held_lock+0x36/0x1c0 [ 378.313781] ? __might_fault+0x12b/0x1e0 [ 378.317853] ? lock_downgrade+0x900/0x900 [ 378.322024] ? lock_release+0xa00/0xa00 [ 378.326041] ? arch_local_save_flags+0x40/0x40 [ 378.330714] mm_release+0x46a/0x5f0 [ 378.334356] ? mm_access+0x160/0x160 [ 378.338102] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 378.343585] ? _raw_spin_unlock_irq+0x60/0x80 [ 378.348126] ? acct_collect+0x70c/0x860 [ 378.352148] do_exit+0x570/0x26d0 [ 378.355621] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 378.360737] ? mm_update_next_owner+0x990/0x990 [ 378.365432] ? print_usage_bug+0xc0/0xc0 [ 378.369510] ? __lock_acquire+0x62f/0x4c20 [ 378.373755] ? debug_object_active_state+0x2f5/0x4d0 [ 378.378870] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 378.384013] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 378.389153] ? __lock_acquire+0x62f/0x4c20 [ 378.393423] ? mark_held_locks+0x130/0x130 [ 378.397691] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 378.403023] ? debug_smp_processor_id+0x1c/0x20 [ 378.407709] ? perf_trace_lock_acquire+0x15b/0x800 [ 378.412692] ? check_preemption_disabled+0x48/0x280 [ 378.417762] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 378.423313] ? check_preemption_disabled+0x48/0x280 [ 378.428818] ? debug_smp_processor_id+0x1c/0x20 [ 378.433505] ? perf_trace_lock_acquire+0x15b/0x800 [ 378.438445] ? mnt_get_count+0x150/0x150 [ 378.442547] ? graph_lock+0x270/0x270 [ 378.446366] ? find_held_lock+0x36/0x1c0 [ 378.450450] ? memset+0x31/0x40 [ 378.453753] ? find_held_lock+0x36/0x1c0 [ 378.457885] ? get_signal+0x95b/0x1980 [ 378.461812] ? _raw_spin_unlock_irq+0x27/0x80 [ 378.466348] ? _raw_spin_unlock_irq+0x27/0x80 [ 378.470876] do_group_exit+0x177/0x440 [ 378.474777] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 378.480238] ? __ia32_sys_exit+0x50/0x50 [ 378.484340] get_signal+0x8b0/0x1980 [ 378.488094] ? ptrace_notify+0x130/0x130 [ 378.492170] ? lock_downgrade+0x900/0x900 [ 378.496340] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 378.501926] ? poll_select_copy_remaining+0x433/0x6a0 [ 378.507140] ? poll_freewait+0x260/0x260 [ 378.511268] do_signal+0x9c/0x21c0 [ 378.514839] ? wait_for_completion+0x8a0/0x8a0 [ 378.519452] ? setup_sigcontext+0x7d0/0x7d0 [ 378.523783] ? do_pselect+0x39f/0x4e0 [ 378.527598] ? exit_to_usermode_loop+0x8c/0x380 [ 378.532279] ? exit_to_usermode_loop+0x8c/0x380 [ 378.536956] ? lockdep_hardirqs_on+0x421/0x5c0 [ 378.541575] ? trace_hardirqs_on+0xbd/0x310 [ 378.545895] ? __sb_end_write+0xd9/0x110 [ 378.549958] ? do_syscall_64+0x6be/0x820 [ 378.554050] ? fput+0x130/0x1a0 [ 378.557352] ? do_syscall_64+0x9a/0x820 [ 378.561336] ? do_syscall_64+0x9a/0x820 [ 378.565325] exit_to_usermode_loop+0x2e5/0x380 [ 378.569936] ? syscall_trace_enter+0x1260/0x1260 [ 378.574707] ? __x64_sys_pselect6+0x200/0x280 [ 378.579232] do_syscall_64+0x6be/0x820 [ 378.583144] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 378.588515] ? syscall_return_slowpath+0x5e0/0x5e0 [ 378.588532] ? trace_hardirqs_on_caller+0x310/0x310 [ 378.588549] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 378.588562] ? recalc_sigpending_tsk+0x180/0x180 [ 378.588578] ? __switch_to_asm+0x40/0x70 [ 378.588592] ? __switch_to_asm+0x34/0x70 [ 378.588612] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 378.598552] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 378.598565] RIP: 0033:0x457669 [ 378.598582] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 378.598591] RSP: 002b:00007f4630a4ec78 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 378.598606] RAX: fffffffffffffdfe RBX: 00007f4630a4ec90 RCX: 0000000000457669 [ 378.598615] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000000000040 [ 378.598624] RBP: 000000000072bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 378.598640] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f4630a4f6d4 [ 378.685304] R13: 00000000004c3a26 R14: 00000000004d6498 R15: 0000000000000009 10:22:35 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) mmap(&(0x7f0000000000/0xc1f000)=nil, 0xc1f000, 0x6, 0x71, 0xffffffffffffffff, 0x0) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vga_arbiter\x00', 0x22080, 0x0) ioctl$VIDIOC_ENUM_FRAMEINTERVALS(r2, 0xc034564b, &(0x7f0000000040)={0x7f, 0x0, 0x7fff, 0xa7, 0x3, @discrete={0x1f, 0x5f}}) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) r3 = getpid() socketpair$unix(0x1, 0x1fffffffffffffd, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r4, 0x5452, &(0x7f00005ebff8)=0x3f) fcntl$setsig(r4, 0xa, 0x12) r6 = syz_genetlink_get_family_id$team(&(0x7f0000000180)='team\x00') getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f00000001c0)={0x0, @rand_addr, @remote}, &(0x7f0000000200)=0xc) getpeername$packet(r2, &(0x7f0000000240)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f00000002c0)=0x14) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000300)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000400)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000580)={'team0\x00', 0x0}) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000005c0)={0x0, @remote, @multicast1}, &(0x7f0000000600)=0xc) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000700)={{{@in=@multicast1, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@loopback}}, &(0x7f0000000800)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000000900)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000940)={{{@in=@empty, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}}}, &(0x7f0000000a40)=0xe8) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000a80)={{{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@local}}, &(0x7f0000000b80)=0xe8) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f00000012c0)={'yam0\x00', 0x0}) accept$packet(r2, &(0x7f0000001580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000015c0)=0x14) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000001700)={{{@in6=@remote, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000001800)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000002bc0)={{{@in6=@loopback, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4}, 0x0, @in6}}, &(0x7f0000002cc0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000002d00)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(r4, 0x8933, &(0x7f0000002fc0)={'team0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000003000)={{{@in=@empty, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@local}}, &(0x7f0000003100)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000003740)={{{@in6=@loopback, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in=@remote}}, &(0x7f0000003840)=0xe8) getsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000003880)={@dev, @loopback, 0x0}, &(0x7f00000038c0)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(r1, &(0x7f0000003f80)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000003f40)={&(0x7f0000003900)={0x638, r6, 0x800, 0x70bd26, 0x25dfdbfc, {}, [{{0x8, 0x1, r7}, {0x138, 0x2, [{0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x55c}}, {0x8, 0x6, r10}}}, {0x7c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4c, 0x4, [{0x7f, 0x9, 0x3ff, 0x6}, {0xa08, 0x81, 0x7, 0x5}, {0xfb4, 0xfffffffffffffffe, 0x7, 0xdc}, {0x200000002000, 0x4, 0x7, 0x2}, {0x5, 0xc35, 0xcce, 0x400}, {0x73, 0xc72, 0x8000, 0x3}, {0xae, 0x3ff, 0x8001, 0x400}, {0x9, 0x7, 0x22}, {0x3ff, 0xffffffffffffffff, 0x1f, 0x7}]}}}]}}, {{0x8, 0x1, r11}, {0x120, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x8001}}, {0x8, 0x6, r12}}}, {0x64, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x34, 0x4, [{0x0, 0xfcc, 0x0, 0x6}, {0x6, 0x7, 0x21, 0x6}, {0x7f, 0x1, 0x0, 0x8}, {0x4, 0xd709, 0x5, 0x80000000}, {0xfffffffffffffffa, 0xffffffffffffffc0, 0x5, 0x1f}, {0x100000000, 0x9, 0x8, 0x2f}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}]}}, {{0x8, 0x1, r14}, {0x158, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r15}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x4, 0x300000, 0x9, 0x6}, {0x40, 0x8, 0x4, 0x5}, {0x8, 0x10001, 0x1f, 0x200}, {0xfffffffffffffff7, 0x8, 0x6, 0xbb4}, {0x81, 0x7, 0x41ee, 0x17}]}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r16}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x400}}, {0x8, 0x6, r17}}}]}}, {{0x8, 0x1, r18}, {0x254, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r19}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r20}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r21}}, {0x8}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r24}}}]}}]}, 0x638}, 0x1, 0x0, 0x0, 0x40000}, 0x4) fcntl$setownex(r4, 0xf, &(0x7f0000704000)={0x0, r3}) recvmsg(r5, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) dup2(r4, r5) tkill(r3, 0x15) futex(&(0x7f000000cffc), 0x5, 0x0, 0x0, &(0x7f0000000080), 0x0) r25 = eventfd(0x0) fcntl$setown(r2, 0x8, r3) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001840)={0x10f004, 0x0, 0x0, r25, 0x6}) fanotify_init(0x54, 0x141000) 10:22:35 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:35 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fdname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:35 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(0x0, 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x4904}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:35 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 378.854153] 9pnet: Insufficient options for proto=fd 10:22:35 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fs\name', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x7ffffffff000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x7fffef05}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:36 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x3b9ac9ff}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:36 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 380.543187] device bridge_slave_1 left promiscuous mode [ 380.548989] bridge0: port 2(bridge_slave_1) entered disabled state [ 380.603672] device bridge_slave_0 left promiscuous mode [ 380.609165] bridge0: port 1(bridge_slave_0) entered disabled state [ 380.676517] team0 (unregistering): Port device team_slave_1 removed [ 380.686896] team0 (unregistering): Port device team_slave_0 removed [ 380.698545] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 380.766229] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 380.840840] bond0 (unregistering): Released all slaves 10:22:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0xd}) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f00000000c0)=0x0) ioctl$sock_FIOSETOWN(r2, 0x8901, &(0x7f0000000040)=r3) 10:22:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x4e03000000000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:38 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:38 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fs%ame', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:38 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) fcntl$getownex(r0, 0x10, &(0x7f0000000100)={0x0, 0x0}) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f0000000180)={0x0}, &(0x7f00000001c0)=0xc) kcmp(r3, r4, 0x0, r0, r0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:38 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:38 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) prctl$PR_GET_SPECULATION_CTRL(0x34, 0x0, 0x2) eventfd(0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x80400, 0x100) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f0000fe5000/0x18000)=nil, &(0x7f0000000080)=[@text16={0x10, &(0x7f0000000040)="0fc72bbaf80c66b890d2528866efbafc0cedb816008ec00f060fc75ca1869a03000f23b0ba410066ed3e0f01cf0f01cf", 0x30}], 0x1, 0xe, &(0x7f00000000c0)=[@vmwrite={0x8, 0x0, 0xffffffffffffffbb, 0x0, 0x1, 0x0, 0x2, 0x0, 0x9}], 0x1) 10:22:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x4904000000000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:38 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 382.115934] IPVS: ftp: loaded support on port[0] = 21 10:22:38 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) chmod(&(0x7f0000000000)='./file0\x00', 0x1c8) r2 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r2, 0xc}) 10:22:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xf0ffffff}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x501000, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x8208ae63, &(0x7f00000000c0)={0x0, 0x0, @ioapic={0x5000, 0x8, 0xffffffff, 0x2, 0x0, [{0x2, 0x100000001, 0x4b, [], 0x400}, {0x7ff, 0xffffffffffffffff, 0x7fff, [], 0xff}, {0xfef, 0x8, 0x3ff, [], 0x6}, {0x7f, 0x4, 0x9, [], 0xcc1}, {0x8, 0x3, 0x2, [], 0x2}, {0x4, 0x10001, 0x3, [], 0x1ff}, {0x4, 0x9, 0x10000, [], 0xfffffffffffffffe}, {0x6, 0x4, 0x1, [], 0x1e5caa26}, {0x0, 0x0, 0x20, [], 0xff}, {0x1, 0x2b, 0x6, [], 0x3800}, {0x5, 0x4, 0x101, [], 0x388}, {0x9, 0xde40, 0xd9, [], 0x4}, {0x6c00000000000000, 0x6, 0x9, [], 0x1f}, {0x30, 0x8, 0x5, [], 0x87}, {0x7fff, 0x593d, 0x2, [], 0x80}, {0x0, 0x49d4, 0x8fe}, {0x0, 0xffffffffffffff05, 0x1, [], 0x6dc}, {0xc1fd, 0x4, 0x9, [], 0x7}, {0x4, 0x1, 0x5, [], 0x4}, {0x0, 0x8001, 0x1, [], 0x8001}, {0x9, 0x0, 0x3e2, [], 0x457f}, {0x80, 0xcb38, 0x2400000000000000, [], 0x8}, {0x10001, 0x1, 0x9e7a, [], 0x7}, {0x2, 0xfffffffffffffffe, 0x9, [], 0x1}]}}) r2 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1, 0x301000) openat$cgroup_int(r2, &(0x7f0000000040)='cgroup.clone_children\x00', 0x2, 0x0) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r4, 0xd}) ioctl$KVM_S390_UCAS_MAP(r1, 0x4018ae50, &(0x7f00000001c0)={0x6, 0x6, 0x2}) 10:22:39 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_FLUSH(r3, 0x0, 0x485, 0x0, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r2, 0xd}) socket$alg(0x26, 0x5, 0x0) 10:22:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x4e03}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:39 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 383.369431] bridge0: port 1(bridge_slave_0) entered blocking state [ 383.376002] bridge0: port 1(bridge_slave_0) entered disabled state [ 383.383179] device bridge_slave_0 entered promiscuous mode [ 383.414804] bridge0: port 2(bridge_slave_1) entered blocking state [ 383.421215] bridge0: port 2(bridge_slave_1) entered disabled state [ 383.428730] device bridge_slave_1 entered promiscuous mode [ 383.459341] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 383.490725] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 383.578654] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 383.613916] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 383.770954] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 383.778359] team0: Port device team_slave_0 added [ 383.805552] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 383.812863] team0: Port device team_slave_1 added [ 383.839969] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 383.869809] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 383.899327] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 383.930138] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 384.207388] bridge0: port 2(bridge_slave_1) entered blocking state [ 384.213749] bridge0: port 2(bridge_slave_1) entered forwarding state [ 384.220322] bridge0: port 1(bridge_slave_0) entered blocking state [ 384.226711] bridge0: port 1(bridge_slave_0) entered forwarding state [ 385.249198] 8021q: adding VLAN 0 to HW filter on device bond0 [ 385.347063] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 385.443868] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 385.450053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 385.458722] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 385.552144] 8021q: adding VLAN 0 to HW filter on device team0 10:22:42 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsnam%', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:42 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000001440), &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r2, 0xd}) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) r4 = fcntl$getown(r2, 0x9) ioctl$SNDRV_CTL_IOCTL_ELEM_ADD(r3, 0xc1105517, &(0x7f0000000080)={{0x7, 0x4, 0x6eda, 0x6, 'syz0\x00', 0x9}, 0x2, 0x20000100, 0x4, r4, 0x2, 0x8, 'syz0\x00', &(0x7f0000000040)=['/dev/kvm\x00', '/dev/kvm\x00'], 0x12, [], [0x880, 0x100000001, 0x3, 0xffffffff]}) 10:22:42 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x2}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:42 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 386.140251] 9pnet: Insufficient options for proto=fd [ 386.147409] 9pnet: Insufficient options for proto=fd 10:22:42 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001840)={0x4000000000000000, 0x0, 0x2, r2, 0xd}) [ 386.305861] 9pnet: Insufficient options for proto=fd 10:22:43 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsnam\n', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xfb}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:43 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x25, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 386.451894] 9pnet: Insufficient options for proto=fd 10:22:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r2, 0xd}) r3 = memfd_create(&(0x7f0000000000)='/dev/kvm\x00', 0x6) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000fe5000/0x18000)=nil, &(0x7f00000000c0)=[@textreal={0x8, &(0x7f0000000040)="66b8dee100000f23d00f21f866351000000b0f23f8b8eb018ee0670f005ea50f01d10fc79f800066b8840000000f23c00f21f86635000008000f23f80f01cb0f01cb660f381dcd0f00da", 0x4a}], 0x1, 0x41, &(0x7f0000000100)=[@vmwrite={0x8, 0x0, 0x6, 0x0, 0x1, 0x0, 0x8, 0x0, 0x42}, @dstype3={0x7, 0x2}], 0x2) accept4$alg(r3, 0x0, 0x0, 0x800) open(&(0x7f00000001c0)='./file0\x00', 0x200000, 0x80) ioctl$GIO_FONT(r1, 0x4b60, &(0x7f0000000180)=""/60) socket$nl_crypto(0x10, 0x3, 0x15) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140)='/dev/snapshot\x00', 0x400882, 0x0) [ 386.669171] 9pnet: Insufficient options for proto=fd 10:22:43 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0xa, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x449}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 386.925271] 9pnet: Insufficient options for proto=fd [ 386.957343] 9pnet: Insufficient options for proto=fd 10:22:43 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) pkey_alloc(0x0, 0x4) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r2, 0xd}) 10:22:43 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'cname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:43 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:43 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 387.275208] 9pnet: Insufficient options for proto=fd 10:22:43 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'dname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$FIDEDUPERANGE(r2, 0xc0189436, &(0x7f0000000000)=ANY=[@ANYBLOB="000000000100000005000000000000000800000000000000", @ANYRES32=r0, @ANYBLOB="000000001f0000000000000000000000000000000000000000000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00]\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\t\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r1, @ANYBLOB="00000000b5ffffffffffffff00000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="00000000000000000100000000000000000000000000000000000000", @ANYRES32=r1, @ANYBLOB="00000000000001000000000000000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00\b\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=r0, @ANYBLOB="00000000fc2a00000000000000000000"]) r3 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x7, 0x14001) syz_kvm_setup_cpu$x86(r1, r3, &(0x7f0000fe6000/0x18000)=nil, &(0x7f0000000200)=[@text32={0x20, &(0x7f0000000180)="2e0f01ca64660fc7760cb8008000000f23d00f21f835200000040f23f8f2f40f2399c4e13916a800000000660f38828d98bde2c90f00df66b85b008ed03e2e81afd100000001560000", 0x49}], 0x1, 0x1, &(0x7f0000000240), 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r2, 0xd}) 10:22:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x49040000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:44 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'iname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 387.469583] 9pnet: Insufficient options for proto=fd 10:22:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000000)={0x0, 0x0, 0x0, r2, 0xd}) [ 387.668829] 9pnet: Insufficient options for proto=fd 10:22:44 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'pname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1ff, 0x50000) ioctl$RTC_PIE_OFF(r1, 0x7006) r2 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r3, 0xd}) [ 387.861043] 9pnet: Insufficient options for proto=fd 10:22:44 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) write(0xffffffffffffffff, &(0x7f0000000340), 0x10000014c) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) pwrite64(r0, &(0x7f0000000200)="2fd5c0c19dbf051a07d6a308a0574c10bebdd70523e614e952e1db900e7626844fa46a690179878891e1d2b31b216853aa72746258dc98244e3c10a5e715d2d30abc88f6c6cd3c102830bdda78b8600a39f16e2eeaafe818cffcedf72670cb3d5f2d7845fff34946978d295387a3a3bcc12fc53b2cfb228aca26d5b0b75465fd00496cd1c488cb0c5721effa71ac867a197b0e32d7ca14ba3560dcb60d0852fc76a4827dfdfbb4ccefb2d05209a13fa1d988e3bcbc377f9e875a0623a17b163609e7b179405dce597d492842b5fa43be", 0xd0, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0x12) 10:22:44 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'sname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x5efff7f00000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:44 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r2, 0xd}) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) 10:22:44 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:44 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:44 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, '%name'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 388.234672] 9pnet: Insufficient options for proto=fd 10:22:44 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'lname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 388.307234] 9pnet: Insufficient options for proto=fd 10:22:45 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000280)='./file0\x00', 0x40000, 0x120) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FICLONE(r1, 0x40049409, r0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x80, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_PREFER_SUBDEVICE(r2, 0x40045542, &(0x7f0000000180)=0x3) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) accept(r2, &(0x7f00000001c0)=@pptp={0x18, 0x2, {0x0, @broadcast}}, &(0x7f0000000240)=0x80) 10:22:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xffc99a3b00000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket(0xe, 0x8000b, 0x9) fcntl$getownex(r0, 0x10, &(0x7f0000000080)={0x0, 0x0}) sendmsg$nl_netfilter(r2, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000000c0)={&(0x7f00000002c0)={0x2b0, 0x12, 0x5, 0x0, 0x70bd2c, 0x25dfdbff, {0x1, 0x0, 0x4}, [@generic="a7cc2d4489026b8a5a6dc63452b1758d38827d89b5b3f5e538fe09ff8b81a02a71db7618146fa6f3781d5ae5cbd66a4b12481af48e9ce59eccbd43f80ca166debeaae8bb5adb1dced4a2886393547ccd1770c2644ed8c40707481bf6ee06198c3114c5", @nested={0x104, 0x7d, [@typed={0x8, 0x84, @pid=r3}, @typed={0xc, 0x84, @u64=0x80000000}, @typed={0x58, 0x7b, @binary="0e7526cd77beba2fb0a1e2ad5a34d7968164a2ea471474a67c2c3d7c28d36775aa8384d043f6bdbb2c861e400ec2197a32e7b234d8d197e99cedbb7e6c83bda68fdbc2323f4933f1f67a6759c6d74e5b357932ef"}, @typed={0x8, 0x7c, @ipv4=@empty}, @generic="f092c3d4b74ec155e8b3f3f728b039fb5a5ed78128c2fc2adc181ac7d19b7b09aedf628c278656ad3c4abd760b92e7e6ec2d0c13339869225b41afda7da4dcf68ae25df76458b7491b322093e53f979aeaedf07bd3b9ec21d9be685d7397284d689d425ddec6a62c7a4a9eaf53e2e6bc2ede4176fe095839cc3ecdec9085f383599f687bb6", @typed={0x4, 0xd}]}, @nested={0x130, 0x82, [@generic="89925f2d54d8686c5786167dedaa3c47234a55b56a09f8c7c1f141a197594c9c46bf5d073c3ef224f2d35ddabe05c14dedf9e3c0258a5228e8a22c45de1dc0f494effa8a6810117f0d853ddc60428959d9bca604e798f161ce", @generic="8cb471beacf67f7c55db80c1d131190666e565816368c7655669c1b497d457b930c592ad925cfe182ca545c61ac0a674914bf41a6ad1f993420279e3e551598e1eae99413ae839d36058b11f3c1c3602a6f6650975f1d394e00aaaf73d0b3d643db7ea002365a1820a4e3661b94e1d486bc9fef295149ceff3d26bfe29aa03ff", @generic="1ae4c62e6ac217297b34b0e4533d9384fd10de3e6b3ee5013b41c245761d5d42984f02569d090dedeca8e8ff619e82723cfb11f6f381d0a580", @typed={0x10, 0x28, @str='/dev/kvm\x00'}, @typed={0x8, 0x7b, @u32=0x7f}]}, @typed={0x4, 0x5b}]}, 0x2b0}, 0x1, 0x0, 0x0, 0x40801}, 0x4000) r4 = eventfd(0x0) r5 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0xdd, 0x301800) ioctl$BINDER_SET_CONTEXT_MGR(r5, 0x40046207, 0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r4, 0xd}) 10:22:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000000000)={0xf000, 0x0, 0x8, r2, 0xd}) r3 = syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x0, 0x200400) ioctl$TIOCEXCL(r3, 0x540c) [ 388.534824] 9pnet: Insufficient options for proto=fd 10:22:45 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'Xname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kvm\x00', 0x80400, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r2, 0xd}) [ 388.798263] 9pnet: Insufficient options for proto=fd 10:22:45 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, '\nname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xfb000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:45 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:45 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r2, 0xd}) r3 = syz_open_dev$adsp(&(0x7f0000000000)='/dev/adsp#\x00', 0x1, 0x140) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000040)=[@mss={0x2, 0x7}, @sack_perm, @mss, @window={0x3, 0x9, 0x2}, @mss={0x2, 0xe5}, @timestamp, @timestamp, @mss={0x2, 0x212}], 0xdf) 10:22:45 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 389.034767] 9pnet: Insufficient options for proto=fd 10:22:45 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'oname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 389.218701] 9pnet: Insufficient options for proto=fd 10:22:46 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000100)={0x0, 0xff, 0x303e}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:46 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'xname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x68, 0x24000) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000000180)={0x0, 0x200}, &(0x7f00000001c0)=0x8) getsockopt$inet_sctp6_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f0000000240)={r2, 0x22c, 0x30, 0x1, 0x2}, &(0x7f00000002c0)=0x18) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x20000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x0, &(0x7f0000000040)={0x0, 0xffff, 0x10001, 0x8}, &(0x7f0000000080)=0x10) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x76, &(0x7f0000000200)={r5, 0x49}, 0xffffff48) r6 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r6, 0xd}) 10:22:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xfffffff0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:46 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'u\name'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 389.442633] 9pnet: Insufficient options for proto=fd 10:22:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x500000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) perf_event_open$cgroup(&(0x7f0000000100)={0x5, 0x70, 0x4, 0x3ff, 0xe8, 0x4, 0x0, 0x4, 0x10, 0x0, 0x9, 0xfffffffffffffbff, 0x8, 0x1, 0x101, 0x4, 0x100000001, 0x2, 0x0, 0x5, 0x3, 0x1, 0x2, 0x3, 0x101, 0xd1f, 0x3ff, 0x7ff, 0x0, 0x4, 0x4, 0x40, 0x3, 0x80, 0x2, 0x5, 0x5, 0x4, 0x0, 0x81, 0x4, @perf_bp={&(0x7f00000000c0)}, 0x10, 0x2, 0x3f, 0x8, 0x6, 0xffff, 0x6}, 0xffffffffffffff9c, 0x6, 0xffffffffffffffff, 0x0) r3 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000180)='/dev/vhci\x00', 0x1, 0x0) ioctl$PERF_EVENT_IOC_ID(r3, 0x80082407, &(0x7f0000000080)) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r2, 0xd}) openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x101200, 0x0) [ 389.565682] 9pnet: Insufficient options for proto=fd 10:22:46 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'u%ame'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 389.587035] 9pnet: Insufficient options for proto=fd [ 389.729242] 9pnet: Insufficient options for proto=fd 10:22:46 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:46 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x1) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x400000, 0x0) setsockopt$llc_int(r3, 0x10c, 0x0, &(0x7f0000000040)=0x2, 0x4) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r2, 0xd}) 10:22:46 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:46 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x4}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:47 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) prctl$PR_GET_KEEPCAPS(0x7) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:47 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'unam\n'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000000)='/dev/sg#\x00', 0x1, 0x28000) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r2, 0xd}) 10:22:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x5efff7f}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 390.421371] 9pnet: Insufficient options for proto=fd 10:22:47 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'unam%'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0xf56, 0x2000) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f00000001c0)={&(0x7f00000000c0), 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="08002dbd7000fbdb97747c16a48eac76c6d6243052df250300000008000600010000801c0001000800090005000000080002"], 0x38}, 0x1, 0x0, 0x0, 0x40000}, 0x24004815) r3 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r4 = eventfd(0x0) r5 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/mixer\x00', 0x40000, 0x0) ioctl$SNDRV_TIMER_IOCTL_PVERSION(r5, 0x80045400, &(0x7f0000000200)) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r4, 0xd}) 10:22:47 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}, 0x38}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 390.613111] 9pnet: Insufficient options for proto=fd 10:22:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x105) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r2, 0xd}) 10:22:47 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:47 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:47 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x1000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:47 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'xubj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 390.904636] 9pnet: Insufficient options for proto=fd [ 390.921743] 9pnet: Insufficient options for proto=fd [ 391.053991] 9pnet: Insufficient options for proto=fd [ 391.089268] 9pnet: Insufficient options for proto=fd 10:22:47 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f0000000180)) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000100)=[{&(0x7f0000000500), 0x3528aa4b}], 0x100000000000010a, 0x0) 10:22:47 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) sendmsg$nl_crypto(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x880}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)=@delrng={0x10, 0x14, 0x0, 0x70bd2c, 0x25dfdbfd, "", [""]}, 0x10}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) r2 = eventfd(0x2) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r2, 0xd}) 10:22:47 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'\nubj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:47 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x34e}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:48 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'%ubj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 391.401938] 9pnet: Insufficient options for proto=fd 10:22:48 executing program 1: r0 = openat$ion(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/ion\x00', 0x0, 0x0) ioctl$ION_IOC_ALLOC(r0, 0xc0184900, &(0x7f0000000080)={0x8001, 0x1, 0x0, 0xffffffffffffffff}) ioctl$DMA_BUF_IOCTL_SYNC(r1, 0x40086200, &(0x7f0000000000)=0x1) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0xfffffffffffffffe, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r3, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r4, 0xd}) r5 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_LISTEN(r5, &(0x7f0000000180)={0x7, 0x8, 0xfa00, {r6, 0x5457}}, 0x10) 10:22:48 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'dubj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 391.564833] 9pnet: Insufficient options for proto=fd [ 391.576263] ion_buffer_destroy: buffer still mapped in the kernel [ 391.636213] 9pnet: Insufficient options for proto=fd 10:22:48 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:48 executing program 1: r0 = memfd_create(&(0x7f0000000100)='/dev/rtc0\x00', 0x225ac04dd0b758dc) setsockopt$bt_BT_POWER(r0, 0x112, 0x9, &(0x7f0000000140)=0x7, 0x1) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r3, 0xd}) r4 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x701000, 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r2, 0x4040ae75, &(0x7f00000000c0)={0x1, 0x6, 0x3ff}) setsockopt$inet6_dccp_buf(r4, 0x21, 0x80, &(0x7f0000000040)="092d098120d3112dcd21f41618d896f95d57d8d9c808a977baa48b07d1efba297a1d087ef81fd19fb6bacef9a807803f91ef0da286895df75890ebc012552d985cc52e60", 0x44) 10:22:48 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'oubj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x8dffffff00000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 391.801408] 9pnet: Insufficient options for proto=fd 10:22:48 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:48 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'uubj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:48 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x20000000000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0xee) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r2, 0xd}) memfd_create(&(0x7f0000000000)='/dev/kvm\x00', 0x0) 10:22:48 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:48 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x200000000000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 392.313147] 9pnet: Insufficient options for proto=fd 10:22:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_TSS_ADDR(r1, 0xae47, 0xd000) r2 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r2, 0xd}) 10:22:49 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'scbj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:49 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'sxbj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 392.570303] 9pnet: Insufficient options for proto=fd 10:22:49 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:49 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r1, 0x4040ae79, &(0x7f0000001840)={0x5000, 0x0, 0x10000000000, r2, 0xd}) 10:22:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x8000000000000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:49 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'slbj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 392.772189] 9pnet: Insufficient options for proto=fd [ 392.997822] 9pnet: Insufficient options for proto=fd [ 393.024683] 9pnet: Insufficient options for proto=fd 10:22:49 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='security.capability\x00', &(0x7f0000000280)=@v2={0x2000000, [{0x2, 0x7fffffff}, {0x6, 0x8}]}, 0x14, 0x1) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = syz_open_dev$video4linux(&(0x7f0000000100)='/dev/v4l-subdev#\x00', 0x7, 0x4000) ioctl$VIDIOC_S_TUNER(r0, 0x4054561e, &(0x7f0000000180)={0x309f, "814df250f4ff32072be47603caabdf627d6c3a435e5c14b28cfe888e25a47cfc", 0x1, 0x1, 0x2509, 0x31a7, 0x2, 0x7, 0x0, 0x2}) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x44, &(0x7f00000000c0)={0x1, 0x0, 0x10000}, 0x0, &(0x7f00000002c0)={0x1b7, 0x0, 0x0, 0x0, 0x0, 0x1f}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:49 executing program 1: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$EVIOCSABS2F(r0, 0x401845ef, &(0x7f0000000080)={0x4, 0x401, 0x80000000, 0x7, 0x7, 0x200}) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0xfffc, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IOEVENTFD(r2, 0x4040ae79, &(0x7f0000001840)={0x0, 0x0, 0x0, r3, 0xd}) ioctl$TIOCNOTTY(r0, 0x5422) setsockopt$inet_udp_int(r0, 0x11, 0x66, &(0x7f0000000000)=0x5e333430, 0x4) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x4) 10:22:49 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:49 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'ssbj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xffc99a3b}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 393.279709] 9pnet: Insufficient options for proto=fd 10:22:49 executing program 1: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_SUBDEV_ENUM_MBUS_CODE(r1, 0xc0305602, &(0x7f0000000100)={0x0, 0xff, 0x303e}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:50 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'sXbj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:50 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'sobj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 393.416763] 9pnet: Insufficient options for proto=fd [ 393.536497] 9pnet: Insufficient options for proto=fd 10:22:50 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:50 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'spbj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x50000000000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:50 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 393.795394] 9pnet: Insufficient options for proto=fd 10:22:50 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'s\nbj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:50 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:50 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100)='/dev/hwrng\x00', 0x40, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000240)={0x0, 0x84, &(0x7f0000000180)=[@in={0x2, 0x4e20, @empty}, @in={0x2, 0x4e23, @loopback}, @in6={0xa, 0x4e20, 0x0, @remote, 0xff}, @in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e23, 0xba38, @mcast2, 0x9}, @in6={0xa, 0x4e20, 0x10001, @dev={0xfe, 0x80, [], 0xa}, 0xffffffffffffff01}]}, &(0x7f0000000280)=0x10) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000300)={r1, 0x100000000004}, 0xffffffffffffff13) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0xffffffffffffffff, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x8000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:50 executing program 1: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000001440), &(0x7f0000000100)='./file0\x00', &(0x7f0000000080)='proc\x00', 0x0, &(0x7f0000000100)) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getdents64(r0, &(0x7f00000002c0)=""/4096, 0x1000) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 394.295643] 9pnet: Insufficient options for proto=fd 10:22:50 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'s%bj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 394.325723] 9pnet: Insufficient options for proto=fd 10:22:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x8dffffff}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:51 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'sdbj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 394.457780] 9pnet: Insufficient options for proto=fd [ 394.475171] 9pnet: Insufficient options for proto=fd 10:22:51 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 394.680281] 9pnet: Insufficient options for proto=fd 10:22:51 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'sibj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x40000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:51 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 394.944449] 9pnet: Insufficient options for proto=fd 10:22:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x50}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:51 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) ioctl$EXT4_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000300)=0x20000020) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:51 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_lser', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:52 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_cser', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 395.359238] 9pnet: Insufficient options for proto=fd 10:22:52 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_dser', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x5000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 395.461479] 9pnet: Insufficient options for proto=fd 10:22:52 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:52 executing program 1 (fault-call:9 fault-nth:0): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 395.577696] 9pnet: Insufficient options for proto=fd 10:22:52 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_iser', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 395.677276] FAULT_INJECTION: forcing a failure. [ 395.677276] name failslab, interval 1, probability 0, space 0, times 0 [ 395.706356] CPU: 1 PID: 14911 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 395.713737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 395.723126] Call Trace: [ 395.725737] dump_stack+0x1d3/0x2c6 [ 395.729391] ? dump_stack_print_info.cold.1+0x20/0x20 [ 395.734620] should_fail.cold.4+0xa/0x17 [ 395.738699] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 395.743828] ? find_held_lock+0x36/0x1c0 [ 395.747909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.753457] ? _parse_integer+0x134/0x180 [ 395.757657] ? graph_lock+0x270/0x270 [ 395.761498] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 395.767083] ? _kstrtoull+0x188/0x250 [ 395.770914] ? find_held_lock+0x36/0x1c0 [ 395.775013] ? ___might_sleep+0x1ed/0x300 [ 395.779173] ? arch_local_save_flags+0x40/0x40 [ 395.783802] __should_failslab+0x124/0x180 [ 395.788049] should_failslab+0x9/0x14 [ 395.791863] kmem_cache_alloc+0x2be/0x730 [ 395.796039] ? lock_downgrade+0x900/0x900 [ 395.800240] getname_flags+0xd0/0x590 [ 395.804087] do_renameat2+0x319/0x1180 [ 395.808006] ? find_held_lock+0x36/0x1c0 [ 395.812079] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 395.817069] ? user_path_create+0x40/0x40 [ 395.821255] ? __lock_is_held+0xb5/0x140 [ 395.825335] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 395.830895] ? check_preemption_disabled+0x48/0x280 [ 395.835929] ? __sb_end_write+0xd9/0x110 [ 395.840027] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 395.845573] ? fput+0x130/0x1a0 [ 395.848865] ? do_syscall_64+0x9a/0x820 [ 395.852859] ? do_syscall_64+0x9a/0x820 [ 395.856847] ? lockdep_hardirqs_on+0x421/0x5c0 [ 395.861441] ? trace_hardirqs_on+0xbd/0x310 [ 395.865769] ? __ia32_sys_read+0xb0/0xb0 [ 395.869864] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.875269] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 395.880740] __x64_sys_renameat+0x9a/0x100 [ 395.885011] do_syscall_64+0x1b9/0x820 [ 395.888926] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 395.894337] ? syscall_return_slowpath+0x5e0/0x5e0 [ 395.899279] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 395.904134] ? trace_hardirqs_on_caller+0x310/0x310 [ 395.909164] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 395.914198] ? prepare_exit_to_usermode+0x291/0x3b0 [ 395.919241] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 395.924107] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 395.929305] RIP: 0033:0x457669 [ 395.932527] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 395.951433] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 395.959184] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 395.966462] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 395.973749] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 395.981036] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 395.988329] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 [ 396.039332] 9pnet: Insufficient options for proto=fd [ 396.062161] 9pnet: Insufficient options for proto=fd 10:22:52 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:52 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_sser', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:52 executing program 1 (fault-call:9 fault-nth:1): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:22:52 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_%ser', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 396.177389] 9pnet: Insufficient options for proto=fd [ 396.248324] FAULT_INJECTION: forcing a failure. [ 396.248324] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 396.260163] CPU: 0 PID: 14936 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 396.267535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.276899] Call Trace: [ 396.279521] dump_stack+0x1d3/0x2c6 [ 396.283184] ? dump_stack_print_info.cold.1+0x20/0x20 [ 396.288413] should_fail.cold.4+0xa/0x17 [ 396.292500] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 396.298136] ? __lock_acquire+0x62f/0x4c20 [ 396.300045] 9pnet: Insufficient options for proto=fd [ 396.302392] ? mark_held_locks+0x130/0x130 [ 396.302416] ? mark_held_locks+0x130/0x130 [ 396.302434] ? perf_trace_lock_acquire+0x15b/0x800 [ 396.302457] ? debug_smp_processor_id+0x1c/0x20 [ 396.320962] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.320995] ? check_preemption_disabled+0x48/0x280 [ 396.321015] ? debug_smp_processor_id+0x1c/0x20 [ 396.321029] ? perf_trace_lock_acquire+0x15b/0x800 [ 396.321045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.321058] ? should_fail+0x22d/0xd01 [ 396.321077] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 396.331492] __alloc_pages_nodemask+0x366/0xea0 [ 396.331515] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.370847] ? _parse_integer+0x134/0x180 [ 396.375036] ? __alloc_pages_slowpath+0x2df0/0x2df0 [ 396.380092] ? _kstrtoull+0x188/0x250 [ 396.383918] ? find_held_lock+0x36/0x1c0 [ 396.388053] ? ___might_sleep+0x1ed/0x300 [ 396.392217] ? trace_hardirqs_off+0xb8/0x310 [ 396.396684] cache_grow_begin+0x91/0x8c0 [ 396.400764] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 396.406319] ? check_preemption_disabled+0x48/0x280 [ 396.411354] kmem_cache_alloc+0x665/0x730 [ 396.415527] getname_flags+0xd0/0x590 [ 396.419355] do_renameat2+0x319/0x1180 [ 396.423259] ? find_held_lock+0x36/0x1c0 [ 396.427342] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 396.432315] ? user_path_create+0x40/0x40 [ 396.436484] ? __lock_is_held+0xb5/0x140 [ 396.440584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 396.446138] ? check_preemption_disabled+0x48/0x280 [ 396.451177] ? __sb_end_write+0xd9/0x110 [ 396.455258] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 396.460809] ? fput+0x130/0x1a0 [ 396.464124] ? do_syscall_64+0x9a/0x820 [ 396.468136] ? do_syscall_64+0x9a/0x820 [ 396.472128] ? lockdep_hardirqs_on+0x421/0x5c0 [ 396.476725] ? trace_hardirqs_on+0xbd/0x310 [ 396.481062] ? __ia32_sys_read+0xb0/0xb0 [ 396.485141] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.490539] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 396.496023] __x64_sys_renameat+0x9a/0x100 [ 396.500282] do_syscall_64+0x1b9/0x820 [ 396.504185] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 396.509567] ? syscall_return_slowpath+0x5e0/0x5e0 [ 396.514515] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 396.519360] ? trace_hardirqs_on_caller+0x310/0x310 [ 396.524365] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 396.529373] ? prepare_exit_to_usermode+0x291/0x3b0 [ 396.534379] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 396.539224] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 396.544417] RIP: 0033:0x457669 [ 396.547614] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 396.566504] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 396.574205] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 396.581473] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 396.588747] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 10:22:53 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) rt_sigsuspend(&(0x7f0000000100)={0x1}, 0x8) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x10000014c) r1 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fsetxattr$trusted_overlay_opaque(r0, &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f00000001c0)='y\x00', 0x2, 0x1) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f00000006c0)=[{&(0x7f0000000200)="fdd74b6865cddc9ddaae6b62382113cc8a4449e0d6a87d9e6f1fdacb2be411c15e04a4e44b1e0670b4096a4952a0d9638981d665fb01138fde7ff372c6cda6b42f04594b6e8173a1b280f6a26cc822e180"}, {&(0x7f0000000400)="475402c94a1768d7eea746ee9ccae7a04370697e53a6b3aeb6322a924caad28afc344276608a50ce3ec1cba039838f9ecbab5f89fd65a81555cbd70983eee799ac25ad021952a12b13fc3cdececd71a361b16a826b6d57fedf9c6f1d8d4fc41eaf36b5c970b5e91b5f0e773a33a2c2a128cdb794c75dafadeb5d5e22fff8bca66f5a80b539c680ad47be2782774fccc61a0d932bb5512d50be587903d15ecd2c7f2c31a18900cd98f9d08897e88bf9a7ceadce9fb05d2716a6f25a817dc64356b6b3653025285d1f5f985c29e7703b846db7b4553035955b01d3bc04ff"}, {&(0x7f0000000280)="e6e161f5f498c6b7f7f8bb7a648200400000000000"}, {&(0x7f00000002c0)="4701ec63d626ac9d4aaa92c0fb83c1de1aa5f701d2a60a97a4bd52559555fdcdd10aec795f8f25abcbd1dba2d2c78f3b3f208e9f77ddc0d306f994f6d46b45ea67ba13f7b273ae2634ddcbfec6a0de424b8f6c28bbc313c6eb4d22a036bb5f303ab42f772818332e27f18e28f7fe8bf13d58665a118c490a584c05"}, {&(0x7f0000000500)="aa318502c8059318135a6bc725194528f5d82ff76c16de1757ee027d74a05039f517e65be215929c4543ed3e1ceccf27324230b6404ccbddb2e9f35a1602e44f72eb70ab0efb1f9b798f17bd8017abbc12353db2ac7122c6662c56b5f2896594b64391260282f786faa3455a80835c60428a57aacd97c2e43ba129ae3e1a3ce27b589b425326fa9b7ba49ee54ddd402893fbda7f52ea3a218f126b27486d6e66e5f9ff2e7181451b86e040225bc2746f2028b1e3cc"}, {&(0x7f0000000740)="745eca"}, {&(0x7f0000000600)="ac3d10e2db198317214e43bbd419897376c8de0bb80e6f42fb0bbe1da8a87f7e7ebd424b0b6e71ec8a9aa15b1bed166cb79e924dd881a3cc4210b8779e9070e1cfabb1422368eab304e416463e9bc265284b84e8f351a2028923b7de05ca51237eee3d4ba40701f004c6b00414b0808df2f1650914223ab0e20440a7f457c0875a272612dfa0d4ce9b90fb611fa824"}], 0x100001e4, 0xf) truncate(&(0x7f0000000000)='./file0\x00', 0x6) 10:22:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x800000000000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:53 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_\nser', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 396.596023] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 396.603297] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:22:53 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:53 executing program 1 (fault-call:9 fault-nth:2): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 396.735892] 9pnet: Insufficient options for proto=fd 10:22:53 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_Xser', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 396.758676] 9pnet: Insufficient options for proto=fd [ 396.876810] FAULT_INJECTION: forcing a failure. [ 396.876810] name failslab, interval 1, probability 0, space 0, times 0 [ 396.888678] CPU: 1 PID: 14965 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 396.896061] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 396.905430] Call Trace: [ 396.908048] dump_stack+0x1d3/0x2c6 [ 396.911702] ? dump_stack_print_info.cold.1+0x20/0x20 [ 396.916931] should_fail.cold.4+0xa/0x17 [ 396.921051] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 396.926180] ? check_noncircular+0x20/0x20 [ 396.930454] ? graph_lock+0x270/0x270 [ 396.934278] ? check_preemption_disabled+0x48/0x280 [ 396.939312] ? print_usage_bug+0xc0/0xc0 [ 396.943404] ? find_held_lock+0x36/0x1c0 [ 396.947504] ? __lock_is_held+0xb5/0x140 [ 396.951594] ? ___might_sleep+0x1ed/0x300 [ 396.955772] ? arch_local_save_flags+0x40/0x40 [ 396.960379] ? print_usage_bug+0xc0/0xc0 [ 396.964469] __should_failslab+0x124/0x180 [ 396.968755] should_failslab+0x9/0x14 [ 396.972568] kmem_cache_alloc+0x2be/0x730 [ 396.976753] ? print_usage_bug+0xc0/0xc0 [ 396.980824] __d_alloc+0xc8/0xb90 [ 396.984298] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 396.989308] ? __lock_acquire+0x62f/0x4c20 [ 396.993556] ? debug_smp_processor_id+0x1c/0x20 [ 396.998233] ? perf_trace_lock_acquire+0x15b/0x800 [ 397.003168] ? print_usage_bug+0xc0/0xc0 [ 397.007231] ? print_usage_bug+0xc0/0xc0 [ 397.011305] ? mark_held_locks+0x130/0x130 [ 397.015556] ? check_noncircular+0x20/0x20 [ 397.019812] ? mark_held_locks+0x130/0x130 [ 397.024080] d_alloc+0x96/0x380 [ 397.027371] ? __d_alloc+0xb90/0xb90 [ 397.031089] ? debug_smp_processor_id+0x1c/0x20 [ 397.035754] ? perf_trace_lock_acquire+0x15b/0x800 [ 397.040691] d_alloc_parallel+0x15a/0x1f40 [ 397.044930] ? mark_held_locks+0x130/0x130 [ 397.049215] ? __d_lookup_rcu+0xaa0/0xaa0 [ 397.053377] ? print_usage_bug+0xc0/0xc0 [ 397.057474] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.063036] ? check_preemption_disabled+0x48/0x280 [ 397.068070] ? debug_smp_processor_id+0x1c/0x20 [ 397.072752] ? perf_trace_lock_acquire+0x15b/0x800 10:22:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xf0ffffff7f0000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 397.077716] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 397.082672] ? kasan_check_read+0x11/0x20 [ 397.086838] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 397.092127] ? rcu_softirq_qs+0x20/0x20 [ 397.096121] ? __lockdep_init_map+0x105/0x590 [ 397.100633] ? __lockdep_init_map+0x105/0x590 [ 397.105149] ? lockdep_init_map+0x9/0x10 [ 397.105169] ? __init_waitqueue_head+0x9e/0x150 [ 397.105186] ? init_wait_entry+0x1c0/0x1c0 [ 397.105204] ? lock_acquire+0x1ed/0x520 [ 397.105226] __lookup_slow+0x1e6/0x540 [ 397.113946] ? vfs_unlink+0x510/0x510 [ 397.113999] ? __follow_mount_rcu.isra.33.part.34+0x890/0x890 [ 397.135770] lookup_slow+0x57/0x80 [ 397.139329] walk_component+0x92b/0x25b0 [ 397.143496] ? smk_curacc+0x7f/0xa0 [ 397.147160] ? path_init+0x1ed0/0x1ed0 [ 397.151083] ? smk_curacc+0x7f/0xa0 [ 397.154727] ? smack_inode_permission+0x2bc/0x3b0 [ 397.159614] ? smack_file_ioctl+0x3c0/0x3c0 [ 397.163960] ? inode_permission+0xb2/0x560 [ 397.168228] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.173851] ? security_inode_permission+0xd2/0x100 [ 397.178885] ? inode_permission+0xb2/0x560 [ 397.183139] link_path_walk.part.40+0xa61/0x1530 [ 397.187949] ? pick_link+0xaf0/0xaf0 [ 397.191719] ? walk_component+0x25b0/0x25b0 [ 397.196057] ? dput.part.25+0x26d/0x790 [ 397.200078] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 397.205295] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 397.210385] ? __check_object_size+0xb1/0x782 [ 397.214898] ? usercopy_warn+0x110/0x110 [ 397.218992] path_parentat.isra.41+0x4f/0x160 [ 397.223513] filename_parentat.isra.56+0x25f/0x570 [ 397.228502] ? getname+0x20/0x20 [ 397.231898] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 397.237457] ? digsig_verify+0x1530/0x1530 [ 397.241710] ? kmem_cache_alloc+0x33a/0x730 [ 397.246046] ? lock_downgrade+0x900/0x900 [ 397.250219] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.255786] ? getname_flags+0x26e/0x590 [ 397.259869] do_renameat2+0x3a9/0x1180 [ 397.263780] ? find_held_lock+0x36/0x1c0 [ 397.267880] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 397.272830] ? user_path_create+0x40/0x40 [ 397.277024] ? __lock_is_held+0xb5/0x140 [ 397.281114] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.286666] ? check_preemption_disabled+0x48/0x280 [ 397.291701] ? __sb_end_write+0xd9/0x110 [ 397.295966] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 397.301524] ? fput+0x130/0x1a0 [ 397.304813] ? do_syscall_64+0x9a/0x820 [ 397.308806] ? do_syscall_64+0x9a/0x820 [ 397.312811] ? lockdep_hardirqs_on+0x421/0x5c0 [ 397.317406] ? trace_hardirqs_on+0xbd/0x310 [ 397.321753] ? __ia32_sys_read+0xb0/0xb0 [ 397.325842] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.331237] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 397.336712] __x64_sys_renameat+0x9a/0x100 [ 397.340965] do_syscall_64+0x1b9/0x820 [ 397.344897] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 397.350277] ? syscall_return_slowpath+0x5e0/0x5e0 [ 397.355223] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 397.360084] ? trace_hardirqs_on_caller+0x310/0x310 [ 397.365119] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 397.370154] ? prepare_exit_to_usermode+0x291/0x3b0 [ 397.375195] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 397.380062] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 397.385262] RIP: 0033:0x457669 [ 397.388498] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 397.407410] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 397.415132] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 10:22:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x4e030000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 397.422410] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 397.430155] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 397.437430] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 397.444711] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:22:54 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:54 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_oser', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:54 executing program 1 (fault-call:9 fault-nth:3): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:22:54 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:54 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 397.604568] 9pnet: Insufficient options for proto=fd 10:22:54 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_pser', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xfb00}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 397.763649] FAULT_INJECTION: forcing a failure. [ 397.763649] name failslab, interval 1, probability 0, space 0, times 0 [ 397.797198] CPU: 1 PID: 14995 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 397.804589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 397.813952] Call Trace: [ 397.816574] dump_stack+0x1d3/0x2c6 [ 397.820229] ? dump_stack_print_info.cold.1+0x20/0x20 [ 397.825455] should_fail.cold.4+0xa/0x17 [ 397.829551] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 397.834696] ? print_usage_bug+0xc0/0xc0 [ 397.838778] ? __lock_acquire+0x62f/0x4c20 [ 397.843038] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 397.848590] ? print_usage_bug+0xc0/0xc0 [ 397.852682] ? graph_lock+0x270/0x270 [ 397.856503] ? print_usage_bug+0xc0/0xc0 [ 397.860576] ? debug_smp_processor_id+0x1c/0x20 [ 397.865270] ? find_held_lock+0x36/0x1c0 [ 397.869378] ? __lock_is_held+0xb5/0x140 [ 397.873469] ? ___might_sleep+0x1ed/0x300 [ 397.877637] ? arch_local_save_flags+0x40/0x40 [ 397.882246] ? debug_smp_processor_id+0x1c/0x20 [ 397.886950] ? perf_trace_lock_acquire+0x15b/0x800 [ 397.891949] ? print_usage_bug+0xc0/0xc0 [ 397.896090] __should_failslab+0x124/0x180 [ 397.900359] should_failslab+0x9/0x14 [ 397.904174] kmem_cache_alloc+0x2be/0x730 [ 397.908335] ? graph_lock+0x270/0x270 [ 397.912156] __d_alloc+0xc8/0xb90 [ 397.915622] ? __lock_acquire+0x62f/0x4c20 [ 397.919875] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 397.924904] ? __lock_acquire+0x62f/0x4c20 [ 397.929160] ? find_held_lock+0x36/0x1c0 [ 397.933248] ? print_usage_bug+0xc0/0xc0 [ 397.937329] ? mark_held_locks+0x130/0x130 [ 397.941598] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 397.946537] ? kasan_check_read+0x11/0x20 [ 397.950695] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 397.955993] ? rcu_softirq_qs+0x20/0x20 [ 397.960009] d_alloc+0x96/0x380 [ 397.963333] ? __d_alloc+0xb90/0xb90 [ 397.967064] ? debug_smp_processor_id+0x1c/0x20 [ 397.971753] ? perf_trace_lock_acquire+0x15b/0x800 [ 397.976714] d_alloc_parallel+0x15a/0x1f40 [ 397.980987] ? mark_held_locks+0x130/0x130 [ 397.985247] ? print_usage_bug+0xc0/0xc0 [ 397.989324] ? graph_lock+0x270/0x270 [ 397.993141] ? __lock_acquire+0x62f/0x4c20 [ 397.997399] ? __d_lookup_rcu+0xaa0/0xaa0 [ 398.001561] ? check_preemption_disabled+0x48/0x280 [ 398.006610] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.012192] ? check_preemption_disabled+0x48/0x280 [ 398.017233] ? debug_smp_processor_id+0x1c/0x20 [ 398.021920] ? perf_trace_lock_acquire+0x15b/0x800 [ 398.026892] ? check_preemption_disabled+0x48/0x280 [ 398.031956] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 398.036901] ? kasan_check_read+0x11/0x20 [ 398.041061] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 398.046387] ? graph_lock+0x270/0x270 [ 398.050224] ? __lockdep_init_map+0x105/0x590 [ 398.054736] ? __lockdep_init_map+0x105/0x590 [ 398.059252] ? lockdep_init_map+0x9/0x10 [ 398.063329] ? __init_waitqueue_head+0x9e/0x150 [ 398.068075] ? init_wait_entry+0x1c0/0x1c0 [ 398.072343] ? lock_acquire+0x1ed/0x520 [ 398.076338] __lookup_slow+0x1e6/0x540 [ 398.080246] ? vfs_unlink+0x510/0x510 [ 398.084087] ? inode_permission+0xb2/0x560 [ 398.088375] lookup_slow+0x57/0x80 [ 398.091962] lookup_one_len_unlocked+0xf1/0x100 [ 398.096663] ? lookup_slow+0x80/0x80 [ 398.100392] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 398.105335] ? kasan_check_read+0x11/0x20 [ 398.109500] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 398.114872] ovl_lookup_single+0x63/0x870 [ 398.119043] ovl_lookup_layer+0x3cf/0x4a0 [ 398.123207] ? kasan_check_write+0x14/0x20 [ 398.127511] ? override_creds+0x195/0x1f0 [ 398.131673] ? ovl_dentry_upper+0x65/0x120 [ 398.135926] ? ovl_lookup_single+0x870/0x870 [ 398.140348] ? ovl_path_real+0x400/0x400 [ 398.144439] ovl_lookup+0x5cf/0x29c0 [ 398.148166] ? print_usage_bug+0xc0/0xc0 [ 398.152248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.157832] ? debug_smp_processor_id+0x1c/0x20 [ 398.162536] ? ovl_path_next+0x2e0/0x2e0 [ 398.166621] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 398.171560] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 398.176842] ? rcu_softirq_qs+0x20/0x20 [ 398.180831] ? __lockdep_init_map+0x105/0x590 [ 398.185349] ? lockdep_init_map+0x9/0x10 [ 398.189423] ? __init_waitqueue_head+0x9e/0x150 [ 398.194140] ? init_wait_entry+0x1c0/0x1c0 [ 398.198392] ? lock_acquire+0x1ed/0x520 [ 398.202387] __lookup_slow+0x2b5/0x540 [ 398.206295] ? vfs_unlink+0x510/0x510 [ 398.210150] ? __follow_mount_rcu.isra.33.part.34+0x890/0x890 [ 398.216057] lookup_slow+0x57/0x80 [ 398.219615] walk_component+0x92b/0x25b0 [ 398.223717] ? smk_curacc+0x7f/0xa0 [ 398.227379] ? path_init+0x1ed0/0x1ed0 [ 398.231289] ? smk_curacc+0x7f/0xa0 [ 398.234952] ? smack_inode_permission+0x2bc/0x3b0 [ 398.239838] ? smack_file_ioctl+0x3c0/0x3c0 [ 398.244189] ? inode_permission+0xb2/0x560 [ 398.248450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.254017] ? security_inode_permission+0xd2/0x100 [ 398.259055] ? inode_permission+0xb2/0x560 [ 398.263315] link_path_walk.part.40+0xa61/0x1530 [ 398.268087] ? pick_link+0xaf0/0xaf0 [ 398.271834] ? walk_component+0x25b0/0x25b0 [ 398.276177] ? dput.part.25+0x26d/0x790 [ 398.280175] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 398.285383] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 398.290416] ? __check_object_size+0xb1/0x782 [ 398.294936] ? usercopy_warn+0x110/0x110 [ 398.299026] ? kmem_cache_alloc+0x589/0x730 [ 398.303376] path_parentat.isra.41+0x4f/0x160 [ 398.307900] filename_parentat.isra.56+0x25f/0x570 [ 398.312864] ? getname+0x20/0x20 [ 398.316247] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 398.321815] ? digsig_verify+0x1530/0x1530 [ 398.326086] ? kmem_cache_alloc+0x33a/0x730 [ 398.330454] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 398.336038] ? getname_flags+0x26e/0x590 [ 398.340128] do_renameat2+0x3a9/0x1180 [ 398.344033] ? find_held_lock+0x36/0x1c0 [ 398.348120] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 398.353080] ? user_path_create+0x40/0x40 [ 398.357250] ? __lock_is_held+0xb5/0x140 [ 398.361338] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 10:22:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xffffff8d}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 398.366903] ? check_preemption_disabled+0x48/0x280 [ 398.371939] ? __sb_end_write+0xd9/0x110 [ 398.376044] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 398.381591] ? fput+0x130/0x1a0 [ 398.384881] ? do_syscall_64+0x9a/0x820 [ 398.388870] ? do_syscall_64+0x9a/0x820 [ 398.392872] ? lockdep_hardirqs_on+0x421/0x5c0 [ 398.397489] ? trace_hardirqs_on+0xbd/0x310 [ 398.401816] ? __ia32_sys_read+0xb0/0xb0 [ 398.405898] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 398.411287] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 398.411313] __x64_sys_renameat+0x9a/0x100 [ 398.411335] do_syscall_64+0x1b9/0x820 [ 398.411353] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 398.411374] ? syscall_return_slowpath+0x5e0/0x5e0 [ 398.411390] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 398.411408] ? trace_hardirqs_on_caller+0x310/0x310 [ 398.411441] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 398.411461] ? prepare_exit_to_usermode+0x291/0x3b0 [ 398.411490] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 398.411530] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 398.465280] RIP: 0033:0x457669 [ 398.468495] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 398.487401] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 398.495120] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 398.502461] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 398.509741] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 10:22:55 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:55 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_xser', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:55 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 398.517015] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 398.524291] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:22:55 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_uoer', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 398.626024] 9pnet: Insufficient options for proto=fd 10:22:55 executing program 1 (fault-call:9 fault-nth:4): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 398.728889] 9pnet: Insufficient options for proto=fd 10:22:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x8}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 398.772312] 9pnet: Insufficient options for proto=fd 10:22:55 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_uuer', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:55 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000100), 0x4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000180)=0xffffffffffffff25, 0x4) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 398.830305] FAULT_INJECTION: forcing a failure. [ 398.830305] name failslab, interval 1, probability 0, space 0, times 0 [ 398.887926] CPU: 1 PID: 15048 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 398.895346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 398.904708] Call Trace: [ 398.907328] dump_stack+0x1d3/0x2c6 [ 398.911001] ? dump_stack_print_info.cold.1+0x20/0x20 [ 398.916279] should_fail.cold.4+0xa/0x17 [ 398.920365] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 398.925480] ? find_held_lock+0x36/0x1c0 [ 398.929563] ? kasan_check_write+0x14/0x20 [ 398.933821] ? prep_compound_page+0x26c/0x390 [ 398.938326] ? graph_lock+0x270/0x270 [ 398.942155] ? set_pageblock_migratetype+0x40/0x40 [ 398.947103] ? find_held_lock+0x36/0x1c0 [ 398.951180] ? __lock_is_held+0xb5/0x140 [ 398.955265] ? ___might_sleep+0x1ed/0x300 [ 398.959418] ? arch_local_save_flags+0x40/0x40 [ 398.964034] __should_failslab+0x124/0x180 [ 398.968279] should_failslab+0x9/0x14 [ 398.972128] kmem_cache_alloc+0x2be/0x730 [ 398.976307] __d_alloc+0xc8/0xb90 [ 398.979796] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 398.984818] ? __lock_acquire+0x62f/0x4c20 [ 398.989092] ? debug_smp_processor_id+0x1c/0x20 [ 398.993784] ? perf_trace_lock_acquire+0x15b/0x800 [ 398.998740] ? print_usage_bug+0xc0/0xc0 [ 399.002829] ? print_usage_bug+0xc0/0xc0 [ 399.006897] ? mark_held_locks+0x130/0x130 [ 399.011144] ? check_noncircular+0x20/0x20 [ 399.015411] d_alloc+0x96/0x380 [ 399.018705] ? __d_alloc+0xb90/0xb90 [ 399.022445] ? debug_smp_processor_id+0x1c/0x20 [ 399.027133] ? perf_trace_lock_acquire+0x15b/0x800 [ 399.032095] d_alloc_parallel+0x15a/0x1f40 [ 399.036344] ? mark_held_locks+0x130/0x130 [ 399.040599] ? __d_lookup_rcu+0xaa0/0xaa0 [ 399.044771] ? print_usage_bug+0xc0/0xc0 [ 399.048848] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.054397] ? check_preemption_disabled+0x48/0x280 [ 399.059436] ? debug_smp_processor_id+0x1c/0x20 [ 399.064120] ? perf_trace_lock_acquire+0x15b/0x800 [ 399.069079] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 399.074028] ? kasan_check_read+0x11/0x20 [ 399.078191] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 399.083481] ? rcu_softirq_qs+0x20/0x20 [ 399.087489] ? __lockdep_init_map+0x105/0x590 [ 399.092016] ? __lockdep_init_map+0x105/0x590 [ 399.096535] ? lockdep_init_map+0x9/0x10 [ 399.100610] ? __init_waitqueue_head+0x9e/0x150 [ 399.105312] ? init_wait_entry+0x1c0/0x1c0 [ 399.109660] ? lock_acquire+0x1ed/0x520 [ 399.113660] __lookup_slow+0x1e6/0x540 [ 399.117568] ? vfs_unlink+0x510/0x510 [ 399.121426] ? __follow_mount_rcu.isra.33.part.34+0x890/0x890 [ 399.127335] lookup_slow+0x57/0x80 [ 399.130895] walk_component+0x92b/0x25b0 [ 399.134988] ? smk_curacc+0x7f/0xa0 [ 399.138638] ? path_init+0x1ed0/0x1ed0 [ 399.142539] ? smk_curacc+0x7f/0xa0 [ 399.146184] ? smack_inode_permission+0x2bc/0x3b0 [ 399.151059] ? smack_file_ioctl+0x3c0/0x3c0 [ 399.155415] ? inode_permission+0xb2/0x560 [ 399.159668] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.165235] ? security_inode_permission+0xd2/0x100 [ 399.170267] ? inode_permission+0xb2/0x560 [ 399.174541] link_path_walk.part.40+0xa61/0x1530 [ 399.179310] ? pick_link+0xaf0/0xaf0 [ 399.183053] ? walk_component+0x25b0/0x25b0 [ 399.187396] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 399.192596] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 399.197647] ? __check_object_size+0xb1/0x782 [ 399.202154] ? usercopy_warn+0x110/0x110 [ 399.206250] path_parentat.isra.41+0x4f/0x160 [ 399.210757] filename_parentat.isra.56+0x25f/0x570 [ 399.215699] ? getname+0x20/0x20 [ 399.219076] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 399.224634] ? digsig_verify+0x1530/0x1530 [ 399.228876] ? kmem_cache_alloc+0x33a/0x730 [ 399.233236] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.238789] ? getname_flags+0x26e/0x590 [ 399.242888] do_renameat2+0x3a9/0x1180 [ 399.246802] ? find_held_lock+0x36/0x1c0 [ 399.250912] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 399.255857] ? user_path_create+0x40/0x40 [ 399.260043] ? __lock_is_held+0xb5/0x140 [ 399.264127] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.269675] ? check_preemption_disabled+0x48/0x280 [ 399.274715] ? __sb_end_write+0xd9/0x110 [ 399.278839] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 399.284394] ? fput+0x130/0x1a0 [ 399.287688] ? do_syscall_64+0x9a/0x820 [ 399.291677] ? do_syscall_64+0x9a/0x820 [ 399.295680] ? lockdep_hardirqs_on+0x421/0x5c0 [ 399.300306] ? trace_hardirqs_on+0xbd/0x310 [ 399.304639] ? __ia32_sys_read+0xb0/0xb0 [ 399.308717] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.314114] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 399.319585] __x64_sys_renameat+0x9a/0x100 [ 399.323847] do_syscall_64+0x1b9/0x820 [ 399.327751] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 399.333131] ? syscall_return_slowpath+0x5e0/0x5e0 [ 399.338078] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 399.342947] ? trace_hardirqs_on_caller+0x310/0x310 [ 399.348019] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 399.353073] ? prepare_exit_to_usermode+0x291/0x3b0 [ 399.358117] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 399.362994] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 399.368194] RIP: 0033:0x457669 [ 399.371401] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 399.390307] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 399.398028] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 399.405399] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 399.412687] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 399.420002] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 399.427811] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:22:56 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:56 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xfb00000000000000}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 399.521800] 9pnet: Insufficient options for proto=fd 10:22:56 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_uxer', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:22:56 executing program 1 (fault-call:9 fault-nth:5): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:22:56 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_u\ner', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 399.679969] 9pnet: Insufficient options for proto=fd 10:22:56 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_u%er', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 399.835216] 9pnet: Insufficient options for proto=fd [ 399.836360] FAULT_INJECTION: forcing a failure. [ 399.836360] name failslab, interval 1, probability 0, space 0, times 0 [ 399.858833] CPU: 0 PID: 15091 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 399.866227] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 399.875596] Call Trace: [ 399.875618] dump_stack+0x1d3/0x2c6 [ 399.875639] ? dump_stack_print_info.cold.1+0x20/0x20 [ 399.875667] should_fail.cold.4+0xa/0x17 [ 399.891160] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 399.896270] ? print_usage_bug+0xc0/0xc0 [ 399.900363] ? __lock_acquire+0x62f/0x4c20 [ 399.904612] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 399.910165] ? print_usage_bug+0xc0/0xc0 [ 399.914252] ? graph_lock+0x270/0x270 [ 399.918068] ? print_usage_bug+0xc0/0xc0 [ 399.922142] ? debug_smp_processor_id+0x1c/0x20 [ 399.926832] ? find_held_lock+0x36/0x1c0 [ 399.930920] ? __lock_is_held+0xb5/0x140 [ 399.935017] ? ___might_sleep+0x1ed/0x300 [ 399.939183] ? arch_local_save_flags+0x40/0x40 [ 399.943792] ? debug_smp_processor_id+0x1c/0x20 [ 399.948470] ? perf_trace_lock_acquire+0x15b/0x800 [ 399.953408] ? print_usage_bug+0xc0/0xc0 [ 399.957495] __should_failslab+0x124/0x180 [ 399.961743] should_failslab+0x9/0x14 [ 399.965581] kmem_cache_alloc+0x2be/0x730 [ 399.969750] ? graph_lock+0x270/0x270 [ 399.973584] __d_alloc+0xc8/0xb90 [ 399.977043] ? __lock_acquire+0x62f/0x4c20 [ 399.981295] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 399.986321] ? __lock_acquire+0x62f/0x4c20 [ 399.990568] ? find_held_lock+0x36/0x1c0 [ 399.994645] ? print_usage_bug+0xc0/0xc0 [ 399.998725] ? mark_held_locks+0x130/0x130 [ 400.003020] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 400.007963] ? kasan_check_read+0x11/0x20 [ 400.010040] 9pnet: Insufficient options for proto=fd [ 400.012143] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 400.012160] ? rcu_softirq_qs+0x20/0x20 [ 400.012183] d_alloc+0x96/0x380 [ 400.029819] ? __d_alloc+0xb90/0xb90 10:22:56 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_uder', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 400.033309] 9pnet: Insufficient options for proto=fd [ 400.033545] ? debug_smp_processor_id+0x1c/0x20 [ 400.043331] ? perf_trace_lock_acquire+0x15b/0x800 [ 400.048315] d_alloc_parallel+0x15a/0x1f40 [ 400.052570] ? mark_held_locks+0x130/0x130 [ 400.056823] ? print_usage_bug+0xc0/0xc0 [ 400.060919] ? graph_lock+0x270/0x270 [ 400.064747] ? __lock_acquire+0x62f/0x4c20 [ 400.069051] ? __d_lookup_rcu+0xaa0/0xaa0 [ 400.073215] ? check_preemption_disabled+0x48/0x280 [ 400.078248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.083806] ? check_preemption_disabled+0x48/0x280 [ 400.088840] ? debug_smp_processor_id+0x1c/0x20 [ 400.093522] ? perf_trace_lock_acquire+0x15b/0x800 [ 400.098472] ? check_preemption_disabled+0x48/0x280 [ 400.103510] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 400.108453] ? kasan_check_read+0x11/0x20 [ 400.112614] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 400.117902] ? graph_lock+0x270/0x270 [ 400.121728] ? __lockdep_init_map+0x105/0x590 [ 400.126341] ? __lockdep_init_map+0x105/0x590 [ 400.130856] ? lockdep_init_map+0x9/0x10 [ 400.134933] ? __init_waitqueue_head+0x9e/0x150 [ 400.139623] ? init_wait_entry+0x1c0/0x1c0 [ 400.143890] ? lock_acquire+0x1ed/0x520 [ 400.147889] __lookup_slow+0x1e6/0x540 [ 400.151790] ? vfs_unlink+0x510/0x510 [ 400.155640] ? inode_permission+0xb2/0x560 [ 400.159888] lookup_slow+0x57/0x80 [ 400.163453] lookup_one_len_unlocked+0xf1/0x100 [ 400.168145] ? lookup_slow+0x80/0x80 [ 400.171868] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 400.176801] ? kasan_check_read+0x11/0x20 [ 400.180952] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 400.186254] ovl_lookup_single+0x63/0x870 [ 400.190426] ovl_lookup_layer+0x3cf/0x4a0 [ 400.194583] ? kasan_check_write+0x14/0x20 [ 400.198831] ? override_creds+0x195/0x1f0 [ 400.203003] ? ovl_dentry_upper+0x65/0x120 [ 400.207247] ? ovl_lookup_single+0x870/0x870 [ 400.211696] ? ovl_path_real+0x400/0x400 [ 400.215807] ovl_lookup+0x5cf/0x29c0 [ 400.219540] ? print_usage_bug+0xc0/0xc0 [ 400.223609] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.229189] ? debug_smp_processor_id+0x1c/0x20 [ 400.233874] ? ovl_path_next+0x2e0/0x2e0 [ 400.237950] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 400.242909] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 400.248196] ? rcu_softirq_qs+0x20/0x20 [ 400.252187] ? __lockdep_init_map+0x105/0x590 [ 400.256705] ? lockdep_init_map+0x9/0x10 [ 400.260807] ? __init_waitqueue_head+0x9e/0x150 [ 400.265488] ? init_wait_entry+0x1c0/0x1c0 [ 400.269735] ? lock_acquire+0x1ed/0x520 [ 400.273735] __lookup_slow+0x2b5/0x540 [ 400.277637] ? vfs_unlink+0x510/0x510 [ 400.281479] ? __follow_mount_rcu.isra.33.part.34+0x890/0x890 [ 400.287380] lookup_slow+0x57/0x80 [ 400.290938] walk_component+0x92b/0x25b0 [ 400.295036] ? smk_curacc+0x7f/0xa0 [ 400.298681] ? path_init+0x1ed0/0x1ed0 [ 400.302584] ? smk_curacc+0x7f/0xa0 [ 400.306233] ? smack_inode_permission+0x2bc/0x3b0 [ 400.311092] ? smack_file_ioctl+0x3c0/0x3c0 [ 400.315455] ? inode_permission+0xb2/0x560 [ 400.319721] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.325271] ? security_inode_permission+0xd2/0x100 [ 400.330300] ? inode_permission+0xb2/0x560 [ 400.334556] link_path_walk.part.40+0xa61/0x1530 [ 400.339323] ? pick_link+0xaf0/0xaf0 [ 400.343079] ? walk_component+0x25b0/0x25b0 [ 400.347423] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 400.352628] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 400.357672] ? __check_object_size+0xb1/0x782 [ 400.362196] ? usercopy_warn+0x110/0x110 [ 400.366286] path_parentat.isra.41+0x4f/0x160 [ 400.370819] filename_parentat.isra.56+0x25f/0x570 [ 400.375788] ? getname+0x20/0x20 [ 400.379992] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 400.385583] ? digsig_verify+0x1530/0x1530 [ 400.389827] ? kmem_cache_alloc+0x33a/0x730 [ 400.394175] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.399724] ? getname_flags+0x26e/0x590 [ 400.403804] do_renameat2+0x3a9/0x1180 [ 400.407708] ? find_held_lock+0x36/0x1c0 [ 400.411795] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 400.416747] ? user_path_create+0x40/0x40 [ 400.420913] ? __lock_is_held+0xb5/0x140 [ 400.425024] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.430587] ? check_preemption_disabled+0x48/0x280 [ 400.435623] ? __sb_end_write+0xd9/0x110 [ 400.439737] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 400.445299] ? fput+0x130/0x1a0 [ 400.448592] ? do_syscall_64+0x9a/0x820 [ 400.452583] ? do_syscall_64+0x9a/0x820 [ 400.456575] ? lockdep_hardirqs_on+0x421/0x5c0 [ 400.461169] ? trace_hardirqs_on+0xbd/0x310 [ 400.465537] ? __ia32_sys_read+0xb0/0xb0 [ 400.469630] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.475039] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 400.480540] __x64_sys_renameat+0x9a/0x100 [ 400.484793] do_syscall_64+0x1b9/0x820 [ 400.488709] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 400.494090] ? syscall_return_slowpath+0x5e0/0x5e0 [ 400.499055] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 400.503945] ? trace_hardirqs_on_caller+0x310/0x310 [ 400.509012] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 400.514055] ? prepare_exit_to_usermode+0x291/0x3b0 [ 400.519090] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 400.523992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 400.529208] RIP: 0033:0x457669 [ 400.532418] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 400.551346] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 400.559054] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 400.566316] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 400.573609] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 400.580862] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 10:22:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:57 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x80) [ 400.588117] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:22:57 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:57 executing program 1 (fault-call:9 fault-nth:6): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:22:57 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 400.831180] FAULT_INJECTION: forcing a failure. [ 400.831180] name failslab, interval 1, probability 0, space 0, times 0 [ 400.861655] CPU: 1 PID: 15118 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 400.869038] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 400.869046] Call Trace: [ 400.869073] dump_stack+0x1d3/0x2c6 [ 400.869099] ? dump_stack_print_info.cold.1+0x20/0x20 [ 400.869135] should_fail.cold.4+0xa/0x17 [ 400.869160] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 400.869182] ? dput.part.25+0x241/0x790 [ 400.869213] ? check_preemption_disabled+0x48/0x280 [ 400.908230] ? graph_lock+0x270/0x270 [ 400.908254] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 400.917318] ? rcu_softirq_qs+0x20/0x20 [ 400.921317] ? find_held_lock+0x36/0x1c0 [ 400.925400] ? __lock_is_held+0xb5/0x140 [ 400.925430] ? ___might_sleep+0x1ed/0x300 [ 400.925448] ? arch_local_save_flags+0x40/0x40 [ 400.925468] ? ovl_lookup_single+0xd0/0x870 [ 400.938258] __should_failslab+0x124/0x180 [ 400.946793] should_failslab+0x9/0x14 [ 400.950617] __kmalloc+0x2e0/0x770 [ 400.954191] ? ovl_lookup_single+0x870/0x870 [ 400.954207] ? ovl_path_real+0x400/0x400 [ 400.954226] ? ovl_lookup+0x1178/0x29c0 [ 400.954248] ovl_lookup+0x1178/0x29c0 [ 400.954271] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 400.970542] ? debug_smp_processor_id+0x1c/0x20 [ 400.970566] ? ovl_path_next+0x2e0/0x2e0 [ 400.970588] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 400.970604] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 400.970635] ? rcu_softirq_qs+0x20/0x20 [ 400.999053] ? __lockdep_init_map+0x105/0x590 [ 400.999081] ? lockdep_init_map+0x9/0x10 [ 400.999101] ? __init_waitqueue_head+0x9e/0x150 [ 401.012383] ? init_wait_entry+0x1c0/0x1c0 [ 401.016650] ? lock_acquire+0x1ed/0x520 [ 401.020716] __lookup_slow+0x2b5/0x540 [ 401.020739] ? vfs_unlink+0x510/0x510 [ 401.028445] ? __follow_mount_rcu.isra.33.part.34+0x890/0x890 [ 401.034357] lookup_slow+0x57/0x80 [ 401.037915] walk_component+0x92b/0x25b0 [ 401.037940] ? smk_curacc+0x7f/0xa0 [ 401.037964] ? path_init+0x1ed0/0x1ed0 [ 401.037995] ? smk_curacc+0x7f/0xa0 [ 401.038016] ? smack_inode_permission+0x2bc/0x3b0 [ 401.038036] ? smack_file_ioctl+0x3c0/0x3c0 [ 401.049611] ? inode_permission+0xb2/0x560 [ 401.049633] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.066647] ? security_inode_permission+0xd2/0x100 [ 401.066667] ? inode_permission+0xb2/0x560 [ 401.066689] link_path_walk.part.40+0xa61/0x1530 [ 401.066705] ? pick_link+0xaf0/0xaf0 [ 401.066739] ? walk_component+0x25b0/0x25b0 [ 401.086256] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 401.086278] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 401.086296] ? __check_object_size+0xb1/0x782 [ 401.086319] ? usercopy_warn+0x110/0x110 [ 401.086351] path_parentat.isra.41+0x4f/0x160 [ 401.086371] filename_parentat.isra.56+0x25f/0x570 [ 401.122546] ? getname+0x20/0x20 [ 401.125940] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 401.131512] ? digsig_verify+0x1530/0x1530 [ 401.135772] ? kmem_cache_alloc+0x33a/0x730 [ 401.140118] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.145689] ? getname_flags+0x26e/0x590 [ 401.149813] do_renameat2+0x3a9/0x1180 [ 401.153726] ? find_held_lock+0x36/0x1c0 [ 401.157808] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 401.162776] ? user_path_create+0x40/0x40 [ 401.166968] ? __lock_is_held+0xb5/0x140 [ 401.171086] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.176644] ? check_preemption_disabled+0x48/0x280 10:22:57 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_us\nr', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 401.181686] ? __sb_end_write+0xd9/0x110 [ 401.185787] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 401.191340] ? fput+0x130/0x1a0 [ 401.194635] ? do_syscall_64+0x9a/0x820 [ 401.198632] ? do_syscall_64+0x9a/0x820 [ 401.202628] ? lockdep_hardirqs_on+0x421/0x5c0 [ 401.207225] ? trace_hardirqs_on+0xbd/0x310 [ 401.211556] ? __ia32_sys_read+0xb0/0xb0 [ 401.215633] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.221047] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 401.226646] __x64_sys_renameat+0x9a/0x100 [ 401.230896] do_syscall_64+0x1b9/0x820 [ 401.234826] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 401.240203] ? syscall_return_slowpath+0x5e0/0x5e0 [ 401.245177] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 401.250045] ? trace_hardirqs_on_caller+0x310/0x310 [ 401.255078] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 401.260127] ? prepare_exit_to_usermode+0x291/0x3b0 [ 401.265166] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 401.270042] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 401.275277] RIP: 0033:0x457669 [ 401.278491] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 401.297699] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 401.305419] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 401.312698] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 401.319985] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 10:22:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:57 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 401.327265] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 401.334550] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:22:58 executing program 1 (fault-call:9 fault-nth:7): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:22:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:22:58 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 401.575266] FAULT_INJECTION: forcing a failure. [ 401.575266] name failslab, interval 1, probability 0, space 0, times 0 [ 401.603811] CPU: 1 PID: 15141 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 401.611200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 401.620560] Call Trace: 10:22:58 executing program 4: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x4202, 0x0) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000180)) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 401.623171] dump_stack+0x1d3/0x2c6 [ 401.626845] ? dump_stack_print_info.cold.1+0x20/0x20 [ 401.632072] should_fail.cold.4+0xa/0x17 [ 401.636197] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 401.641342] ? save_stack+0xa9/0xd0 [ 401.645003] ? graph_lock+0x270/0x270 [ 401.648818] ? print_usage_bug+0xc0/0xc0 [ 401.652904] ? find_held_lock+0x36/0x1c0 [ 401.657000] ? __lock_is_held+0xb5/0x140 [ 401.661098] ? ___might_sleep+0x1ed/0x300 [ 401.665280] ? arch_local_save_flags+0x40/0x40 [ 401.669888] __should_failslab+0x124/0x180 [ 401.674153] should_failslab+0x9/0x14 [ 401.677967] kmem_cache_alloc+0x2be/0x730 [ 401.682140] ? print_usage_bug+0xc0/0xc0 [ 401.686239] __d_alloc+0xc8/0xb90 [ 401.689702] ? print_usage_bug+0xc0/0xc0 [ 401.693785] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 401.698823] ? __lock_acquire+0x62f/0x4c20 [ 401.703073] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 401.708539] ? do_raw_spin_trylock+0x270/0x270 [ 401.713135] ? __lock_acquire+0x62f/0x4c20 [ 401.717389] ? print_usage_bug+0xc0/0xc0 [ 401.721468] ? mark_held_locks+0x130/0x130 [ 401.725720] ? __lock_acquire+0x62f/0x4c20 [ 401.729990] ? mark_held_locks+0x130/0x130 [ 401.734252] d_alloc+0x96/0x380 [ 401.737553] ? __d_alloc+0xb90/0xb90 [ 401.741288] ? debug_smp_processor_id+0x1c/0x20 [ 401.741308] ? perf_trace_lock_acquire+0x15b/0x800 [ 401.741325] ? check_preemption_disabled+0x48/0x280 [ 401.741349] d_alloc_parallel+0x15a/0x1f40 [ 401.741372] ? mark_held_locks+0x130/0x130 [ 401.751006] ? graph_lock+0x270/0x270 [ 401.751033] ? __d_lookup_rcu+0xaa0/0xaa0 [ 401.751051] ? check_preemption_disabled+0x48/0x280 [ 401.751072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.751090] ? check_preemption_disabled+0x48/0x280 [ 401.751114] ? debug_smp_processor_id+0x1c/0x20 [ 401.751132] ? perf_trace_lock_acquire+0x15b/0x800 [ 401.751160] ? check_preemption_disabled+0x48/0x280 [ 401.760399] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 401.760415] ? kasan_check_read+0x11/0x20 [ 401.760431] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 401.760450] ? graph_lock+0x270/0x270 [ 401.760472] ? __lockdep_init_map+0x105/0x590 10:22:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 401.760500] ? __lockdep_init_map+0x105/0x590 [ 401.760522] ? lockdep_init_map+0x9/0x10 [ 401.760539] ? __init_waitqueue_head+0x9e/0x150 [ 401.768592] ? init_wait_entry+0x1c0/0x1c0 [ 401.768627] ? lock_acquire+0x1ed/0x520 [ 401.768654] __lookup_slow+0x1e6/0x540 [ 401.768703] ? vfs_unlink+0x510/0x510 [ 401.768746] ? inode_permission+0xb2/0x560 [ 401.768770] lookup_slow+0x57/0x80 [ 401.768789] lookup_one_len_unlocked+0xf1/0x100 [ 401.867269] ? lookup_slow+0x80/0x80 [ 401.871036] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.876590] ? ovl_get_redirect_xattr+0xb9/0x257 [ 401.881369] ovl_lookup_single+0x63/0x870 [ 401.884222] IPVS: ftp: loaded support on port[0] = 21 [ 401.885539] ovl_lookup_layer+0x3cf/0x4a0 [ 401.885565] ? ovl_lookup_single+0x870/0x870 [ 401.885579] ? ovl_path_real+0x400/0x400 [ 401.885598] ? ovl_lookup+0x1178/0x29c0 [ 401.885619] ovl_lookup+0x12dd/0x29c0 [ 401.885655] ? ovl_path_next+0x2e0/0x2e0 [ 401.895000] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 401.895019] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 401.895036] ? rcu_softirq_qs+0x20/0x20 [ 401.895060] ? __lockdep_init_map+0x105/0x590 [ 401.903517] ? lockdep_init_map+0x9/0x10 [ 401.903532] ? __init_waitqueue_head+0x9e/0x150 [ 401.903548] ? init_wait_entry+0x1c0/0x1c0 [ 401.903566] ? lock_acquire+0x1ed/0x520 [ 401.903588] __lookup_slow+0x2b5/0x540 [ 401.903607] ? vfs_unlink+0x510/0x510 [ 401.903650] ? __follow_mount_rcu.isra.33.part.34+0x890/0x890 [ 401.934085] lookup_slow+0x57/0x80 [ 401.934104] walk_component+0x92b/0x25b0 [ 401.934127] ? smk_curacc+0x7f/0xa0 [ 401.934148] ? path_init+0x1ed0/0x1ed0 [ 401.934166] ? smk_curacc+0x7f/0xa0 [ 401.934200] ? smack_inode_permission+0x2bc/0x3b0 [ 401.934236] ? smack_file_ioctl+0x3c0/0x3c0 [ 401.934265] ? inode_permission+0xb2/0x560 [ 401.934286] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.934303] ? security_inode_permission+0xd2/0x100 [ 401.959029] ? inode_permission+0xb2/0x560 [ 401.959067] link_path_walk.part.40+0xa61/0x1530 [ 401.959085] ? pick_link+0xaf0/0xaf0 [ 401.959117] ? walk_component+0x25b0/0x25b0 [ 401.959143] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 401.959165] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 401.959183] ? __check_object_size+0xb1/0x782 [ 401.959203] ? usercopy_warn+0x110/0x110 [ 401.980178] path_parentat.isra.41+0x4f/0x160 [ 401.980201] filename_parentat.isra.56+0x25f/0x570 [ 401.980222] ? getname+0x20/0x20 [ 401.980241] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 401.980286] ? digsig_verify+0x1530/0x1530 [ 401.980329] ? kmem_cache_alloc+0x33a/0x730 [ 401.980357] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 401.997480] ? getname_flags+0x26e/0x590 [ 401.997510] do_renameat2+0x3a9/0x1180 [ 401.997528] ? find_held_lock+0x36/0x1c0 [ 401.997553] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 401.997577] ? user_path_create+0x40/0x40 [ 401.997597] ? __lock_is_held+0xb5/0x140 [ 401.997621] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.020896] ? check_preemption_disabled+0x48/0x280 [ 402.035413] ? __sb_end_write+0xd9/0x110 [ 402.035437] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 402.035451] ? fput+0x130/0x1a0 [ 402.035469] ? do_syscall_64+0x9a/0x820 [ 402.035493] ? do_syscall_64+0x9a/0x820 [ 402.035509] ? lockdep_hardirqs_on+0x421/0x5c0 [ 402.035526] ? trace_hardirqs_on+0xbd/0x310 [ 402.035545] ? __ia32_sys_read+0xb0/0xb0 [ 402.044088] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.044105] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 402.044132] __x64_sys_renameat+0x9a/0x100 [ 402.044153] do_syscall_64+0x1b9/0x820 [ 402.044170] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 402.044190] ? syscall_return_slowpath+0x5e0/0x5e0 [ 402.044207] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 402.044225] ? trace_hardirqs_on_caller+0x310/0x310 [ 402.044244] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 402.044263] ? prepare_exit_to_usermode+0x291/0x3b0 [ 402.044286] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 402.062586] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.062601] RIP: 0033:0x457669 10:22:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 402.062633] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 402.062642] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 402.062658] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 402.062668] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 402.062677] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 402.062687] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 402.062696] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:22:58 executing program 1 (fault-call:9 fault-nth:8): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:22:58 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:22:59 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 402.551077] device bridge_slave_1 left promiscuous mode [ 402.558190] bridge0: port 2(bridge_slave_1) entered disabled state [ 402.595712] FAULT_INJECTION: forcing a failure. [ 402.595712] name failslab, interval 1, probability 0, space 0, times 0 [ 402.610718] CPU: 0 PID: 15175 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 402.618107] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 402.627468] Call Trace: [ 402.630074] dump_stack+0x1d3/0x2c6 [ 402.633721] ? dump_stack_print_info.cold.1+0x20/0x20 [ 402.638941] should_fail.cold.4+0xa/0x17 [ 402.643039] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 402.648211] ? lock_downgrade+0x900/0x900 [ 402.652384] ? check_preemption_disabled+0x48/0x280 [ 402.657419] ? graph_lock+0x270/0x270 [ 402.661231] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 402.666172] ? kasan_check_read+0x11/0x20 [ 402.670396] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 402.675689] ? find_held_lock+0x36/0x1c0 [ 402.679769] ? __lock_is_held+0xb5/0x140 [ 402.683884] ? ___might_sleep+0x1ed/0x300 [ 402.688057] ? arch_local_save_flags+0x40/0x40 [ 402.692648] ? dput+0x15/0x20 [ 402.695776] ? ovl_lookup_single+0xd0/0x870 [ 402.700113] __should_failslab+0x124/0x180 [ 402.704354] should_failslab+0x9/0x14 [ 402.708166] __kmalloc+0x2e0/0x770 [ 402.711720] ? ovl_lookup_single+0x870/0x870 [ 402.716138] ? ovl_path_real+0x400/0x400 [ 402.720229] ? ovl_alloc_entry+0x24/0x70 [ 402.724321] ovl_alloc_entry+0x24/0x70 [ 402.728214] ovl_lookup+0xa24/0x29c0 [ 402.732014] ? ovl_path_next+0x2e0/0x2e0 [ 402.736094] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 402.741034] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 402.746330] ? rcu_softirq_qs+0x20/0x20 [ 402.750342] ? __lockdep_init_map+0x105/0x590 [ 402.754855] ? lockdep_init_map+0x9/0x10 [ 402.758931] ? __init_waitqueue_head+0x9e/0x150 [ 402.763611] ? init_wait_entry+0x1c0/0x1c0 [ 402.767859] ? lock_acquire+0x1ed/0x520 [ 402.771955] __lookup_slow+0x2b5/0x540 [ 402.775870] ? vfs_unlink+0x510/0x510 [ 402.779708] ? __follow_mount_rcu.isra.33.part.34+0x890/0x890 [ 402.785609] lookup_slow+0x57/0x80 [ 402.789176] walk_component+0x92b/0x25b0 [ 402.793269] ? smk_curacc+0x7f/0xa0 [ 402.796944] ? path_init+0x1ed0/0x1ed0 [ 402.800877] ? smk_curacc+0x7f/0xa0 [ 402.804515] ? smack_inode_permission+0x2bc/0x3b0 [ 402.809419] ? smack_file_ioctl+0x3c0/0x3c0 [ 402.813778] ? inode_permission+0xb2/0x560 [ 402.818059] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.823642] ? security_inode_permission+0xd2/0x100 [ 402.828676] ? inode_permission+0xb2/0x560 [ 402.832958] link_path_walk.part.40+0xa61/0x1530 [ 402.837783] ? pick_link+0xaf0/0xaf0 [ 402.841527] ? walk_component+0x25b0/0x25b0 [ 402.845880] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 402.851110] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 402.856154] ? __check_object_size+0xb1/0x782 [ 402.860678] ? usercopy_warn+0x110/0x110 [ 402.864760] path_parentat.isra.41+0x4f/0x160 [ 402.869295] filename_parentat.isra.56+0x25f/0x570 [ 402.874250] ? getname+0x20/0x20 [ 402.877655] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 402.883230] ? digsig_verify+0x1530/0x1530 [ 402.887486] ? kmem_cache_alloc+0x33a/0x730 [ 402.891833] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.897479] ? getname_flags+0x26e/0x590 [ 402.901578] do_renameat2+0x3a9/0x1180 [ 402.905478] ? find_held_lock+0x36/0x1c0 [ 402.909553] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 402.914499] ? user_path_create+0x40/0x40 [ 402.918678] ? __lock_is_held+0xb5/0x140 [ 402.922761] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 402.928333] ? check_preemption_disabled+0x48/0x280 [ 402.933369] ? __sb_end_write+0xd9/0x110 [ 402.937449] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 402.943007] ? fput+0x130/0x1a0 [ 402.946313] ? do_syscall_64+0x9a/0x820 [ 402.950313] ? do_syscall_64+0x9a/0x820 [ 402.954295] ? lockdep_hardirqs_on+0x421/0x5c0 [ 402.958886] ? trace_hardirqs_on+0xbd/0x310 [ 402.963218] ? __ia32_sys_read+0xb0/0xb0 [ 402.967293] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 402.972662] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 402.978128] __x64_sys_renameat+0x9a/0x100 [ 402.982383] do_syscall_64+0x1b9/0x820 [ 402.986278] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 402.991657] ? syscall_return_slowpath+0x5e0/0x5e0 [ 402.996588] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 403.001433] ? trace_hardirqs_on_caller+0x310/0x310 [ 403.006466] ? prepare_exit_to_usermode+0x291/0x3b0 [ 403.011490] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 403.016355] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 403.021548] RIP: 0033:0x457669 [ 403.024747] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 403.043652] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 403.051378] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 403.058662] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 403.065932] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 403.073235] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 403.080505] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 [ 403.097252] device bridge_slave_0 left promiscuous mode [ 403.103384] bridge0: port 1(bridge_slave_0) entered disabled state [ 403.172226] team0 (unregistering): Port device team_slave_1 removed [ 403.184454] team0 (unregistering): Port device team_slave_0 removed [ 403.199395] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 403.257066] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 403.352829] bond0 (unregistering): Released all slaves [ 404.056395] bridge0: port 1(bridge_slave_0) entered blocking state [ 404.062926] bridge0: port 1(bridge_slave_0) entered disabled state [ 404.070406] device bridge_slave_0 entered promiscuous mode [ 404.121074] bridge0: port 2(bridge_slave_1) entered blocking state [ 404.127630] bridge0: port 2(bridge_slave_1) entered disabled state [ 404.135759] device bridge_slave_1 entered promiscuous mode [ 404.181892] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 404.228103] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 404.373262] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 404.422955] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 404.474374] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 404.481240] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 404.532070] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 404.539071] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 404.683358] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 404.690760] team0: Port device team_slave_0 added [ 404.738325] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 404.745871] team0: Port device team_slave_1 added [ 404.792449] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 404.845091] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 404.891013] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 404.898294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 404.907403] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 404.931718] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 404.939062] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 404.948106] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 405.326092] bridge0: port 2(bridge_slave_1) entered blocking state [ 405.332562] bridge0: port 2(bridge_slave_1) entered forwarding state [ 405.339213] bridge0: port 1(bridge_slave_0) entered blocking state [ 405.345728] bridge0: port 1(bridge_slave_0) entered forwarding state [ 405.353050] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 405.434294] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 406.390672] 8021q: adding VLAN 0 to HW filter on device bond0 [ 406.518863] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 406.615451] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 406.621616] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 406.631037] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 406.726552] 8021q: adding VLAN 0 to HW filter on device team0 10:23:03 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:03 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_us%r', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:23:03 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000100)={0x6, 0x4, 0x64e6, @remote, 'bond_slave_1\x00'}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:03 executing program 1 (fault-call:9 fault-nth:9): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:03 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 407.305466] 9pnet: Insufficient options for proto=fd [ 407.386679] FAULT_INJECTION: forcing a failure. [ 407.386679] name failslab, interval 1, probability 0, space 0, times 0 [ 407.405599] 9pnet: Insufficient options for proto=fd [ 407.410926] CPU: 0 PID: 15454 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 407.418334] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 407.427846] Call Trace: [ 407.430456] dump_stack+0x1d3/0x2c6 [ 407.434095] ? dump_stack_print_info.cold.1+0x20/0x20 [ 407.439285] should_fail.cold.4+0xa/0x17 [ 407.443379] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 407.448478] ? perf_trace_lock_acquire+0x15b/0x800 [ 407.453406] ? __kernel_text_address+0xd/0x40 [ 407.457953] ? graph_lock+0x270/0x270 [ 407.461772] ? find_held_lock+0x36/0x1c0 [ 407.465831] ? __lock_is_held+0xb5/0x140 [ 407.469955] ? rds_message_inc_copy_to_user+0x138/0x350 [ 407.475335] ? ___might_sleep+0x1ed/0x300 [ 407.479501] ? arch_local_save_flags+0x40/0x40 [ 407.484079] ? ilookup5_nowait+0x84/0xc0 [ 407.488142] __should_failslab+0x124/0x180 [ 407.492387] should_failslab+0x9/0x14 [ 407.496193] kmem_cache_alloc+0x2be/0x730 [ 407.500346] ? find_inode.isra.19+0xc3/0x210 [ 407.504746] ? ovl_i_callback+0x30/0x30 [ 407.508745] ovl_alloc_inode+0x1b/0x190 [ 407.512705] alloc_inode+0x63/0x190 [ 407.516344] iget5_locked+0x124/0x1c0 [ 407.520151] ? ovl_inode_test+0x50/0x50 [ 407.524117] ? ovl_get_redirect_xattr.cold.17+0x47/0x47 [ 407.529486] ovl_get_inode+0x97f/0xd9b [ 407.533380] ovl_lookup+0xd4c/0x29c0 [ 407.537133] ? ovl_path_next+0x2e0/0x2e0 [ 407.541218] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 407.546159] ? __lockdep_init_map+0x105/0x590 [ 407.550678] ? lockdep_init_map+0x9/0x10 [ 407.554773] ? __init_waitqueue_head+0x9e/0x150 [ 407.559456] ? lock_acquire+0x268/0x520 [ 407.563468] __lookup_slow+0x2b5/0x540 [ 407.567369] ? vfs_unlink+0x510/0x510 [ 407.571185] ? __follow_mount_rcu.isra.33.part.34+0x890/0x890 [ 407.577081] lookup_slow+0x57/0x80 [ 407.580629] walk_component+0x92b/0x25b0 [ 407.584700] ? smk_curacc+0x7f/0xa0 [ 407.588344] ? path_init+0x1ed0/0x1ed0 [ 407.592229] ? smk_curacc+0x7f/0xa0 [ 407.595862] ? smack_inode_permission+0x2bc/0x3b0 [ 407.600706] ? smack_file_ioctl+0x3c0/0x3c0 [ 407.605043] ? inode_permission+0xb2/0x560 [ 407.609286] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 407.614825] ? security_inode_permission+0xd2/0x100 [ 407.619854] ? inode_permission+0xb2/0x560 [ 407.624094] link_path_walk.part.40+0xa61/0x1530 [ 407.628848] ? pick_link+0xaf0/0xaf0 [ 407.632585] ? walk_component+0x25b0/0x25b0 [ 407.636920] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 407.642115] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 407.647171] ? __check_object_size+0xb1/0x782 [ 407.651692] ? usercopy_warn+0x110/0x110 [ 407.655753] path_parentat.isra.41+0x4f/0x160 [ 407.660275] filename_parentat.isra.56+0x25f/0x570 [ 407.665215] ? getname+0x20/0x20 [ 407.668595] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 407.674148] ? digsig_verify+0x1530/0x1530 [ 407.678383] ? kmem_cache_alloc+0x33a/0x730 [ 407.682708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 407.688273] ? getname_flags+0x26e/0x590 [ 407.692360] do_renameat2+0x3a9/0x1180 [ 407.696267] ? find_held_lock+0x36/0x1c0 [ 407.700322] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 407.705264] ? user_path_create+0x40/0x40 [ 407.709415] ? __lock_is_held+0xb5/0x140 [ 407.713466] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 407.719016] ? check_preemption_disabled+0x48/0x280 [ 407.724023] ? __sb_end_write+0xd9/0x110 [ 407.728082] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 407.733633] ? fput+0x130/0x1a0 [ 407.736925] ? do_syscall_64+0x9a/0x820 [ 407.740907] ? do_syscall_64+0x9a/0x820 [ 407.744890] ? lockdep_hardirqs_on+0x421/0x5c0 [ 407.749494] ? trace_hardirqs_on+0xbd/0x310 [ 407.753806] ? __ia32_sys_read+0xb0/0xb0 [ 407.757875] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 407.763236] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 407.768693] __x64_sys_renameat+0x9a/0x100 [ 407.772950] do_syscall_64+0x1b9/0x820 [ 407.776907] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 407.782303] ? syscall_return_slowpath+0x5e0/0x5e0 [ 407.787280] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 407.792130] ? trace_hardirqs_on_caller+0x310/0x310 [ 407.797168] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 407.802205] ? prepare_exit_to_usermode+0x291/0x3b0 [ 407.807232] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 407.812082] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 407.817271] RIP: 0033:0x457669 10:23:04 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_use\n', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 407.820449] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 407.839341] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 407.847046] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 407.854301] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 407.861567] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 407.868832] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 407.876103] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:04 executing program 1 (fault-call:9 fault-nth:10): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 407.978107] 9pnet: Insufficient options for proto=fd 10:23:04 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_use%', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 408.000280] 9pnet: Insufficient options for proto=fd [ 408.115173] FAULT_INJECTION: forcing a failure. [ 408.115173] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 408.127046] CPU: 0 PID: 15477 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 408.134427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 408.143819] Call Trace: [ 408.146425] dump_stack+0x1d3/0x2c6 [ 408.150075] ? dump_stack_print_info.cold.1+0x20/0x20 [ 408.152853] 9pnet: Insufficient options for proto=fd [ 408.155284] ? perf_trace_lock_acquire+0x15b/0x800 [ 408.155319] should_fail.cold.4+0xa/0x17 [ 408.155343] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 408.174545] ? check_preemption_disabled+0x48/0x280 [ 408.179583] ? debug_smp_processor_id+0x1c/0x20 [ 408.184265] ? perf_trace_lock_acquire+0x15b/0x800 [ 408.184293] ? perf_trace_lock+0x7a0/0x7a0 [ 408.184313] ? find_held_lock+0x36/0x1c0 [ 408.197521] ? graph_lock+0x270/0x270 [ 408.201342] ? get_mem_cgroup_from_mm+0x1e9/0x440 [ 408.206196] ? lock_downgrade+0x900/0x900 [ 408.210355] ? check_preemption_disabled+0x48/0x280 [ 408.215437] ? rcu_read_unlock+0x16/0x60 [ 408.219514] __alloc_pages_nodemask+0x366/0xea0 [ 408.224196] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 408.229137] ? kasan_check_read+0x11/0x20 [ 408.233295] ? __alloc_pages_slowpath+0x2df0/0x2df0 [ 408.238368] ? __lock_is_held+0xb5/0x140 [ 408.238432] ? ___might_sleep+0x1ed/0x300 [ 408.246578] ? trace_hardirqs_off+0xb8/0x310 [ 408.251023] cache_grow_begin+0x91/0x8c0 [ 408.255112] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 408.260670] ? check_preemption_disabled+0x48/0x280 [ 408.265695] kmem_cache_alloc+0x665/0x730 [ 408.265717] ? ovl_i_callback+0x30/0x30 [ 408.265733] ovl_alloc_inode+0x1b/0x190 [ 408.265749] alloc_inode+0x63/0x190 [ 408.265766] iget5_locked+0x124/0x1c0 [ 408.285257] ? ovl_inode_test+0x50/0x50 [ 408.289247] ? ovl_get_redirect_xattr.cold.17+0x47/0x47 [ 408.295115] ovl_get_inode+0x97f/0xd9b [ 408.299045] ovl_lookup+0xd4c/0x29c0 [ 408.302853] ? ovl_path_next+0x2e0/0x2e0 [ 408.306939] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 408.311871] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 408.317182] ? rcu_softirq_qs+0x20/0x20 [ 408.321193] ? __lockdep_init_map+0x105/0x590 [ 408.325727] ? lockdep_init_map+0x9/0x10 [ 408.329802] ? __init_waitqueue_head+0x9e/0x150 [ 408.334495] ? lock_acquire+0x1ed/0x520 [ 408.338492] __lookup_slow+0x2b5/0x540 [ 408.342402] ? vfs_unlink+0x510/0x510 [ 408.346252] ? __follow_mount_rcu.isra.33.part.34+0x890/0x890 [ 408.352163] lookup_slow+0x57/0x80 [ 408.355746] walk_component+0x92b/0x25b0 [ 408.359829] ? smk_curacc+0x7f/0xa0 [ 408.363481] ? path_init+0x1ed0/0x1ed0 [ 408.367491] ? smk_curacc+0x7f/0xa0 [ 408.371251] ? smack_inode_permission+0x2bc/0x3b0 [ 408.376112] ? smack_file_ioctl+0x3c0/0x3c0 [ 408.380464] ? inode_permission+0xb2/0x560 [ 408.384723] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 408.390276] ? security_inode_permission+0xd2/0x100 [ 408.395347] ? inode_permission+0xb2/0x560 [ 408.399616] link_path_walk.part.40+0xa61/0x1530 [ 408.404383] ? pick_link+0xaf0/0xaf0 [ 408.408128] ? walk_component+0x25b0/0x25b0 [ 408.412479] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 408.417720] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 408.422749] ? __check_object_size+0xb1/0x782 [ 408.427285] ? usercopy_warn+0x110/0x110 [ 408.431370] path_parentat.isra.41+0x4f/0x160 [ 408.435878] filename_parentat.isra.56+0x25f/0x570 [ 408.440855] ? getname+0x20/0x20 [ 408.444298] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 408.449876] ? digsig_verify+0x1530/0x1530 [ 408.449890] ? kmem_cache_alloc+0x33a/0x730 [ 408.449916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 408.449933] ? getname_flags+0x26e/0x590 [ 408.458539] do_renameat2+0x3a9/0x1180 [ 408.458557] ? find_held_lock+0x36/0x1c0 [ 408.458586] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 408.481087] ? user_path_create+0x40/0x40 [ 408.484748] 9pnet: Insufficient options for proto=fd [ 408.485271] ? __lock_is_held+0xb5/0x140 [ 408.494426] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 408.499989] ? check_preemption_disabled+0x48/0x280 [ 408.505041] ? __sb_end_write+0xd9/0x110 [ 408.509137] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 408.514680] ? fput+0x130/0x1a0 [ 408.518005] ? do_syscall_64+0x9a/0x820 [ 408.522051] ? do_syscall_64+0x9a/0x820 [ 408.524452] 9pnet: Insufficient options for proto=fd [ 408.526068] ? lockdep_hardirqs_on+0x421/0x5c0 [ 408.526086] ? trace_hardirqs_on+0xbd/0x310 [ 408.526100] ? __ia32_sys_read+0xb0/0xb0 [ 408.526120] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 408.526136] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 408.526160] __x64_sys_renameat+0x9a/0x100 [ 408.538044] overlayfs: unrecognized mount option "mask=^MAY_APPEND" or missing value [ 408.540158] do_syscall_64+0x1b9/0x820 [ 408.540177] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 408.540198] ? syscall_return_slowpath+0x5e0/0x5e0 [ 408.540215] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 408.540232] ? trace_hardirqs_on_caller+0x310/0x310 [ 408.540253] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 408.586942] 9pnet: Insufficient options for proto=fd [ 408.591229] ? prepare_exit_to_usermode+0x291/0x3b0 [ 408.591256] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 408.591284] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 408.591298] RIP: 0033:0x457669 [ 408.591315] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 408.591330] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 408.601386] 9pnet: Insufficient options for proto=fd [ 408.601456] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 408.658727] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 10:23:05 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) 10:23:05 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0xa, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:23:05 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) finit_module(r0, &(0x7f0000000640)='-^\x00', 0x1) sendfile(r0, r0, &(0x7f0000000100), 0x401) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/net/pfkey\x00', 0x100, 0x0) ioctl$KVM_SET_PIT(r1, 0x8048ae66, &(0x7f00000005c0)={[{0x6, 0x2, 0x3, 0x400, 0x7fffffff, 0x101, 0x1, 0xfff, 0x3, 0x2, 0x7, 0x83, 0x3}, {0x0, 0x800, 0xd3, 0x9, 0x4c, 0x6, 0x1, 0x6, 0x2, 0x4, 0x4, 0x80000000, 0x3f}, {0x3ff, 0x6, 0x3, 0x1ff, 0x0, 0xffffffffffffff81, 0x800, 0xffffffffffffffff, 0x0, 0x6, 0x2800, 0xff, 0xef}], 0x7}) mount$overlay(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='overlay\x00', 0x10000, &(0x7f0000000480)={[{@nfs_export_off='nfs_export=off'}, {@metacopy_on='metacopy=on'}, {@index_on='index=on'}, {@nfs_export_off='nfs_export=off'}, {@workdir={'workdir', 0x3d, './file0'}}, {@xino_off='xino=off'}, {@redirect_dir={'redirect_dir', 0x3d, './file0'}}, {@index_on='index=on'}], [{@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}]}) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f00000006c0)=[@in6={0xa, 0x4e22, 0x9, @remote}, @in6={0xa, 0x4e23, 0x2, @ipv4={[], [], @broadcast}, 0x7ff}, @in={0x2, 0x4e21, @multicast2}, @in6={0xa, 0x4e21, 0x8, @local, 0x2}, @in={0x2, 0x4e23, @multicast2}, @in={0x2, 0x4e20, @multicast2}, @in6={0xa, 0x4e21, 0xfffffffffffffffd, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x16}}, 0x75}, @in6={0xa, 0x4e23, 0xfff, @empty, 0x1}], 0xbc) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r2 = socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x10000014c) r5 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r4, 0x29, 0x22, &(0x7f0000000240)={{{@in=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@broadcast}}, &(0x7f0000000400)=0xe8) setsockopt$RDS_FREE_MR(r4, 0x114, 0x3, &(0x7f0000000180)={{0x6, 0x3ed0000000000000}, 0x36}, 0x10) bind$xdp(r5, &(0x7f0000000440)={0x2c, 0x3, r6, 0x4, r2}, 0x10) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) ioctl$KDGKBTYPE(r5, 0x4b33, &(0x7f0000000540)) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_IRQ_LINE_STATUS(r1, 0xc008ae67, &(0x7f0000000680)={0x10374707, 0x3}) dup2(r0, r4) 10:23:05 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x25, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:23:05 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, '\nrans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:23:05 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) [ 408.666030] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 408.672059] 9pnet: Insufficient options for proto=fd [ 408.673319] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 408.673329] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:05 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:05 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:05 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, '%rans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:23:05 executing program 1 (fault-call:9 fault-nth:11): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 408.894746] 9pnet: Insufficient options for proto=fd 10:23:05 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 't\nans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 408.916047] 9pnet: Insufficient options for proto=fd [ 408.970906] FAULT_INJECTION: forcing a failure. [ 408.970906] name failslab, interval 1, probability 0, space 0, times 0 [ 409.027635] 9pnet: Insufficient options for proto=fd [ 409.042282] CPU: 1 PID: 15530 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 409.049665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.059047] Call Trace: [ 409.061661] dump_stack+0x1d3/0x2c6 [ 409.065319] ? dump_stack_print_info.cold.1+0x20/0x20 [ 409.070562] should_fail.cold.4+0xa/0x17 [ 409.074648] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 409.079774] ? debug_smp_processor_id+0x1c/0x20 [ 409.084472] ? graph_lock+0x270/0x270 [ 409.088307] ? find_held_lock+0x36/0x1c0 [ 409.092426] ? __lock_is_held+0xb5/0x140 [ 409.096519] ? ___might_sleep+0x1ed/0x300 [ 409.100682] ? arch_local_save_flags+0x40/0x40 [ 409.105293] __should_failslab+0x124/0x180 [ 409.109545] should_failslab+0x9/0x14 [ 409.113378] kmem_cache_alloc_trace+0x2d7/0x750 [ 409.118056] ? do_raw_spin_trylock+0x270/0x270 [ 409.122660] ? kernel_text_address+0x79/0xf0 [ 409.127089] smk_fetch.part.24+0x5a/0x100 [ 409.131249] smack_d_instantiate+0x94e/0xea0 [ 409.135681] ? smk_fetch.part.24+0x100/0x100 [ 409.140100] ? save_stack+0xa9/0xd0 [ 409.143736] ? save_stack+0x43/0xd0 [ 409.147380] ? __kasan_slab_free+0x102/0x150 [ 409.151885] security_d_instantiate+0x5c/0xf0 [ 409.156417] d_splice_alias+0x120/0x11d0 [ 409.160493] ? trace_hardirqs_off+0xb8/0x310 [ 409.164914] ? kasan_check_read+0x11/0x20 [ 409.169089] ? do_raw_spin_unlock+0xa7/0x330 [ 409.173548] ? d_instantiate_anon+0x30/0x30 [ 409.177875] ? lock_downgrade+0x900/0x900 [ 409.182044] ? graph_lock+0x270/0x270 [ 409.185858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 409.191418] ? check_preemption_disabled+0x48/0x280 [ 409.196465] ? __lock_is_held+0xb5/0x140 [ 409.200577] ? ovl_lookup+0xe67/0x29c0 [ 409.204582] ? rcu_read_lock_sched_held+0x108/0x120 [ 409.209614] ovl_lookup+0xe77/0x29c0 [ 409.213363] ? ovl_path_next+0x2e0/0x2e0 [ 409.217454] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 409.222436] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 409.227723] ? rcu_softirq_qs+0x20/0x20 [ 409.231728] ? __lockdep_init_map+0x105/0x590 [ 409.236249] ? lockdep_init_map+0x9/0x10 [ 409.240322] ? __init_waitqueue_head+0x9e/0x150 [ 409.245014] ? lock_acquire+0x1ed/0x520 [ 409.249017] __lookup_slow+0x2b5/0x540 [ 409.252921] ? vfs_unlink+0x510/0x510 [ 409.256761] ? __follow_mount_rcu.isra.33.part.34+0x890/0x890 [ 409.262664] lookup_slow+0x57/0x80 [ 409.266223] walk_component+0x92b/0x25b0 [ 409.270299] ? smk_curacc+0x7f/0xa0 [ 409.273937] ? path_init+0x1ed0/0x1ed0 [ 409.277864] ? smk_curacc+0x7f/0xa0 [ 409.281514] ? smack_inode_permission+0x2bc/0x3b0 [ 409.286375] ? smack_file_ioctl+0x3c0/0x3c0 [ 409.290741] ? inode_permission+0xb2/0x560 [ 409.295192] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 409.300751] ? security_inode_permission+0xd2/0x100 [ 409.305805] ? inode_permission+0xb2/0x560 [ 409.310061] link_path_walk.part.40+0xa61/0x1530 [ 409.314834] ? pick_link+0xaf0/0xaf0 [ 409.318574] ? walk_component+0x25b0/0x25b0 [ 409.322924] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 409.328145] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 409.333175] ? __check_object_size+0xb1/0x782 [ 409.337690] ? usercopy_warn+0x110/0x110 [ 409.341788] path_parentat.isra.41+0x4f/0x160 [ 409.346307] filename_parentat.isra.56+0x25f/0x570 [ 409.351261] ? getname+0x20/0x20 [ 409.354642] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 409.360213] ? digsig_verify+0x1530/0x1530 [ 409.364459] ? kmem_cache_alloc+0x33a/0x730 [ 409.368815] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 409.374388] ? getname_flags+0x26e/0x590 10:23:06 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:06 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 't%ans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 409.378469] do_renameat2+0x3a9/0x1180 [ 409.379329] overlayfs: unrecognized mount option "mask=^MAY_APPEND" or missing value [ 409.382376] ? find_held_lock+0x36/0x1c0 [ 409.394568] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 409.394608] ? user_path_create+0x40/0x40 [ 409.394628] ? __lock_is_held+0xb5/0x140 [ 409.403704] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 409.403724] ? check_preemption_disabled+0x48/0x280 [ 409.403749] ? __sb_end_write+0xd9/0x110 [ 409.403772] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 409.403787] ? fput+0x130/0x1a0 [ 409.403805] ? do_syscall_64+0x9a/0x820 [ 409.403827] ? do_syscall_64+0x9a/0x820 [ 409.439723] ? lockdep_hardirqs_on+0x421/0x5c0 [ 409.444318] ? trace_hardirqs_on+0xbd/0x310 [ 409.448701] ? __ia32_sys_read+0xb0/0xb0 [ 409.448736] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 409.448753] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 409.448778] __x64_sys_renameat+0x9a/0x100 [ 409.448800] do_syscall_64+0x1b9/0x820 [ 409.448818] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 409.448838] ? syscall_return_slowpath+0x5e0/0x5e0 [ 409.448858] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 409.467956] ? trace_hardirqs_on_caller+0x310/0x310 [ 409.491994] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 409.497048] ? prepare_exit_to_usermode+0x291/0x3b0 [ 409.502095] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 409.506964] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 409.512180] RIP: 0033:0x457669 [ 409.515389] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 409.534302] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 409.542026] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 409.549304] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 409.556583] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 409.563882] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 409.571155] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 [ 409.615592] 9pnet: Insufficient options for proto=fd 10:23:06 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'tra\ns=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 409.635898] 9pnet: Insufficient options for proto=fd 10:23:06 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl(r0, 0x4143, 0x0) r1 = openat$vhci(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhci\x00', 0x56000, 0x0) sendto(r1, &(0x7f0000000180)="1db45c61550bccc6f10a3272b8fd685c450ec334f589680c568fa7ff42cf296f05d891886383a96e6ef32fdde6890bf843b09b80bb78dfad5bc98d6d78", 0x3d, 0x40810, &(0x7f00000001c0)=@ethernet={0x1}, 0x80) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) accept4$packet(r3, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14, 0x80000) ioctl$sock_inet6_SIOCDELRT(r0, 0x890c, &(0x7f0000000440)={@loopback, @ipv4={[], [], @empty}, @remote, 0x6, 0xffffffffffffff8d, 0x6000000000000000, 0x0, 0x34, 0x190000, r4}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:06 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) 10:23:06 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x0, 0x0, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:06 executing program 1 (fault-call:9 fault-nth:12): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 409.756906] 9pnet: Insufficient options for proto=fd 10:23:06 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'tra%s=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 409.829758] FAULT_INJECTION: forcing a failure. [ 409.829758] name failslab, interval 1, probability 0, space 0, times 0 [ 409.860286] CPU: 0 PID: 15571 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 409.867698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 409.877062] Call Trace: [ 409.879673] dump_stack+0x1d3/0x2c6 [ 409.883329] ? dump_stack_print_info.cold.1+0x20/0x20 [ 409.888576] should_fail.cold.4+0xa/0x17 [ 409.892692] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 409.897834] ? find_held_lock+0x36/0x1c0 [ 409.901913] ? smk_access+0x53b/0x700 [ 409.905775] ? graph_lock+0x270/0x270 [ 409.909604] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 409.915157] ? smack_log+0x423/0x590 [ 409.918917] ? find_held_lock+0x36/0x1c0 [ 409.921518] 9pnet: Insufficient options for proto=fd 10:23:06 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'tranu=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 409.923007] ? __lock_is_held+0xb5/0x140 [ 409.923037] ? ___might_sleep+0x1ed/0x300 [ 409.923053] ? arch_local_save_flags+0x40/0x40 [ 409.923127] ? unwind_get_return_address+0x61/0xa0 [ 409.945861] __should_failslab+0x124/0x180 [ 409.945883] should_failslab+0x9/0x14 [ 409.953903] __kmalloc_track_caller+0x2d1/0x760 [ 409.953919] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 409.953935] ? cap_inode_getsecurity+0x50e/0x820 [ 409.953950] ? smack_inode_getsecurity+0x227/0x360 [ 409.973847] kstrdup+0x39/0x70 [ 409.977086] smack_inode_getsecurity+0x227/0x360 [ 409.981948] security_inode_getsecurity+0xe1/0x130 [ 409.986910] vfs_getxattr+0x1db/0x390 [ 409.990721] ? xattr_permission+0x310/0x310 [ 409.995083] ? ovl_dentry_real+0x210/0x210 [ 409.999403] ovl_xattr_get+0x76/0xb0 [ 410.003137] ovl_other_xattr_get+0x35/0x40 [ 410.007427] ? ovl_other_xattr_set+0x50/0x50 [ 410.011847] __vfs_getxattr+0xee/0x150 [ 410.015747] ? __vfs_setxattr+0x180/0x180 [ 410.019902] ? do_raw_spin_trylock+0x270/0x270 [ 410.024502] ? kernel_text_address+0x79/0xf0 10:23:06 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'tranx=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 410.028925] smk_fetch.part.24+0x7e/0x100 [ 410.033128] smack_d_instantiate+0x94e/0xea0 [ 410.035851] 9pnet: Insufficient options for proto=fd [ 410.037590] ? smk_fetch.part.24+0x100/0x100 [ 410.037607] ? save_stack+0xa9/0xd0 [ 410.037623] ? save_stack+0x43/0xd0 [ 410.037637] ? __kasan_slab_free+0x102/0x150 [ 410.037675] security_d_instantiate+0x5c/0xf0 [ 410.057077] 9pnet: Insufficient options for proto=fd [ 410.058834] d_splice_alias+0x120/0x11d0 [ 410.058864] ? trace_hardirqs_off+0xb8/0x310 [ 410.058878] ? kasan_check_read+0x11/0x20 [ 410.058893] ? do_raw_spin_unlock+0xa7/0x330 [ 410.058912] ? d_instantiate_anon+0x30/0x30 [ 410.089812] ? lock_downgrade+0x900/0x900 [ 410.093989] ? graph_lock+0x270/0x270 [ 410.097812] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 410.103370] ? check_preemption_disabled+0x48/0x280 [ 410.108434] ? __lock_is_held+0xb5/0x140 [ 410.112524] ? ovl_lookup+0xe67/0x29c0 [ 410.116430] ? rcu_read_lock_sched_held+0x108/0x120 [ 410.121467] ovl_lookup+0xe77/0x29c0 [ 410.125223] ? ovl_path_next+0x2e0/0x2e0 10:23:06 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'tran\n=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 410.129316] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 410.130387] 9pnet: Insufficient options for proto=fd [ 410.134272] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 410.134304] ? rcu_softirq_qs+0x20/0x20 [ 410.134328] ? __lockdep_init_map+0x105/0x590 [ 410.134354] ? lockdep_init_map+0x9/0x10 [ 410.134374] ? __init_waitqueue_head+0x9e/0x150 [ 410.161945] ? lock_acquire+0x1ed/0x520 [ 410.165963] __lookup_slow+0x2b5/0x540 [ 410.169885] ? vfs_unlink+0x510/0x510 [ 410.173756] ? __follow_mount_rcu.isra.33.part.34+0x890/0x890 [ 410.179663] lookup_slow+0x57/0x80 [ 410.183224] walk_component+0x92b/0x25b0 [ 410.187306] ? smk_curacc+0x7f/0xa0 [ 410.190987] ? path_init+0x1ed0/0x1ed0 [ 410.194939] ? smk_curacc+0x7f/0xa0 [ 410.198609] ? smack_inode_permission+0x2bc/0x3b0 [ 410.203465] ? smack_file_ioctl+0x3c0/0x3c0 [ 410.207808] ? inode_permission+0xb2/0x560 [ 410.210227] 9pnet: Insufficient options for proto=fd [ 410.212058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 410.212075] ? security_inode_permission+0xd2/0x100 10:23:06 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'tran%=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 410.212095] ? inode_permission+0xb2/0x560 [ 410.212115] link_path_walk.part.40+0xa61/0x1530 [ 410.212132] ? pick_link+0xaf0/0xaf0 [ 410.230761] 9pnet: Insufficient options for proto=fd [ 410.232020] ? walk_component+0x25b0/0x25b0 [ 410.232039] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 410.232057] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 410.232076] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 410.264941] ? __check_object_size+0xb1/0x782 [ 410.269470] ? usercopy_warn+0x110/0x110 [ 410.270225] 9pnet: Insufficient options for proto=fd [ 410.273550] path_parentat.isra.41+0x4f/0x160 [ 410.273569] filename_parentat.isra.56+0x25f/0x570 [ 410.273587] ? getname+0x20/0x20 [ 410.273602] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 410.273628] ? digsig_verify+0x1530/0x1530 [ 410.273644] ? kmem_cache_alloc+0x33a/0x730 [ 410.306148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 410.311703] ? getname_flags+0x26e/0x590 [ 410.315818] do_renameat2+0x3a9/0x1180 [ 410.319718] ? find_held_lock+0x36/0x1c0 [ 410.323815] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 410.328766] ? user_path_create+0x40/0x40 [ 410.332937] ? __lock_is_held+0xb5/0x140 [ 410.337058] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 410.342611] ? check_preemption_disabled+0x48/0x280 [ 410.347648] ? __sb_end_write+0xd9/0x110 [ 410.351817] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 410.357367] ? fput+0x130/0x1a0 [ 410.360664] ? do_syscall_64+0x9a/0x820 [ 410.364668] ? do_syscall_64+0x9a/0x820 [ 410.368681] ? lockdep_hardirqs_on+0x421/0x5c0 [ 410.373283] ? trace_hardirqs_on+0xbd/0x310 [ 410.377621] ? __ia32_sys_read+0xb0/0xb0 [ 410.381714] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 410.387104] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 410.392608] __x64_sys_renameat+0x9a/0x100 [ 410.396864] do_syscall_64+0x1b9/0x820 [ 410.400777] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 410.406161] ? syscall_return_slowpath+0x5e0/0x5e0 [ 410.411105] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 410.415967] ? trace_hardirqs_on_caller+0x310/0x310 [ 410.421009] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 410.426043] ? prepare_exit_to_usermode+0x291/0x3b0 [ 410.431070] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 410.435906] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 410.441083] RIP: 0033:0x457669 [ 410.444288] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 410.463195] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 410.470896] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 10:23:07 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:07 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trand=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 410.478177] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 410.485431] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 410.492716] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 410.500005] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:07 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 10:23:07 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000100)='/dev/adsp#\x00', 0x1ff, 0x80000) ioctl$DRM_IOCTL_MAP_BUFS(r0, 0xc0186419, &(0x7f0000000300)={0x1, &(0x7f0000000180)=""/48, &(0x7f00000002c0)=[{0x0, 0xff, 0x10001, &(0x7f00000001c0)=""/255}]}) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:07 executing program 1 (fault-call:9 fault-nth:13): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:07 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 411.028409] FAULT_INJECTION: forcing a failure. [ 411.028409] name failslab, interval 1, probability 0, space 0, times 0 [ 411.053817] CPU: 0 PID: 15628 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 411.061213] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 411.070573] Call Trace: [ 411.073184] dump_stack+0x1d3/0x2c6 [ 411.076856] ? dump_stack_print_info.cold.1+0x20/0x20 [ 411.082081] should_fail.cold.4+0xa/0x17 [ 411.086172] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 411.091329] ? find_held_lock+0x36/0x1c0 [ 411.095414] ? smk_access+0x53b/0x700 [ 411.099239] ? graph_lock+0x270/0x270 [ 411.103065] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.108618] ? smack_log+0x423/0x590 [ 411.112354] ? find_held_lock+0x36/0x1c0 [ 411.116450] ? __lock_is_held+0xb5/0x140 [ 411.120572] ? dwc3_gadget_set_link_state+0x728/0x11e0 [ 411.125876] ? ___might_sleep+0x1ed/0x300 [ 411.130044] ? arch_local_save_flags+0x40/0x40 [ 411.134641] ? unwind_get_return_address+0x61/0xa0 [ 411.139601] __should_failslab+0x124/0x180 [ 411.143855] should_failslab+0x9/0x14 [ 411.147686] __kmalloc_track_caller+0x2d1/0x760 [ 411.152379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.157949] ? cap_inode_getsecurity+0x50e/0x820 [ 411.162740] ? smack_inode_getsecurity+0x227/0x360 [ 411.167697] kstrdup+0x39/0x70 [ 411.170948] smack_inode_getsecurity+0x227/0x360 [ 411.175753] security_inode_getsecurity+0xe1/0x130 [ 411.180706] vfs_getxattr+0x1db/0x390 [ 411.184527] ? xattr_permission+0x310/0x310 [ 411.188863] ? ovl_dentry_real+0x210/0x210 [ 411.193127] ovl_xattr_get+0x76/0xb0 [ 411.196877] ovl_other_xattr_get+0x35/0x40 [ 411.201126] ? ovl_other_xattr_set+0x50/0x50 [ 411.205539] __vfs_getxattr+0xee/0x150 [ 411.209436] ? __vfs_setxattr+0x180/0x180 [ 411.213586] ? do_raw_spin_trylock+0x270/0x270 [ 411.218185] ? kernel_text_address+0x79/0xf0 [ 411.222616] smk_fetch.part.24+0x7e/0x100 [ 411.226776] smack_d_instantiate+0x94e/0xea0 [ 411.231201] ? smk_fetch.part.24+0x100/0x100 [ 411.235675] ? save_stack+0xa9/0xd0 [ 411.239310] ? save_stack+0x43/0xd0 [ 411.242942] ? __kasan_slab_free+0x102/0x150 [ 411.247443] security_d_instantiate+0x5c/0xf0 [ 411.251966] d_splice_alias+0x120/0x11d0 [ 411.256049] ? trace_hardirqs_off+0xb8/0x310 [ 411.260485] ? kasan_check_read+0x11/0x20 [ 411.264659] ? do_raw_spin_unlock+0xa7/0x330 [ 411.269093] ? d_instantiate_anon+0x30/0x30 [ 411.273417] ? lock_downgrade+0x900/0x900 [ 411.277576] ? graph_lock+0x270/0x270 [ 411.281408] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.287024] ? check_preemption_disabled+0x48/0x280 [ 411.292068] ? __lock_is_held+0xb5/0x140 [ 411.296658] ? ovl_lookup+0xe67/0x29c0 [ 411.300562] ? rcu_read_lock_sched_held+0x108/0x120 [ 411.305604] ovl_lookup+0xe77/0x29c0 [ 411.309393] ? ovl_path_next+0x2e0/0x2e0 [ 411.313485] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 411.318447] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 411.323763] ? rcu_softirq_qs+0x20/0x20 [ 411.327772] ? __lockdep_init_map+0x105/0x590 [ 411.332295] ? lockdep_init_map+0x9/0x10 [ 411.336371] ? __init_waitqueue_head+0x9e/0x150 [ 411.341081] ? lock_acquire+0x1ed/0x520 [ 411.345095] __lookup_slow+0x2b5/0x540 [ 411.349030] ? vfs_unlink+0x510/0x510 [ 411.352876] ? __follow_mount_rcu.isra.33.part.34+0x890/0x890 [ 411.358784] lookup_slow+0x57/0x80 [ 411.362348] walk_component+0x92b/0x25b0 [ 411.366445] ? smk_curacc+0x7f/0xa0 [ 411.370095] ? path_init+0x1ed0/0x1ed0 [ 411.374016] ? smk_curacc+0x7f/0xa0 [ 411.377667] ? smack_inode_permission+0x2bc/0x3b0 [ 411.382558] ? smack_file_ioctl+0x3c0/0x3c0 [ 411.386907] ? inode_permission+0xb2/0x560 [ 411.391152] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.396676] ? security_inode_permission+0xd2/0x100 [ 411.401683] ? inode_permission+0xb2/0x560 [ 411.405909] link_path_walk.part.40+0xa61/0x1530 [ 411.410661] ? pick_link+0xaf0/0xaf0 [ 411.414392] ? walk_component+0x25b0/0x25b0 [ 411.418713] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 411.423898] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 411.429063] ? __check_object_size+0xb1/0x782 [ 411.433547] ? usercopy_warn+0x110/0x110 [ 411.437619] path_parentat.isra.41+0x4f/0x160 [ 411.442128] filename_parentat.isra.56+0x25f/0x570 [ 411.447059] ? getname+0x20/0x20 [ 411.450413] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 411.455992] ? digsig_verify+0x1530/0x1530 [ 411.460237] ? kmem_cache_alloc+0x33a/0x730 [ 411.464561] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.470094] ? getname_flags+0x26e/0x590 [ 411.474184] do_renameat2+0x3a9/0x1180 10:23:08 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) [ 411.478119] ? find_held_lock+0x36/0x1c0 [ 411.482195] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 411.487167] ? user_path_create+0x40/0x40 [ 411.491331] ? __lock_is_held+0xb5/0x140 [ 411.495407] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 411.500952] ? check_preemption_disabled+0x48/0x280 [ 411.506009] ? __sb_end_write+0xd9/0x110 [ 411.506033] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 411.506045] ? fput+0x130/0x1a0 [ 411.506067] ? do_syscall_64+0x9a/0x820 [ 411.515710] ? do_syscall_64+0x9a/0x820 [ 411.515725] ? lockdep_hardirqs_on+0x421/0x5c0 [ 411.515741] ? trace_hardirqs_on+0xbd/0x310 [ 411.515753] ? __ia32_sys_read+0xb0/0xb0 [ 411.515773] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.545394] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 411.550877] __x64_sys_renameat+0x9a/0x100 [ 411.555119] do_syscall_64+0x1b9/0x820 [ 411.559030] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 411.564411] ? syscall_return_slowpath+0x5e0/0x5e0 [ 411.569368] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 411.574218] ? trace_hardirqs_on_caller+0x310/0x310 [ 411.579247] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 411.584322] ? prepare_exit_to_usermode+0x291/0x3b0 [ 411.589372] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 411.594235] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 411.599448] RIP: 0033:0x457669 [ 411.602640] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 411.621537] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 10:23:08 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 411.629253] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 411.636527] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 411.643799] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 411.651075] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 411.658349] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:08 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r1 = accept(r0, &(0x7f0000000180)=@hci, &(0x7f0000000100)=0x80) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000280)={&(0x7f0000000400)={0x454, r2, 0x100, 0x70bd28, 0x25dfdbfe, {}, [@TIPC_NLA_BEARER={0x90, 0x1, [@TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffffffffffff9}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @broadcast}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x6, @mcast1, 0x8}}}}, @TIPC_NLA_BEARER_NAME={0xc, 0x1, @l2={'ib', 0x3a, 'eql\x00'}}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x859}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}]}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x100}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x94, 0x5, [@TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5403}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x24, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x10001}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x101}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x22e5fce4}]}, @TIPC_NLA_LINK={0xb0, 0x4, [@TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x9}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1f}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x101}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}]}, @TIPC_NLA_LINK_PROP={0x4c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x61b1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb5be}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x244}]}]}, @TIPC_NLA_BEARER={0x128, 0x1, [@TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}]}, @TIPC_NLA_BEARER_PROP={0x24, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xb14}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}]}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e21, @rand_addr=0x9}}, {0x14, 0x2, @in={0x2, 0x4e20, @loopback}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xffff}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e24, 0x5, @empty, 0x2}}, {0x20, 0x2, @in6={0xa, 0x4e24, 0x5f79, @ipv4={[], [], @remote}, 0x3}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x7}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e22, @broadcast}}}}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xabb}]}, @TIPC_NLA_BEARER_PROP={0x34, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5d6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x401}]}]}, @TIPC_NLA_SOCK={0x10, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0x50, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0xfffffffffffffff7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xd67}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x101}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x4}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x10000}]}, @TIPC_NLA_NET={0x48, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x41}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x1462599f}, @TIPC_NLA_NET_NODEID_W1={0xc}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x37ea}]}, @TIPC_NLA_BEARER={0x58, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0xff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x200}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'bridge0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xdf}]}]}, 0x454}, 0x1, 0x0, 0x0, 0x4000000}, 0x80) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000300)={0x3, 0x3, 0x100000000, 0x9, 0x8, 0xe6, 0xffffffff, 0xffffffff, 0x4, 0x118a48a2, 0x400, 0x10001}) fcntl$getflags(r3, 0x409) 10:23:08 executing program 1 (fault-call:9 fault-nth:14): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:08 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trano=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 411.937412] FAULT_INJECTION: forcing a failure. [ 411.937412] name failslab, interval 1, probability 0, space 0, times 0 [ 412.007480] CPU: 1 PID: 15648 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 412.014868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.024231] Call Trace: [ 412.026834] dump_stack+0x1d3/0x2c6 [ 412.030493] ? dump_stack_print_info.cold.1+0x20/0x20 [ 412.035720] should_fail.cold.4+0xa/0x17 [ 412.039818] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 412.044941] ? _raw_spin_unlock+0x2c/0x50 [ 412.049155] ? simple_xattr_get+0x106/0x180 [ 412.053498] ? graph_lock+0x270/0x270 [ 412.057390] ? shmem_xattr_handler_get+0x3e/0x50 [ 412.062204] ? find_held_lock+0x36/0x1c0 [ 412.066375] ? __lock_is_held+0xb5/0x140 [ 412.070479] ? ___might_sleep+0x1ed/0x300 [ 412.074648] ? arch_local_save_flags+0x40/0x40 [ 412.079259] __should_failslab+0x124/0x180 [ 412.083520] should_failslab+0x9/0x14 [ 412.087335] kmem_cache_alloc_trace+0x2d7/0x750 [ 412.092021] ? __vfs_getxattr+0xf6/0x150 [ 412.096101] ? __vfs_setxattr+0x180/0x180 [ 412.100272] smk_fetch.part.24+0x5a/0x100 [ 412.104459] smack_d_instantiate+0xa46/0xea0 [ 412.108897] ? smk_fetch.part.24+0x100/0x100 [ 412.113318] ? save_stack+0xa9/0xd0 [ 412.116961] ? save_stack+0x43/0xd0 [ 412.120614] ? __kasan_slab_free+0x102/0x150 [ 412.125047] security_d_instantiate+0x5c/0xf0 [ 412.129564] d_splice_alias+0x120/0x11d0 [ 412.133637] ? trace_hardirqs_off+0xb8/0x310 [ 412.138062] ? kasan_check_read+0x11/0x20 [ 412.142245] ? do_raw_spin_unlock+0xa7/0x330 [ 412.146676] ? d_instantiate_anon+0x30/0x30 [ 412.151014] ? lock_downgrade+0x900/0x900 [ 412.155202] ? graph_lock+0x270/0x270 [ 412.159045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.164600] ? check_preemption_disabled+0x48/0x280 [ 412.169641] ? __lock_is_held+0xb5/0x140 [ 412.173725] ? ovl_lookup+0xe67/0x29c0 [ 412.177624] ? rcu_read_lock_sched_held+0x108/0x120 [ 412.182655] ovl_lookup+0xe77/0x29c0 [ 412.186497] ? ovl_path_next+0x2e0/0x2e0 [ 412.190585] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 412.195530] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 412.200822] ? rcu_softirq_qs+0x20/0x20 [ 412.204815] ? __lockdep_init_map+0x105/0x590 [ 412.209347] ? lockdep_init_map+0x9/0x10 [ 412.213418] ? __init_waitqueue_head+0x9e/0x150 [ 412.218148] ? lock_acquire+0x1ed/0x520 [ 412.222186] __lookup_slow+0x2b5/0x540 [ 412.226087] ? vfs_unlink+0x510/0x510 [ 412.229927] ? __follow_mount_rcu.isra.33.part.34+0x890/0x890 [ 412.235840] lookup_slow+0x57/0x80 [ 412.239397] walk_component+0x92b/0x25b0 [ 412.243479] ? smk_curacc+0x7f/0xa0 [ 412.247131] ? path_init+0x1ed0/0x1ed0 [ 412.251043] ? smk_curacc+0x7f/0xa0 [ 412.254687] ? smack_inode_permission+0x2bc/0x3b0 [ 412.259551] ? smack_file_ioctl+0x3c0/0x3c0 [ 412.263892] ? inode_permission+0xb2/0x560 [ 412.268148] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.273724] ? security_inode_permission+0xd2/0x100 [ 412.278773] ? inode_permission+0xb2/0x560 [ 412.283024] link_path_walk.part.40+0xa61/0x1530 [ 412.287788] ? pick_link+0xaf0/0xaf0 [ 412.291545] ? walk_component+0x25b0/0x25b0 [ 412.295891] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 412.301097] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 412.306123] ? __check_object_size+0xb1/0x782 [ 412.310655] ? usercopy_warn+0x110/0x110 [ 412.314786] path_parentat.isra.41+0x4f/0x160 [ 412.319312] filename_parentat.isra.56+0x25f/0x570 [ 412.324273] ? getname+0x20/0x20 [ 412.327698] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 412.333264] ? digsig_verify+0x1530/0x1530 [ 412.337527] ? kmem_cache_alloc+0x33a/0x730 [ 412.341903] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.347452] ? getname_flags+0x26e/0x590 [ 412.351537] do_renameat2+0x3a9/0x1180 [ 412.355441] ? find_held_lock+0x36/0x1c0 [ 412.359527] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 412.364478] ? user_path_create+0x40/0x40 [ 412.364787] IPVS: ftp: loaded support on port[0] = 21 [ 412.368647] ? __lock_is_held+0xb5/0x140 [ 412.368672] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.368690] ? check_preemption_disabled+0x48/0x280 [ 412.368715] ? __sb_end_write+0xd9/0x110 [ 412.368736] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 412.368752] ? fput+0x130/0x1a0 [ 412.383549] ? do_syscall_64+0x9a/0x820 10:23:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 412.383566] ? do_syscall_64+0x9a/0x820 [ 412.383582] ? lockdep_hardirqs_on+0x421/0x5c0 [ 412.383599] ? trace_hardirqs_on+0xbd/0x310 [ 412.383612] ? __ia32_sys_read+0xb0/0xb0 [ 412.383630] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.383646] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 412.383671] __x64_sys_renameat+0x9a/0x100 [ 412.383691] do_syscall_64+0x1b9/0x820 [ 412.383708] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 412.383728] ? syscall_return_slowpath+0x5e0/0x5e0 [ 412.392785] ? trace_hardirqs_off_thunk+0x1a/0x1c 10:23:09 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) [ 412.392818] ? trace_hardirqs_on_caller+0x310/0x310 [ 412.392836] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 412.392856] ? prepare_exit_to_usermode+0x291/0x3b0 [ 412.392881] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 412.392908] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 412.392927] RIP: 0033:0x457669 [ 412.401722] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 412.401732] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 412.401747] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 412.401757] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 412.401767] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 412.401777] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 412.401787] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:09 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:09 executing program 1 (fault-call:9 fault-nth:15): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 412.723872] device bridge_slave_1 left promiscuous mode [ 412.730439] bridge0: port 2(bridge_slave_1) entered disabled state [ 412.751913] FAULT_INJECTION: forcing a failure. [ 412.751913] name failslab, interval 1, probability 0, space 0, times 0 [ 412.763458] CPU: 1 PID: 15671 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 412.770838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 412.780198] Call Trace: [ 412.782819] dump_stack+0x1d3/0x2c6 [ 412.786467] ? dump_stack_print_info.cold.1+0x20/0x20 [ 412.791729] should_fail.cold.4+0xa/0x17 [ 412.795848] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 412.800995] ? graph_lock+0x270/0x270 [ 412.804813] ? save_stack+0x43/0xd0 [ 412.808459] ? __kasan_slab_free+0x102/0x150 [ 412.812880] ? kasan_slab_free+0xe/0x10 [ 412.816874] ? find_held_lock+0x36/0x1c0 [ 412.820999] ? __lock_is_held+0xb5/0x140 [ 412.825077] ? ___might_sleep+0x1ed/0x300 [ 412.829242] ? arch_local_save_flags+0x40/0x40 [ 412.833846] ? kfree+0x107/0x230 [ 412.837239] ? lockdep_hardirqs_on+0x421/0x5c0 [ 412.841833] __should_failslab+0x124/0x180 [ 412.846087] should_failslab+0x9/0x14 [ 412.849896] kmem_cache_alloc_trace+0x2d7/0x750 [ 412.854570] ? __kasan_slab_free+0x119/0x150 [ 412.859014] ? smk_fetch.part.24+0xdb/0x100 [ 412.863384] smk_fetch.part.24+0x5a/0x100 [ 412.867546] smack_d_instantiate+0x5a0/0xea0 [ 412.872009] ? smk_fetch.part.24+0x100/0x100 [ 412.876427] ? save_stack+0xa9/0xd0 [ 412.880063] ? save_stack+0x43/0xd0 [ 412.883701] ? __kasan_slab_free+0x102/0x150 [ 412.888131] security_d_instantiate+0x5c/0xf0 [ 412.892642] d_splice_alias+0x120/0x11d0 [ 412.896704] ? trace_hardirqs_off+0xb8/0x310 [ 412.901116] ? kasan_check_read+0x11/0x20 [ 412.905274] ? do_raw_spin_unlock+0xa7/0x330 [ 412.909694] ? d_instantiate_anon+0x30/0x30 [ 412.914053] ? lock_downgrade+0x900/0x900 [ 412.918245] ? graph_lock+0x270/0x270 [ 412.922113] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 412.927658] ? check_preemption_disabled+0x48/0x280 [ 412.932713] ? __lock_is_held+0xb5/0x140 [ 412.936796] ? ovl_lookup+0xe67/0x29c0 [ 412.940693] ? rcu_read_lock_sched_held+0x108/0x120 [ 412.945717] ovl_lookup+0xe77/0x29c0 [ 412.949478] ? ovl_path_next+0x2e0/0x2e0 [ 412.953572] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 412.958540] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 412.963823] ? rcu_softirq_qs+0x20/0x20 [ 412.967850] ? __lockdep_init_map+0x105/0x590 [ 412.972362] ? lockdep_init_map+0x9/0x10 [ 412.976441] ? __init_waitqueue_head+0x9e/0x150 [ 412.981145] ? lock_acquire+0x1ed/0x520 [ 412.985166] __lookup_slow+0x2b5/0x540 [ 412.989155] ? vfs_unlink+0x510/0x510 [ 412.992999] ? __follow_mount_rcu.isra.33.part.34+0x890/0x890 [ 412.998912] lookup_slow+0x57/0x80 [ 413.002464] walk_component+0x92b/0x25b0 [ 413.006542] ? smk_curacc+0x7f/0xa0 [ 413.010185] ? path_init+0x1ed0/0x1ed0 [ 413.014084] ? smk_curacc+0x7f/0xa0 [ 413.017761] ? smack_inode_permission+0x2bc/0x3b0 [ 413.022625] ? smack_file_ioctl+0x3c0/0x3c0 [ 413.026983] ? inode_permission+0xb2/0x560 [ 413.027008] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.027027] ? security_inode_permission+0xd2/0x100 [ 413.036797] ? inode_permission+0xb2/0x560 [ 413.036819] link_path_walk.part.40+0xa61/0x1530 [ 413.036834] ? pick_link+0xaf0/0xaf0 [ 413.036863] ? walk_component+0x25b0/0x25b0 [ 413.036887] ? __sanitizer_cov_trace_switch+0x53/0x90 [ 413.036906] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 413.036922] ? __check_object_size+0xb1/0x782 10:23:09 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = fcntl$getown(r1, 0x9) process_vm_readv(r2, &(0x7f0000000480)=[{&(0x7f0000000180)=""/171, 0xab}, {&(0x7f0000000240)=""/86, 0x56}, {&(0x7f0000000100)=""/9, 0x9}, {&(0x7f00000002c0)=""/67, 0x43}, {&(0x7f0000000400)=""/18, 0x12}, {&(0x7f0000000440)=""/26, 0x1a}], 0x6, &(0x7f0000000800)=[{&(0x7f0000000500)=""/197, 0xc5}, {&(0x7f0000000600)=""/254, 0xfe}, {&(0x7f0000000700)=""/234, 0xea}], 0x3, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 413.036941] ? usercopy_warn+0x110/0x110 [ 413.077805] path_parentat.isra.41+0x4f/0x160 [ 413.082319] filename_parentat.isra.56+0x25f/0x570 [ 413.087270] ? getname+0x20/0x20 [ 413.090656] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 413.096230] ? digsig_verify+0x1530/0x1530 [ 413.100500] ? kmem_cache_alloc+0x33a/0x730 [ 413.104854] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.110437] ? getname_flags+0x26e/0x590 [ 413.114526] do_renameat2+0x3a9/0x1180 [ 413.118447] ? find_held_lock+0x36/0x1c0 [ 413.122553] ? __mutex_unlock_slowpath+0x197/0x8c0 [ 413.127511] ? user_path_create+0x40/0x40 [ 413.131680] ? __lock_is_held+0xb5/0x140 [ 413.135777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.141338] ? check_preemption_disabled+0x48/0x280 [ 413.146379] ? __sb_end_write+0xd9/0x110 [ 413.150460] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 413.156017] ? fput+0x130/0x1a0 [ 413.159317] ? do_syscall_64+0x9a/0x820 [ 413.163313] ? do_syscall_64+0x9a/0x820 [ 413.167309] ? lockdep_hardirqs_on+0x421/0x5c0 [ 413.171920] ? trace_hardirqs_on+0xbd/0x310 [ 413.176229] ? __ia32_sys_read+0xb0/0xb0 [ 413.180306] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.185672] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 413.191113] __x64_sys_renameat+0x9a/0x100 [ 413.195349] do_syscall_64+0x1b9/0x820 [ 413.199221] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 413.204575] ? syscall_return_slowpath+0x5e0/0x5e0 [ 413.209493] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 413.214331] ? trace_hardirqs_on_caller+0x310/0x310 [ 413.219332] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 413.224340] ? prepare_exit_to_usermode+0x291/0x3b0 [ 413.229407] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 413.234246] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.239440] RIP: 0033:0x457669 [ 413.242643] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 413.261555] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 10:23:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 413.269278] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 413.276561] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 413.283875] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 413.291154] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 413.298596] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 [ 413.336055] device bridge_slave_0 left promiscuous mode [ 413.343086] bridge0: port 1(bridge_slave_0) entered disabled state 10:23:10 executing program 1 (fault-call:9 fault-nth:16): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:10 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) [ 413.550265] FAULT_INJECTION: forcing a failure. [ 413.550265] name failslab, interval 1, probability 0, space 0, times 0 [ 413.557459] team0 (unregistering): Port device team_slave_1 removed [ 413.564446] CPU: 1 PID: 15691 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 413.575602] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 413.584959] Call Trace: [ 413.584993] dump_stack+0x1d3/0x2c6 [ 413.585016] ? dump_stack_print_info.cold.1+0x20/0x20 [ 413.585064] should_fail.cold.4+0xa/0x17 [ 413.585090] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 413.591300] ? dput.part.25+0x241/0x790 [ 413.591322] ? check_preemption_disabled+0x48/0x280 [ 413.591348] ? graph_lock+0x270/0x270 [ 413.591380] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 413.591397] ? rcu_softirq_qs+0x20/0x20 [ 413.591425] ? find_held_lock+0x36/0x1c0 [ 413.600669] ? __lock_is_held+0xb5/0x140 [ 413.600702] ? ___might_sleep+0x1ed/0x300 [ 413.600720] ? arch_local_save_flags+0x40/0x40 [ 413.600738] ? ovl_lookup_single+0xd0/0x870 10:23:10 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 413.600767] __should_failslab+0x124/0x180 [ 413.600786] should_failslab+0x9/0x14 [ 413.609847] __kmalloc+0x2e0/0x770 [ 413.609863] ? ovl_lookup_single+0x870/0x870 [ 413.609878] ? ovl_path_real+0x400/0x400 [ 413.609899] ? rcu_read_lock_sched_held+0x108/0x120 [ 413.609915] ? ovl_lookup+0x1178/0x29c0 [ 413.609937] ovl_lookup+0x1178/0x29c0 [ 413.609985] ? ovl_path_next+0x2e0/0x2e0 [ 413.618835] ? do_raw_spin_unlock+0xa7/0x330 [ 413.618853] ? do_raw_spin_trylock+0x270/0x270 [ 413.618886] ? _raw_spin_unlock+0x2c/0x50 10:23:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 413.618901] ? d_alloc+0x290/0x380 [ 413.618920] ? __d_alloc+0xb90/0xb90 [ 413.618934] ? lock_rename+0xdb/0x290 [ 413.618961] __lookup_hash+0x12e/0x190 [ 413.628224] do_renameat2+0x6c1/0x1180 [ 413.628261] ? user_path_create+0x40/0x40 [ 413.628283] ? __lock_is_held+0xb5/0x140 [ 413.628314] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 413.628331] ? check_preemption_disabled+0x48/0x280 [ 413.628355] ? __sb_end_write+0xd9/0x110 [ 413.636495] ? fput+0x130/0x1a0 [ 413.636514] ? do_syscall_64+0x9a/0x820 [ 413.636530] ? do_syscall_64+0x9a/0x820 [ 413.636546] ? lockdep_hardirqs_on+0x421/0x5c0 [ 413.636563] ? trace_hardirqs_on+0xbd/0x310 [ 413.636577] ? __ia32_sys_read+0xb0/0xb0 [ 413.636596] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 413.636620] __x64_sys_renameat+0x9a/0x100 [ 413.636639] do_syscall_64+0x1b9/0x820 [ 413.645364] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 413.645383] ? syscall_return_slowpath+0x5e0/0x5e0 [ 413.645399] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 413.645416] ? trace_hardirqs_on_caller+0x310/0x310 [ 413.645433] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 413.645452] ? prepare_exit_to_usermode+0x291/0x3b0 [ 413.645475] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 413.645510] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 413.645522] RIP: 0033:0x457669 [ 413.645537] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:23:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 413.645546] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 413.645564] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 413.654104] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 413.654115] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 413.654125] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 413.654135] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 [ 413.895432] team0 (unregistering): Port device team_slave_0 removed [ 413.907538] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 413.969318] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 414.080235] bond0 (unregistering): Released all slaves [ 414.817066] bridge0: port 1(bridge_slave_0) entered blocking state [ 414.824036] bridge0: port 1(bridge_slave_0) entered disabled state [ 414.831314] device bridge_slave_0 entered promiscuous mode [ 414.878082] bridge0: port 2(bridge_slave_1) entered blocking state [ 414.884631] bridge0: port 2(bridge_slave_1) entered disabled state [ 414.891997] device bridge_slave_1 entered promiscuous mode [ 414.938885] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 414.984305] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 415.127895] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 415.186021] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 415.233508] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bond: link is not ready [ 415.240360] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 415.289234] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bond: link is not ready [ 415.296386] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 415.441596] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 415.449679] team0: Port device team_slave_0 added [ 415.495908] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 415.504217] team0: Port device team_slave_1 added [ 415.552274] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 415.600706] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 415.646651] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 415.654813] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 415.663095] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 415.709549] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 415.716862] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 415.726282] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 416.072802] bridge0: port 2(bridge_slave_1) entered blocking state [ 416.079223] bridge0: port 2(bridge_slave_1) entered forwarding state [ 416.086023] bridge0: port 1(bridge_slave_0) entered blocking state [ 416.092538] bridge0: port 1(bridge_slave_0) entered forwarding state [ 416.100683] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 416.182640] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 417.140173] 8021q: adding VLAN 0 to HW filter on device bond0 [ 417.236598] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 417.332200] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 417.338421] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 417.345922] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 417.441182] 8021q: adding VLAN 0 to HW filter on device team0 10:23:14 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans%fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:23:14 executing program 1 (fault-call:9 fault-nth:17): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:14 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000100)=0x0) mq_notify(r0, &(0x7f0000000180)={0x0, 0x21, 0x6, @tid=r2}) 10:23:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:14 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 10:23:14 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 418.023242] 9pnet: Insufficient options for proto=fd [ 418.126665] FAULT_INJECTION: forcing a failure. [ 418.126665] name failslab, interval 1, probability 0, space 0, times 0 [ 418.152063] 9pnet: Insufficient options for proto=fd [ 418.158342] CPU: 1 PID: 15982 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 418.165716] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.175077] Call Trace: [ 418.177736] dump_stack+0x1d3/0x2c6 [ 418.181385] ? dump_stack_print_info.cold.1+0x20/0x20 [ 418.186613] should_fail.cold.4+0xa/0x17 [ 418.190710] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 418.195826] ? trace_hardirqs_on+0xbd/0x310 [ 418.200155] ? kasan_check_read+0x11/0x20 [ 418.204315] ? __wake_up_common_lock+0x1d0/0x330 [ 418.209113] ? kasan_check_write+0x14/0x20 [ 418.213411] ? graph_lock+0x270/0x270 [ 418.217230] ? graph_lock+0x270/0x270 [ 418.221061] ? find_held_lock+0x36/0x1c0 [ 418.225142] ? __lock_is_held+0xb5/0x140 [ 418.229242] ? ___might_sleep+0x1ed/0x300 [ 418.233449] ? arch_local_save_flags+0x40/0x40 [ 418.238046] ? lock_downgrade+0x900/0x900 [ 418.242238] __should_failslab+0x124/0x180 [ 418.246511] should_failslab+0x9/0x14 [ 418.250411] kmem_cache_alloc+0x2be/0x730 [ 418.254574] ? print_usage_bug+0xc0/0xc0 [ 418.258668] ? print_usage_bug+0xc0/0xc0 [ 418.262773] __d_alloc+0xc8/0xb90 [ 418.266259] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 418.271283] ? __lock_acquire+0x62f/0x4c20 [ 418.275523] ? __lock_acquire+0x62f/0x4c20 [ 418.279762] ? print_usage_bug+0xc0/0xc0 [ 418.283846] ? print_usage_bug+0xc0/0xc0 [ 418.287918] ? mark_held_locks+0x130/0x130 [ 418.292217] ? mark_held_locks+0x130/0x130 [ 418.296486] ? mark_held_locks+0x130/0x130 [ 418.300762] d_alloc+0x96/0x380 [ 418.304104] ? __d_alloc+0xb90/0xb90 [ 418.307828] ? debug_smp_processor_id+0x1c/0x20 [ 418.312526] ? perf_trace_lock_acquire+0x15b/0x800 [ 418.317476] d_alloc_parallel+0x15a/0x1f40 [ 418.321734] ? mark_held_locks+0x130/0x130 [ 418.325992] ? perf_trace_lock+0x7a0/0x7a0 [ 418.330246] ? graph_lock+0x270/0x270 [ 418.334060] ? perf_trace_lock+0x7a0/0x7a0 [ 418.338325] ? graph_lock+0x270/0x270 [ 418.342172] ? __d_lookup_rcu+0xaa0/0xaa0 [ 418.346368] ? check_preemption_disabled+0x48/0x280 [ 418.351398] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 418.356949] ? check_preemption_disabled+0x48/0x280 [ 418.362002] ? debug_smp_processor_id+0x1c/0x20 [ 418.366692] ? perf_trace_lock_acquire+0x15b/0x800 [ 418.371649] ? check_preemption_disabled+0x48/0x280 [ 418.376688] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 418.382054] ? kasan_check_read+0x11/0x20 [ 418.386205] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 418.391510] ? graph_lock+0x270/0x270 [ 418.395333] ? __lockdep_init_map+0x105/0x590 [ 418.399892] ? __lockdep_init_map+0x105/0x590 [ 418.404441] ? lockdep_init_map+0x9/0x10 [ 418.408530] ? __init_waitqueue_head+0x9e/0x150 [ 418.413210] ? init_wait_entry+0x1c0/0x1c0 [ 418.417456] ? lock_acquire+0x1ed/0x520 [ 418.421457] __lookup_slow+0x1e6/0x540 [ 418.425362] ? vfs_unlink+0x510/0x510 [ 418.429199] ? inode_permission+0xb2/0x560 [ 418.433455] lookup_slow+0x57/0x80 [ 418.437063] lookup_one_len_unlocked+0xf1/0x100 [ 418.441789] ? lookup_slow+0x80/0x80 [ 418.445527] ? graph_lock+0x270/0x270 [ 418.449353] ? check_preemption_disabled+0x48/0x280 [ 418.454412] ovl_lookup_single+0x63/0x870 [ 418.458593] ovl_lookup_layer+0x3cf/0x4a0 [ 418.462767] ? kasan_check_write+0x14/0x20 [ 418.467031] ? override_creds+0x195/0x1f0 [ 418.471209] ? ovl_dentry_upper+0x65/0x120 [ 418.475449] ? ovl_lookup_single+0x870/0x870 [ 418.479889] ? ovl_path_real+0x400/0x400 [ 418.483987] ? rcu_read_lock_sched_held+0x108/0x120 [ 418.489027] ovl_lookup+0x5cf/0x29c0 [ 418.492776] ? ovl_path_next+0x2e0/0x2e0 [ 418.496908] ? do_raw_spin_unlock+0xa7/0x330 [ 418.501354] ? do_raw_spin_trylock+0x270/0x270 [ 418.505988] ? _raw_spin_unlock+0x2c/0x50 [ 418.510151] ? d_alloc+0x290/0x380 [ 418.513720] ? __d_alloc+0xb90/0xb90 [ 418.517459] ? lock_rename+0xdb/0x290 [ 418.521288] __lookup_hash+0x12e/0x190 10:23:15 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans\nfd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 418.525196] do_renameat2+0x6c1/0x1180 [ 418.529152] ? user_path_create+0x40/0x40 [ 418.533335] ? __lock_is_held+0xb5/0x140 [ 418.537443] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 418.543018] ? check_preemption_disabled+0x48/0x280 [ 418.548072] ? __sb_end_write+0xd9/0x110 [ 418.552164] ? fput+0x130/0x1a0 [ 418.555507] ? do_syscall_64+0x9a/0x820 [ 418.559525] ? do_syscall_64+0x9a/0x820 [ 418.563544] ? lockdep_hardirqs_on+0x421/0x5c0 [ 418.568150] ? trace_hardirqs_on+0xbd/0x310 [ 418.572527] ? __ia32_sys_read+0xb0/0xb0 10:23:15 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=.d,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 418.576595] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 418.582060] __x64_sys_renameat+0x9a/0x100 [ 418.586306] do_syscall_64+0x1b9/0x820 [ 418.587186] 9pnet: Insufficient options for proto=fd [ 418.590209] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 418.590244] ? syscall_return_slowpath+0x5e0/0x5e0 [ 418.590274] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 418.590290] ? trace_hardirqs_on_caller+0x310/0x310 [ 418.590307] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 418.590325] ? prepare_exit_to_usermode+0x291/0x3b0 [ 418.590347] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 418.590370] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 418.635667] RIP: 0033:0x457669 [ 418.638866] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 418.646267] 9pnet: Insufficient options for proto=fd [ 418.657785] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 418.657801] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 10:23:15 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=/d,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:23:15 executing program 1 (fault-call:9 fault-nth:18): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 418.657811] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 418.657821] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 418.657831] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 418.657841] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 [ 418.688341] 9pnet: Insufficient options for proto=fd 10:23:15 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:15 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=\nd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:23:15 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 418.834805] 9pnet: Insufficient options for proto=fd [ 418.843395] 9pnet: Insufficient options for proto=fd 10:23:15 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) [ 418.944594] FAULT_INJECTION: forcing a failure. [ 418.944594] name failslab, interval 1, probability 0, space 0, times 0 [ 418.975070] CPU: 0 PID: 16016 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 418.982456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 418.990711] 9pnet: Insufficient options for proto=fd [ 418.991833] Call Trace: [ 418.991862] dump_stack+0x1d3/0x2c6 [ 418.991891] ? dump_stack_print_info.cold.1+0x20/0x20 [ 419.008498] should_fail.cold.4+0xa/0x17 [ 419.011454] 9pnet: Insufficient options for proto=fd [ 419.012579] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 419.012601] ? dput.part.25+0x241/0x790 [ 419.012624] ? check_preemption_disabled+0x48/0x280 [ 419.012647] ? graph_lock+0x270/0x270 [ 419.035622] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 419.040918] ? rcu_softirq_qs+0x20/0x20 [ 419.044914] ? find_held_lock+0x36/0x1c0 [ 419.049007] ? __lock_is_held+0xb5/0x140 [ 419.053375] ? ___might_sleep+0x1ed/0x300 [ 419.057544] ? arch_local_save_flags+0x40/0x40 [ 419.062150] ? ovl_lookup_single+0xd0/0x870 [ 419.066514] __should_failslab+0x124/0x180 [ 419.070788] should_failslab+0x9/0x14 [ 419.074633] __kmalloc+0x2e0/0x770 [ 419.078193] ? ovl_lookup_single+0x870/0x870 [ 419.082615] ? ovl_path_real+0x400/0x400 [ 419.086743] ? rcu_read_lock_sched_held+0x108/0x120 [ 419.091773] ? ovl_lookup+0x1178/0x29c0 [ 419.095770] ovl_lookup+0x1178/0x29c0 [ 419.099625] ? ovl_path_next+0x2e0/0x2e0 [ 419.103741] ? do_raw_spin_unlock+0xa7/0x330 [ 419.108169] ? do_raw_spin_trylock+0x270/0x270 [ 419.112784] ? _raw_spin_unlock+0x2c/0x50 [ 419.116941] ? d_alloc+0x290/0x380 [ 419.120507] ? __d_alloc+0xb90/0xb90 [ 419.124245] ? lock_rename+0xdb/0x290 [ 419.128079] __lookup_hash+0x12e/0x190 [ 419.131992] do_renameat2+0x6c1/0x1180 [ 419.135913] ? user_path_create+0x40/0x40 [ 419.140074] ? __lock_is_held+0xb5/0x140 [ 419.144151] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.149697] ? check_preemption_disabled+0x48/0x280 [ 419.154735] ? __sb_end_write+0xd9/0x110 [ 419.158814] ? fput+0x130/0x1a0 [ 419.162103] ? do_syscall_64+0x9a/0x820 [ 419.166087] ? do_syscall_64+0x9a/0x820 [ 419.170074] ? lockdep_hardirqs_on+0x421/0x5c0 [ 419.174664] ? trace_hardirqs_on+0xbd/0x310 [ 419.179003] ? __ia32_sys_read+0xb0/0xb0 [ 419.183072] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 419.188537] __x64_sys_renameat+0x9a/0x100 [ 419.192783] do_syscall_64+0x1b9/0x820 [ 419.196689] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 419.202090] ? syscall_return_slowpath+0x5e0/0x5e0 [ 419.207029] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 419.211885] ? trace_hardirqs_on_caller+0x310/0x310 [ 419.216909] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 419.221938] ? prepare_exit_to_usermode+0x291/0x3b0 [ 419.227015] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 419.231992] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 419.237191] RIP: 0033:0x457669 [ 419.240393] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 419.259647] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 419.267370] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 419.274678] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 419.281954] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 419.289263] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 419.297016] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:16 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) mq_getsetattr(r1, &(0x7f0000000100)={0xe2, 0x1000, 0xc26, 0xef4c, 0x101, 0x37, 0x33603b8f, 0xffff}, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$OBJ_GET_MAP(0x7, &(0x7f00000001c0)={&(0x7f0000000200)='./file0\x00', 0x0, 0x18}, 0x10) pselect6(0x40, &(0x7f00000000c0)={0xb2}, 0x0, &(0x7f0000000140)={0x1b7, 0x4000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:16 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:16 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=%d,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:23:16 executing program 1 (fault-call:9 fault-nth:19): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 419.498810] 9pnet: Insufficient options for proto=fd [ 419.517355] FAULT_INJECTION: forcing a failure. [ 419.517355] name failslab, interval 1, probability 0, space 0, times 0 [ 419.530856] CPU: 1 PID: 16049 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 419.538341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 419.547698] Call Trace: [ 419.550318] dump_stack+0x1d3/0x2c6 [ 419.554003] ? dump_stack_print_info.cold.1+0x20/0x20 [ 419.559226] should_fail.cold.4+0xa/0x17 [ 419.563320] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 419.568435] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 419.573719] ? rcu_softirq_qs+0x20/0x20 [ 419.577750] ? graph_lock+0x270/0x270 [ 419.581565] ? __d_lookup+0x5b8/0x9e0 [ 419.585385] ? find_held_lock+0x36/0x1c0 [ 419.589463] ? __lock_is_held+0xb5/0x140 [ 419.593613] ? ___might_sleep+0x1ed/0x300 [ 419.597784] ? arch_local_save_flags+0x40/0x40 [ 419.602392] __should_failslab+0x124/0x180 [ 419.606651] should_failslab+0x9/0x14 [ 419.610463] kmem_cache_alloc_trace+0x2d7/0x750 [ 419.615153] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.620698] ? lookup_dcache+0x6b/0x140 [ 419.624694] ovl_encode_real_fh+0xca/0x500 [ 419.628962] ? ovl_set_attr+0x550/0x550 [ 419.632960] ? ovl_check_metacopy_xattr+0x79/0x140 [ 419.637915] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.643461] ? ovl_lookup_single+0xd0/0x870 [ 419.647847] ovl_get_index_name+0x1c/0x80 [ 419.652032] ovl_lookup_index+0xe4/0x700 [ 419.656125] ? ovl_get_index_fh+0x2d0/0x2d0 [ 419.660456] ? ovl_path_real+0x400/0x400 [ 419.664540] ? rcu_read_lock_sched_held+0x108/0x120 [ 419.669569] ? ovl_lookup+0x1178/0x29c0 [ 419.673566] ovl_lookup+0x9f2/0x29c0 [ 419.677330] ? ovl_path_next+0x2e0/0x2e0 [ 419.681437] ? do_raw_spin_unlock+0xa7/0x330 [ 419.685863] ? do_raw_spin_trylock+0x270/0x270 [ 419.690469] ? _raw_spin_unlock+0x2c/0x50 [ 419.694664] ? d_alloc+0x290/0x380 [ 419.698221] ? __d_alloc+0xb90/0xb90 [ 419.701963] ? lock_rename+0xdb/0x290 [ 419.705829] __lookup_hash+0x12e/0x190 [ 419.709736] do_renameat2+0x6c1/0x1180 [ 419.713642] ? user_path_create+0x40/0x40 [ 419.717784] ? __lock_is_held+0xb5/0x140 [ 419.721880] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 419.727410] ? check_preemption_disabled+0x48/0x280 [ 419.732432] ? __sb_end_write+0xd9/0x110 [ 419.736520] ? fput+0x130/0x1a0 [ 419.739831] ? do_syscall_64+0x9a/0x820 [ 419.743830] ? do_syscall_64+0x9a/0x820 [ 419.747848] ? lockdep_hardirqs_on+0x421/0x5c0 [ 419.752452] ? trace_hardirqs_on+0xbd/0x310 [ 419.756792] ? __ia32_sys_read+0xb0/0xb0 [ 419.760882] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 419.766353] __x64_sys_renameat+0x9a/0x100 [ 419.770616] do_syscall_64+0x1b9/0x820 [ 419.774529] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 419.779919] ? syscall_return_slowpath+0x5e0/0x5e0 [ 419.784873] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 419.789730] ? trace_hardirqs_on_caller+0x310/0x310 [ 419.794753] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 419.799780] ? prepare_exit_to_usermode+0x291/0x3b0 [ 419.804808] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 419.809665] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 419.814884] RIP: 0033:0x457669 [ 419.818077] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 419.837027] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 419.844783] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 419.852057] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 419.859347] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 419.866631] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 419.873907] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:16 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=f\n,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:23:16 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) 10:23:16 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:16 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140), 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 420.089795] 9pnet: Insufficient options for proto=fd 10:23:16 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000001b40)={0x53, 0x1f, 0x797, {0x80000001, 0xfff}, {0x1, 0x2}, @cond=[{0x1, 0xfffffffffffeffff, 0xba25, 0x0, 0x5, 0x8}, {0xffffffffffffffe1, 0x7, 0x0, 0x9, 0x8, 0x8}]}) write(r1, &(0x7f0000000340), 0x10000014c) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000100)={0x0, r1}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) sendmsg$rds(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000180)=""/203, 0xcb}, {&(0x7f0000000280)=""/99, 0x63}, {&(0x7f0000000400)=""/168, 0xa8}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f00000014c0)=""/248, 0xf8}, {&(0x7f00000015c0)=""/220, 0xdc}, {&(0x7f00000016c0)=""/151, 0x97}], 0x8, &(0x7f0000001980)=[@fadd={0x58, 0x114, 0x6, {{0x4, 0x2}, &(0x7f0000001800)=0xb5b, &(0x7f0000001840)=0xfff, 0x1000, 0x0, 0x6, 0x3, 0x5, 0x7}}, @fadd={0x58, 0x114, 0x6, {{0x5, 0xcab8}, &(0x7f0000001880)=0x4, &(0x7f00000018c0)=0x800, 0x0, 0x6, 0x3, 0x8001, 0x44}}, @fadd={0x58, 0x114, 0x6, {{0x9, 0x7ff}, &(0x7f0000001900)=0xaf6, &(0x7f0000001940)=0x255, 0x3ff, 0x10001, 0x800000000, 0x129, 0x40, 0xbf6f}}], 0x108, 0x800}, 0x4004040) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000001b80)) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000001b00)) 10:23:16 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=f%,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 420.117753] 9pnet: Insufficient options for proto=fd 10:23:16 executing program 1 (fault-call:9 fault-nth:20): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:16 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd8'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 420.238535] 9pnet: Insufficient options for proto=fd 10:23:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 420.361710] FAULT_INJECTION: forcing a failure. [ 420.361710] name failslab, interval 1, probability 0, space 0, times 0 [ 420.399348] CPU: 1 PID: 16099 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 420.406743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 420.416119] Call Trace: [ 420.418743] dump_stack+0x1d3/0x2c6 [ 420.422395] ? dump_stack_print_info.cold.1+0x20/0x20 [ 420.427641] should_fail.cold.4+0xa/0x17 [ 420.431734] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 420.436877] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 420.442203] ? rcu_softirq_qs+0x20/0x20 [ 420.446209] ? graph_lock+0x270/0x270 [ 420.450035] ? __d_lookup+0x5b8/0x9e0 [ 420.453867] ? find_held_lock+0x36/0x1c0 [ 420.457962] ? __lock_is_held+0xb5/0x140 [ 420.462059] ? ___might_sleep+0x1ed/0x300 [ 420.466242] ? arch_local_save_flags+0x40/0x40 [ 420.470856] __should_failslab+0x124/0x180 [ 420.475123] should_failslab+0x9/0x14 [ 420.479026] kmem_cache_alloc_trace+0x2d7/0x750 [ 420.483748] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 420.489346] ? lookup_dcache+0x6b/0x140 [ 420.493341] ovl_encode_real_fh+0xca/0x500 [ 420.497591] ? ovl_set_attr+0x550/0x550 [ 420.501581] ? ovl_check_metacopy_xattr+0x79/0x140 [ 420.506529] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 420.512106] ? ovl_lookup_single+0xd0/0x870 [ 420.516447] ovl_get_index_name+0x1c/0x80 [ 420.520612] ovl_lookup_index+0xe4/0x700 [ 420.524699] ? ovl_get_index_fh+0x2d0/0x2d0 [ 420.529045] ? ovl_path_real+0x400/0x400 [ 420.533118] ? rcu_read_lock_sched_held+0x108/0x120 [ 420.538162] ? ovl_lookup+0x1178/0x29c0 [ 420.542150] ovl_lookup+0x9f2/0x29c0 [ 420.545957] ? ovl_path_next+0x2e0/0x2e0 [ 420.550051] ? do_raw_spin_unlock+0xa7/0x330 [ 420.554515] ? do_raw_spin_trylock+0x270/0x270 [ 420.559158] ? _raw_spin_unlock+0x2c/0x50 [ 420.563313] ? d_alloc+0x290/0x380 [ 420.566873] ? __d_alloc+0xb90/0xb90 [ 420.570594] ? lock_rename+0xdb/0x290 [ 420.574416] __lookup_hash+0x12e/0x190 [ 420.578317] do_renameat2+0x6c1/0x1180 [ 420.582245] ? user_path_create+0x40/0x40 [ 420.586436] ? __lock_is_held+0xb5/0x140 [ 420.590570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 420.596129] ? check_preemption_disabled+0x48/0x280 [ 420.601166] ? __sb_end_write+0xd9/0x110 [ 420.605269] ? fput+0x130/0x1a0 [ 420.608567] ? do_syscall_64+0x9a/0x820 [ 420.612551] ? do_syscall_64+0x9a/0x820 [ 420.616536] ? lockdep_hardirqs_on+0x421/0x5c0 [ 420.621145] ? trace_hardirqs_on+0xbd/0x310 [ 420.625473] ? __ia32_sys_read+0xb0/0xb0 [ 420.629560] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 420.635036] __x64_sys_renameat+0x9a/0x100 [ 420.639291] do_syscall_64+0x1b9/0x820 [ 420.643207] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 420.648589] ? syscall_return_slowpath+0x5e0/0x5e0 [ 420.653530] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 420.658392] ? trace_hardirqs_on_caller+0x310/0x310 [ 420.663424] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 420.668473] ? prepare_exit_to_usermode+0x291/0x3b0 [ 420.673537] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 420.678407] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 420.683609] RIP: 0033:0x457669 [ 420.686813] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 420.705722] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 420.713444] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 420.720740] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 420.728064] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 420.735356] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 420.742636] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:17 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}, 0x38}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 420.764217] 9pnet: Insufficient options for proto=fd 10:23:17 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0xfb00}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 420.964246] 9pnet: Insufficient options for proto=fd 10:23:17 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'\nuid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:23:17 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 420.994516] 9pnet: Insufficient options for proto=fd 10:23:17 executing program 1 (fault-call:9 fault-nth:21): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:17 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:17 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x5, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x5}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000180)=0x1, 0x4) ioctl$KVM_GET_DIRTY_LOG(r1, 0x4010ae42, &(0x7f0000000100)={0x12710, 0x0, &(0x7f0000ffc000/0x1000)=nil}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 421.188554] 9pnet: Insufficient options for proto=fd [ 421.237705] FAULT_INJECTION: forcing a failure. [ 421.237705] name failslab, interval 1, probability 0, space 0, times 0 [ 421.256504] CPU: 0 PID: 16133 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 421.263887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.273254] Call Trace: [ 421.275865] dump_stack+0x1d3/0x2c6 [ 421.279526] ? dump_stack_print_info.cold.1+0x20/0x20 10:23:17 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'%uid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 421.284780] should_fail.cold.4+0xa/0x17 [ 421.288868] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 421.293995] ? graph_lock+0x270/0x270 [ 421.297848] ? graph_lock+0x270/0x270 [ 421.301641] ? __insert_inode_hash+0x1fb/0x2b0 [ 421.306245] ? find_held_lock+0x36/0x1c0 [ 421.310326] ? __lock_is_held+0xb5/0x140 [ 421.314417] ? ___might_sleep+0x1ed/0x300 [ 421.318577] ? arch_local_save_flags+0x40/0x40 [ 421.323172] ? no_open+0x10/0x10 [ 421.326582] __should_failslab+0x124/0x180 [ 421.330850] should_failslab+0x9/0x14 [ 421.334689] __kmalloc+0x2e0/0x770 [ 421.338250] ? dput+0x15/0x20 [ 421.341366] ? ovl_encode_real_fh+0x1bb/0x500 [ 421.341388] ovl_encode_real_fh+0x1bb/0x500 [ 421.350196] ? ovl_set_attr+0x550/0x550 [ 421.350221] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 421.350252] ? ovl_lookup_single+0xd0/0x870 [ 421.350278] ovl_get_index_name+0x1c/0x80 [ 421.368239] ovl_lookup_index+0xe4/0x700 [ 421.372427] ? ovl_get_index_fh+0x2d0/0x2d0 [ 421.376759] ? ovl_path_real+0x400/0x400 [ 421.381606] ? rcu_read_lock_sched_held+0x108/0x120 10:23:18 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'eXid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 421.386638] ? ovl_lookup+0x1178/0x29c0 [ 421.390013] 9pnet: Insufficient options for proto=fd [ 421.390622] ovl_lookup+0x9f2/0x29c0 [ 421.390661] ? ovl_path_next+0x2e0/0x2e0 [ 421.403545] ? do_raw_spin_unlock+0xa7/0x330 [ 421.404688] 9pnet: Insufficient options for proto=fd [ 421.408141] ? do_raw_spin_trylock+0x270/0x270 [ 421.408176] ? _raw_spin_unlock+0x2c/0x50 [ 421.408206] ? d_alloc+0x290/0x380 [ 421.408228] ? __d_alloc+0xb90/0xb90 [ 421.429508] ? lock_rename+0xdb/0x290 [ 421.433359] __lookup_hash+0x12e/0x190 [ 421.433386] do_renameat2+0x6c1/0x1180 [ 421.441161] ? user_path_create+0x40/0x40 [ 421.445328] ? __lock_is_held+0xb5/0x140 [ 421.449424] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 421.454991] ? check_preemption_disabled+0x48/0x280 [ 421.460054] ? __sb_end_write+0xd9/0x110 [ 421.464135] ? fput+0x130/0x1a0 [ 421.467430] ? do_syscall_64+0x9a/0x820 [ 421.471418] ? do_syscall_64+0x9a/0x820 [ 421.475401] ? lockdep_hardirqs_on+0x421/0x5c0 [ 421.480028] ? trace_hardirqs_on+0xbd/0x310 [ 421.484392] ? __ia32_sys_read+0xb0/0xb0 [ 421.488476] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 421.489253] 9pnet: Insufficient options for proto=fd [ 421.493951] __x64_sys_renameat+0x9a/0x100 [ 421.493989] do_syscall_64+0x1b9/0x820 [ 421.494009] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 421.494029] ? syscall_return_slowpath+0x5e0/0x5e0 [ 421.494045] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 421.494066] ? trace_hardirqs_on_caller+0x310/0x310 [ 421.527455] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 421.532516] ? prepare_exit_to_usermode+0x291/0x3b0 [ 421.537559] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 421.542430] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 421.547651] RIP: 0033:0x457669 [ 421.550850] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 421.569764] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 421.577477] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 10:23:18 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f0000001b40)={0x53, 0x1f, 0x797, {0x80000001, 0xfff}, {0x1, 0x2}, @cond=[{0x1, 0xfffffffffffeffff, 0xba25, 0x0, 0x5, 0x8}, {0xffffffffffffffe1, 0x7, 0x0, 0x9, 0x8, 0x8}]}) write(r1, &(0x7f0000000340), 0x10000014c) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000100)={0x0, r1}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) sendmsg$rds(r0, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001780)=[{&(0x7f0000000180)=""/203, 0xcb}, {&(0x7f0000000280)=""/99, 0x63}, {&(0x7f0000000400)=""/168, 0xa8}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000300)=""/8, 0x8}, {&(0x7f00000014c0)=""/248, 0xf8}, {&(0x7f00000015c0)=""/220, 0xdc}, {&(0x7f00000016c0)=""/151, 0x97}], 0x8, &(0x7f0000001980)=[@fadd={0x58, 0x114, 0x6, {{0x4, 0x2}, &(0x7f0000001800)=0xb5b, &(0x7f0000001840)=0xfff, 0x1000, 0x0, 0x6, 0x3, 0x5, 0x7}}, @fadd={0x58, 0x114, 0x6, {{0x5, 0xcab8}, &(0x7f0000001880)=0x4, &(0x7f00000018c0)=0x800, 0x0, 0x6, 0x3, 0x8001, 0x44}}, @fadd={0x58, 0x114, 0x6, {{0x9, 0x7ff}, &(0x7f0000001900)=0xaf6, &(0x7f0000001940)=0x255, 0x3ff, 0x10001, 0x800000000, 0x129, 0x40, 0xbf6f}}], 0x108, 0x800}, 0x4004040) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000001b80)) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SG_GET_RESERVED_SIZE(r1, 0x2272, &(0x7f0000001b00)) 10:23:18 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'edid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 421.584765] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 421.592047] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 421.599314] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 421.606568] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:18 executing program 1 (fault-call:9 fault-nth:22): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x489c0, 0x8) ioctl$BLKPG(r0, 0x1269, &(0x7f00000001c0)={0x2, 0x6, 0x1000, &(0x7f0000000400)="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"}) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) r3 = getpgid(0x0) ioctl$SG_GET_NUM_WAITING(r2, 0x227d, &(0x7f0000000100)) prctl$PR_SET_PTRACER(0x59616d61, r3) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:18 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'exid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 421.790688] 9pnet: Insufficient options for proto=fd [ 421.801953] 9pnet: Insufficient options for proto=fd [ 421.908338] FAULT_INJECTION: forcing a failure. [ 421.908338] name failslab, interval 1, probability 0, space 0, times 0 [ 421.934213] CPU: 1 PID: 16177 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 421.941932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 421.943054] 9pnet: Insufficient options for proto=fd [ 421.951314] Call Trace: [ 421.951339] dump_stack+0x1d3/0x2c6 [ 421.951361] ? dump_stack_print_info.cold.1+0x20/0x20 [ 421.951392] should_fail.cold.4+0xa/0x17 [ 421.951416] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 421.951445] ? print_usage_bug+0xc0/0xc0 [ 421.951462] ? graph_lock+0x270/0x270 [ 421.951478] ? debug_smp_processor_id+0x1c/0x20 [ 421.951505] ? perf_trace_lock_acquire+0x15b/0x800 [ 421.951519] ? print_usage_bug+0xc0/0xc0 [ 421.951543] ? find_held_lock+0x36/0x1c0 [ 421.981227] ? __lock_is_held+0xb5/0x140 [ 421.981293] ? ubifs_find_free_leb_for_idx+0x228/0xf40 [ 421.981320] ? ___might_sleep+0x1ed/0x300 [ 421.989761] ? arch_local_save_flags+0x40/0x40 [ 421.989780] ? mark_held_locks+0x130/0x130 [ 421.989803] __should_failslab+0x124/0x180 [ 421.989821] should_failslab+0x9/0x14 [ 421.989835] kmem_cache_alloc+0x2be/0x730 [ 421.989850] ? check_preemption_disabled+0x48/0x280 [ 421.989869] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 421.989888] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 422.047862] __d_alloc+0xc8/0xb90 [ 422.047884] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 422.047899] ? __lock_acquire+0x62f/0x4c20 [ 422.047919] ? debug_smp_processor_id+0x1c/0x20 [ 422.047936] ? perf_trace_lock_acquire+0x15b/0x800 [ 422.047952] ? print_usage_bug+0xc0/0xc0 [ 422.056964] ? print_usage_bug+0xc0/0xc0 [ 422.057009] ? mark_held_locks+0x130/0x130 [ 422.057025] ? debug_smp_processor_id+0x1c/0x20 [ 422.057048] ? perf_trace_lock_acquire+0x15b/0x800 [ 422.097833] ? graph_lock+0x270/0x270 [ 422.101662] d_alloc+0x96/0x380 [ 422.104979] ? __d_alloc+0xb90/0xb90 [ 422.108710] ? debug_smp_processor_id+0x1c/0x20 [ 422.113400] ? perf_trace_lock_acquire+0x15b/0x800 [ 422.118355] d_alloc_parallel+0x15a/0x1f40 [ 422.122605] ? mark_held_locks+0x130/0x130 [ 422.126859] ? graph_lock+0x270/0x270 [ 422.130701] ? __d_lookup_rcu+0xaa0/0xaa0 [ 422.134867] ? check_preemption_disabled+0x48/0x280 [ 422.139905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 422.145455] ? check_preemption_disabled+0x48/0x280 [ 422.150502] ? debug_smp_processor_id+0x1c/0x20 [ 422.155193] ? perf_trace_lock_acquire+0x15b/0x800 [ 422.160157] ? perf_trace_lock+0x7a0/0x7a0 [ 422.164410] ? check_preemption_disabled+0x48/0x280 [ 422.169443] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 422.174393] ? kasan_check_read+0x11/0x20 [ 422.178553] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 422.183863] ? graph_lock+0x270/0x270 [ 422.187685] ? __lockdep_init_map+0x105/0x590 [ 422.192211] ? __lockdep_init_map+0x105/0x590 [ 422.196740] ? lockdep_init_map+0x9/0x10 [ 422.200816] ? __init_waitqueue_head+0x9e/0x150 [ 422.205507] ? init_wait_entry+0x1c0/0x1c0 [ 422.209777] ? lock_acquire+0x1ed/0x520 [ 422.213779] __lookup_slow+0x1e6/0x540 [ 422.217700] ? vfs_unlink+0x510/0x510 [ 422.221549] ? inode_permission+0xb2/0x560 [ 422.225805] lookup_slow+0x57/0x80 [ 422.229358] lookup_one_len_unlocked+0xf1/0x100 [ 422.234037] ? lookup_slow+0x80/0x80 [ 422.237786] ovl_lookup_index+0x1c9/0x700 [ 422.241947] ? ovl_get_index_fh+0x2d0/0x2d0 [ 422.246300] ? ovl_path_real+0x400/0x400 [ 422.250374] ? rcu_read_lock_sched_held+0x108/0x120 [ 422.255401] ? ovl_lookup+0x1178/0x29c0 [ 422.259408] ovl_lookup+0x9f2/0x29c0 [ 422.263163] ? ovl_path_next+0x2e0/0x2e0 [ 422.267256] ? do_raw_spin_unlock+0xa7/0x330 [ 422.271671] ? do_raw_spin_trylock+0x270/0x270 [ 422.276275] ? _raw_spin_unlock+0x2c/0x50 [ 422.280476] ? d_alloc+0x290/0x380 [ 422.284039] ? __d_alloc+0xb90/0xb90 [ 422.287776] ? lock_rename+0xdb/0x290 [ 422.291637] __lookup_hash+0x12e/0x190 [ 422.295546] do_renameat2+0x6c1/0x1180 [ 422.299464] ? user_path_create+0x40/0x40 [ 422.303643] ? __lock_is_held+0xb5/0x140 [ 422.307927] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 422.313498] ? check_preemption_disabled+0x48/0x280 [ 422.318555] ? __sb_end_write+0xd9/0x110 [ 422.322641] ? fput+0x130/0x1a0 [ 422.326022] ? do_syscall_64+0x9a/0x820 [ 422.330015] ? do_syscall_64+0x9a/0x820 [ 422.334011] ? lockdep_hardirqs_on+0x421/0x5c0 [ 422.338606] ? trace_hardirqs_on+0xbd/0x310 [ 422.342939] ? __ia32_sys_read+0xb0/0xb0 [ 422.347028] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 422.352505] __x64_sys_renameat+0x9a/0x100 [ 422.356792] do_syscall_64+0x1b9/0x820 [ 422.360699] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 422.366088] ? syscall_return_slowpath+0x5e0/0x5e0 [ 422.371032] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 422.375888] ? trace_hardirqs_on_caller+0x310/0x310 [ 422.380935] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 422.386020] ? prepare_exit_to_usermode+0x291/0x3b0 [ 422.391058] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 422.395937] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 422.401147] RIP: 0033:0x457669 [ 422.404367] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 422.423273] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 422.431021] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 422.438302] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 422.445576] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 422.452858] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 10:23:18 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:18 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:18 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'elid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 422.460139] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 [ 422.473586] overlayfs: failed inode index lookup (ino=65350, key=00fb2100014cf2800ead6040ac97dc3aaa87e2a2a977e0fb7b46ff000000000000, err=-12); [ 422.473586] overlayfs: mount with '-o index=off' to disable inodes index. [ 422.545495] 9pnet: Insufficient options for proto=fd 10:23:19 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'esid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:23:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 422.566940] 9pnet: Insufficient options for proto=fd 10:23:19 executing program 1 (fault-call:9 fault-nth:23): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:19 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000400)='./file0\x00', 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f00000019c0)='bpf\x00', 0x0, 0x0) mkdir(&(0x7f0000000200)='./file0/file0\x00', 0x0) 10:23:19 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000540)='/dev/sequencer2\x00', 0x301080, 0x0) r1 = accept$inet6(r0, &(0x7f0000000500)={0xa, 0x0, 0x0, @ipv4={[], [], @remote}}, &(0x7f0000000580)=0x14) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f00000004c0)=0x9, 0x4) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) bpf$MAP_CREATE(0x0, &(0x7f00000001c0)={0x5, 0x401, 0x0, 0x6, 0xdcb67230fca5f8e2, r2, 0x2}, 0x2c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x73, &(0x7f0000000440)={0x0, 0x8, 0x20, 0x3, 0x6}, &(0x7f0000000480)=0x18) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000005c0)={r4, 0x7}, 0x8) vmsplice(r2, &(0x7f0000000000), 0x0, 0xf) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000600)={r4, @in={{0x2, 0x4e23, @multicast2}}}, &(0x7f00000006c0)=0x84) getsockopt$TIPC_SOCK_RECVQ_DEPTH(r2, 0x10f, 0x84, &(0x7f0000000100), &(0x7f0000000180)=0x4) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f0000000200)=""/195) add_key$keyring(&(0x7f0000000300)='keyring\x00', &(0x7f0000000400)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400000, 0x0) [ 422.760956] FAULT_INJECTION: forcing a failure. [ 422.760956] name failslab, interval 1, probability 0, space 0, times 0 [ 422.761360] 9pnet: Insufficient options for proto=fd [ 422.800008] CPU: 1 PID: 16214 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 422.807402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 422.816772] Call Trace: [ 422.819398] dump_stack+0x1d3/0x2c6 [ 422.823053] ? dump_stack_print_info.cold.1+0x20/0x20 [ 422.828292] should_fail.cold.4+0xa/0x17 [ 422.832407] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 422.837576] ? save_stack+0x43/0xd0 [ 422.841238] ? kasan_kmalloc+0xc7/0xe0 [ 422.845133] ? kasan_slab_alloc+0x12/0x20 [ 422.849318] ? kmem_cache_alloc+0x12e/0x730 [ 422.853648] ? __d_alloc+0xc8/0xb90 [ 422.857298] ? graph_lock+0x270/0x270 [ 422.861136] ? lookup_slow+0x57/0x80 [ 422.864863] ? lookup_one_len_unlocked+0xf1/0x100 [ 422.869721] ? ovl_lookup_index+0x1c9/0x700 [ 422.874050] ? ovl_lookup+0x9f2/0x29c0 [ 422.877946] ? __lookup_hash+0x12e/0x190 [ 422.882049] ? do_renameat2+0x6c1/0x1180 [ 422.886132] ? find_held_lock+0x36/0x1c0 [ 422.890212] ? __lock_is_held+0xb5/0x140 [ 422.894296] ? ___might_sleep+0x1ed/0x300 [ 422.898467] ? arch_local_save_flags+0x40/0x40 [ 422.903071] ? __lock_is_held+0xb5/0x140 10:23:19 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'e\nid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:23:19 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'eoid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 422.903917] 9pnet: Insufficient options for proto=fd [ 422.907158] __should_failslab+0x124/0x180 [ 422.907177] should_failslab+0x9/0x14 [ 422.907190] __kmalloc+0x2e0/0x770 [ 422.907204] ? kmem_cache_alloc+0x33a/0x730 [ 422.907220] ? check_preemption_disabled+0x48/0x280 [ 422.907240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 422.907253] ? __d_alloc+0x790/0xb90 [ 422.907274] __d_alloc+0x790/0xb90 [ 422.907294] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 422.907308] ? __lock_acquire+0x62f/0x4c20 [ 422.907327] ? debug_smp_processor_id+0x1c/0x20 [ 422.938824] ? perf_trace_lock_acquire+0x15b/0x800 [ 422.938840] ? print_usage_bug+0xc0/0xc0 [ 422.938859] ? print_usage_bug+0xc0/0xc0 [ 422.938876] ? mark_held_locks+0x130/0x130 [ 422.938891] ? debug_smp_processor_id+0x1c/0x20 [ 422.938910] ? perf_trace_lock_acquire+0x15b/0x800 [ 422.986927] ? graph_lock+0x270/0x270 [ 422.990785] d_alloc+0x96/0x380 [ 422.994075] ? __d_alloc+0xb90/0xb90 [ 422.994093] ? debug_smp_processor_id+0x1c/0x20 [ 422.994110] ? perf_trace_lock_acquire+0x15b/0x800 [ 422.994133] d_alloc_parallel+0x15a/0x1f40 10:23:19 executing program 5: mknod(&(0x7f0000001a80)='./bus\x00', 0x1007, 0x0) [ 422.994150] ? mark_held_locks+0x130/0x130 [ 422.994169] ? graph_lock+0x270/0x270 [ 422.994192] ? __d_lookup_rcu+0xaa0/0xaa0 [ 422.994209] ? check_preemption_disabled+0x48/0x280 [ 422.994226] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 422.994245] ? check_preemption_disabled+0x48/0x280 [ 423.039588] ? debug_smp_processor_id+0x1c/0x20 [ 423.044269] ? perf_trace_lock_acquire+0x15b/0x800 [ 423.049235] ? perf_trace_lock+0x7a0/0x7a0 [ 423.053528] ? check_preemption_disabled+0x48/0x280 [ 423.058562] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 423.063505] ? kasan_check_read+0x11/0x20 [ 423.067667] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 423.072962] ? graph_lock+0x270/0x270 [ 423.076809] ? __lockdep_init_map+0x105/0x590 [ 423.081323] ? __lockdep_init_map+0x105/0x590 [ 423.085839] ? lockdep_init_map+0x9/0x10 [ 423.089914] ? __init_waitqueue_head+0x9e/0x150 [ 423.094601] ? init_wait_entry+0x1c0/0x1c0 [ 423.098859] ? lock_acquire+0x1ed/0x520 [ 423.102868] __lookup_slow+0x1e6/0x540 [ 423.106775] ? vfs_unlink+0x510/0x510 [ 423.110629] ? inode_permission+0xb2/0x560 [ 423.114924] lookup_slow+0x57/0x80 [ 423.118487] lookup_one_len_unlocked+0xf1/0x100 [ 423.123171] ? lookup_slow+0x80/0x80 [ 423.126909] ovl_lookup_index+0x1c9/0x700 [ 423.131075] ? ovl_get_index_fh+0x2d0/0x2d0 [ 423.135423] ? ovl_path_real+0x400/0x400 [ 423.139503] ? rcu_read_lock_sched_held+0x108/0x120 [ 423.144530] ? ovl_lookup+0x1178/0x29c0 [ 423.148523] ovl_lookup+0x9f2/0x29c0 [ 423.152280] ? ovl_path_next+0x2e0/0x2e0 [ 423.153928] 9pnet: Insufficient options for proto=fd 10:23:19 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:19 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 423.156381] ? do_raw_spin_unlock+0xa7/0x330 [ 423.156398] ? do_raw_spin_trylock+0x270/0x270 [ 423.156444] ? _raw_spin_unlock+0x2c/0x50 [ 423.156460] ? d_alloc+0x290/0x380 [ 423.156477] ? __d_alloc+0xb90/0xb90 [ 423.156500] ? lock_rename+0xdb/0x290 [ 423.185781] __lookup_hash+0x12e/0x190 [ 423.189682] do_renameat2+0x6c1/0x1180 [ 423.189716] ? user_path_create+0x40/0x40 [ 423.189750] ? __lock_is_held+0xb5/0x140 [ 423.189787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 423.189807] ? check_preemption_disabled+0x48/0x280 [ 423.197827] ? __sb_end_write+0xd9/0x110 [ 423.197845] ? fput+0x130/0x1a0 [ 423.197861] ? do_syscall_64+0x9a/0x820 [ 423.197876] ? do_syscall_64+0x9a/0x820 [ 423.197905] ? lockdep_hardirqs_on+0x421/0x5c0 [ 423.197921] ? trace_hardirqs_on+0xbd/0x310 [ 423.197947] ? __ia32_sys_read+0xb0/0xb0 [ 423.197962] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 423.197992] __x64_sys_renameat+0x9a/0x100 [ 423.219905] do_syscall_64+0x1b9/0x820 [ 423.219921] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe 10:23:19 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'epid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 423.219939] ? syscall_return_slowpath+0x5e0/0x5e0 [ 423.219954] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 423.219980] ? trace_hardirqs_on_caller+0x310/0x310 [ 423.219997] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 423.220014] ? prepare_exit_to_usermode+0x291/0x3b0 [ 423.240871] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 423.240896] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 423.240908] RIP: 0033:0x457669 [ 423.240923] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 423.240932] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 423.240946] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 423.240955] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 423.240964] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 423.240982] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 423.240991] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:20 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'e%id<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:23:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 423.286936] overlayfs: failed inode index lookup (ino=65395, key=00fb210001a42b68380f1d40a78ac30398be2791fb9b17c1bc73ff000000000000, err=-12); [ 423.286936] overlayfs: mount with '-o index=off' to disable inodes index. [ 423.384051] 9pnet: Insufficient options for proto=fd 10:23:20 executing program 1 (fault-call:9 fault-nth:24): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) accept$alg(r0, 0x0, 0x0) 10:23:20 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'ecid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 423.534300] 9pnet: Insufficient options for proto=fd [ 423.616137] FAULT_INJECTION: forcing a failure. [ 423.616137] name failslab, interval 1, probability 0, space 0, times 0 [ 423.654091] CPU: 1 PID: 16268 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 423.661496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 423.663237] 9pnet: Insufficient options for proto=fd [ 423.670868] Call Trace: [ 423.670894] dump_stack+0x1d3/0x2c6 [ 423.670917] ? dump_stack_print_info.cold.1+0x20/0x20 [ 423.670948] should_fail.cold.4+0xa/0x17 [ 423.670994] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 423.671062] ? save_stack+0x43/0xd0 [ 423.671098] ? kasan_kmalloc+0xc7/0xe0 [ 423.671128] ? kasan_slab_alloc+0x12/0x20 [ 423.671141] ? kmem_cache_alloc+0x12e/0x730 [ 423.671156] ? __d_alloc+0xc8/0xb90 [ 423.671196] ? graph_lock+0x270/0x270 [ 423.720213] ? lookup_slow+0x57/0x80 [ 423.723938] ? lookup_one_len_unlocked+0xf1/0x100 [ 423.728797] ? ovl_lookup_index+0x1c9/0x700 [ 423.733126] ? ovl_lookup+0x9f2/0x29c0 [ 423.737017] ? __lookup_hash+0x12e/0x190 [ 423.741083] ? do_renameat2+0x6c1/0x1180 [ 423.745157] ? find_held_lock+0x36/0x1c0 [ 423.749233] ? __lock_is_held+0xb5/0x140 [ 423.753307] ? cp_old_stat+0x628/0xa40 [ 423.757217] ? ___might_sleep+0x1ed/0x300 [ 423.761377] ? arch_local_save_flags+0x40/0x40 [ 423.765980] ? __lock_is_held+0xb5/0x140 [ 423.770057] __should_failslab+0x124/0x180 [ 423.774304] should_failslab+0x9/0x14 [ 423.778113] __kmalloc+0x2e0/0x770 [ 423.781662] ? kmem_cache_alloc+0x33a/0x730 [ 423.785999] ? check_preemption_disabled+0x48/0x280 [ 423.791045] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 423.796590] ? __d_alloc+0x790/0xb90 [ 423.800318] __d_alloc+0x790/0xb90 [ 423.803897] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 423.808919] ? __lock_acquire+0x62f/0x4c20 [ 423.813184] ? debug_smp_processor_id+0x1c/0x20 [ 423.817884] ? perf_trace_lock_acquire+0x15b/0x800 [ 423.822834] ? print_usage_bug+0xc0/0xc0 [ 423.826922] ? print_usage_bug+0xc0/0xc0 [ 423.830995] ? mark_held_locks+0x130/0x130 [ 423.835238] ? debug_smp_processor_id+0x1c/0x20 [ 423.839930] ? perf_trace_lock_acquire+0x15b/0x800 [ 423.844879] ? graph_lock+0x270/0x270 [ 423.848696] d_alloc+0x96/0x380 [ 423.852019] ? __d_alloc+0xb90/0xb90 [ 423.855741] ? debug_smp_processor_id+0x1c/0x20 [ 423.860465] ? perf_trace_lock_acquire+0x15b/0x800 [ 423.865427] d_alloc_parallel+0x15a/0x1f40 [ 423.869666] ? mark_held_locks+0x130/0x130 [ 423.873906] ? graph_lock+0x270/0x270 [ 423.877719] ? __d_lookup_rcu+0xaa0/0xaa0 [ 423.881869] ? check_preemption_disabled+0x48/0x280 [ 423.886889] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 423.892456] ? check_preemption_disabled+0x48/0x280 [ 423.897496] ? debug_smp_processor_id+0x1c/0x20 [ 423.902186] ? perf_trace_lock_acquire+0x15b/0x800 [ 423.907132] ? perf_trace_lock+0x7a0/0x7a0 [ 423.911374] ? check_preemption_disabled+0x48/0x280 [ 423.916398] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 423.921327] ? kasan_check_read+0x11/0x20 [ 423.925499] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 423.930825] ? graph_lock+0x270/0x270 [ 423.934665] ? __lockdep_init_map+0x105/0x590 [ 423.939182] ? __lockdep_init_map+0x105/0x590 [ 423.943685] ? lockdep_init_map+0x9/0x10 [ 423.947775] ? __init_waitqueue_head+0x9e/0x150 [ 423.952445] ? init_wait_entry+0x1c0/0x1c0 [ 423.956720] ? lock_acquire+0x1ed/0x520 [ 423.960718] __lookup_slow+0x1e6/0x540 [ 423.964607] ? vfs_unlink+0x510/0x510 [ 423.968434] ? inode_permission+0xb2/0x560 [ 423.972692] lookup_slow+0x57/0x80 [ 423.976270] lookup_one_len_unlocked+0xf1/0x100 [ 423.980944] ? lookup_slow+0x80/0x80 [ 423.984707] ovl_lookup_index+0x1c9/0x700 [ 423.988882] ? ovl_get_index_fh+0x2d0/0x2d0 [ 423.993208] ? ovl_path_real+0x400/0x400 [ 423.997302] ? rcu_read_lock_sched_held+0x108/0x120 [ 424.002335] ? ovl_lookup+0x1178/0x29c0 [ 424.006318] ovl_lookup+0x9f2/0x29c0 [ 424.010059] ? ovl_path_next+0x2e0/0x2e0 [ 424.014135] ? do_raw_spin_unlock+0xa7/0x330 [ 424.018551] ? do_raw_spin_trylock+0x270/0x270 [ 424.023169] ? _raw_spin_unlock+0x2c/0x50 [ 424.027323] ? d_alloc+0x290/0x380 [ 424.030883] ? __d_alloc+0xb90/0xb90 [ 424.034598] ? lock_rename+0xdb/0x290 [ 424.038434] __lookup_hash+0x12e/0x190 [ 424.042331] do_renameat2+0x6c1/0x1180 [ 424.046243] ? user_path_create+0x40/0x40 [ 424.050416] ? __lock_is_held+0xb5/0x140 [ 424.054497] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.060056] ? check_preemption_disabled+0x48/0x280 [ 424.065095] ? __sb_end_write+0xd9/0x110 [ 424.069174] ? fput+0x130/0x1a0 [ 424.072460] ? do_syscall_64+0x9a/0x820 [ 424.076455] ? do_syscall_64+0x9a/0x820 [ 424.080444] ? lockdep_hardirqs_on+0x421/0x5c0 [ 424.085033] ? trace_hardirqs_on+0xbd/0x310 [ 424.089356] ? __ia32_sys_read+0xb0/0xb0 [ 424.093437] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 424.098904] __x64_sys_renameat+0x9a/0x100 [ 424.103149] do_syscall_64+0x1b9/0x820 [ 424.107043] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 424.112416] ? syscall_return_slowpath+0x5e0/0x5e0 [ 424.117354] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 424.122203] ? trace_hardirqs_on_caller+0x310/0x310 [ 424.127225] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 424.132255] ? prepare_exit_to_usermode+0x291/0x3b0 [ 424.137287] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 424.142190] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 424.147388] RIP: 0033:0x457669 [ 424.150585] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 424.169492] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 424.177219] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 424.184506] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 424.191792] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 424.199074] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 424.206388] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:20 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:20 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'eiid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:23:20 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) 10:23:20 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:21 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'eu%d<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 424.348097] 9pnet: Insufficient options for proto=fd 10:23:21 executing program 5: perf_event_open(&(0x7f0000000000)={0x2, 0x70, 0x800000000000012, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='net/if_inet6\x00') pread64(r0, 0x0, 0xffffffffffffff17, 0x7c0120) 10:23:21 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'eu\nd<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 424.477488] overlayfs: failed inode index lookup (ino=65444, key=00fb21000121045b0b763140ddb7b9c8712459fb00e4fc2b3da4ff000000000000, err=-12); [ 424.477488] overlayfs: mount with '-o index=off' to disable inodes index. [ 424.505857] 9pnet: Insufficient options for proto=fd 10:23:21 executing program 1 (fault-call:9 fault-nth:25): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:21 executing program 5: syz_mount_image$ntfs(&(0x7f0000000000)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 424.695492] ntfs: (device loop5): ntfs_fill_super(): Unable to determine device size. [ 424.717299] 9pnet: Insufficient options for proto=fd [ 424.735341] FAULT_INJECTION: forcing a failure. 10:23:21 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'eui\n<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 424.735341] name failslab, interval 1, probability 0, space 0, times 0 [ 424.785563] CPU: 1 PID: 16317 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 424.792991] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 424.802380] Call Trace: [ 424.805008] dump_stack+0x1d3/0x2c6 [ 424.808653] ? dump_stack_print_info.cold.1+0x20/0x20 [ 424.813876] should_fail.cold.4+0xa/0x17 [ 424.817954] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 424.823081] ? perf_trace_lock_acquire+0x15b/0x800 [ 424.828037] ? __kernel_text_address+0xd/0x40 [ 424.832563] ? graph_lock+0x270/0x270 [ 424.836385] ? find_held_lock+0x36/0x1c0 [ 424.840497] ? __lock_is_held+0xb5/0x140 [ 424.844580] ? ___might_sleep+0x1ed/0x300 [ 424.848735] ? arch_local_save_flags+0x40/0x40 [ 424.853345] ? ilookup5_nowait+0x84/0xc0 [ 424.857437] __should_failslab+0x124/0x180 [ 424.861682] should_failslab+0x9/0x14 [ 424.865495] kmem_cache_alloc+0x2be/0x730 [ 424.869652] ? find_inode.isra.19+0xc3/0x210 [ 424.874088] ? ovl_i_callback+0x30/0x30 [ 424.878079] ovl_alloc_inode+0x1b/0x190 [ 424.882058] alloc_inode+0x63/0x190 [ 424.885741] iget5_locked+0x124/0x1c0 [ 424.889549] ? ovl_inode_test+0x50/0x50 [ 424.893552] ? ovl_get_redirect_xattr.cold.17+0x47/0x47 [ 424.898928] ovl_get_inode+0x97f/0xd9b [ 424.902850] ovl_lookup+0xd4c/0x29c0 [ 424.906608] ? ovl_path_next+0x2e0/0x2e0 [ 424.910725] ? do_raw_spin_unlock+0xa7/0x330 [ 424.915145] ? do_raw_spin_trylock+0x270/0x270 [ 424.919757] ? _raw_spin_unlock+0x2c/0x50 [ 424.923915] ? d_alloc+0x290/0x380 [ 424.927487] __lookup_hash+0x12e/0x190 [ 424.931432] do_renameat2+0x6c1/0x1180 [ 424.935355] ? user_path_create+0x40/0x40 [ 424.939541] ? __lock_is_held+0xb5/0x140 [ 424.943617] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 424.949181] ? check_preemption_disabled+0x48/0x280 [ 424.954253] ? __sb_end_write+0xd9/0x110 [ 424.958345] ? fput+0x130/0x1a0 [ 424.961654] ? do_syscall_64+0x9a/0x820 [ 424.965643] ? do_syscall_64+0x9a/0x820 [ 424.969625] ? lockdep_hardirqs_on+0x421/0x5c0 [ 424.974227] ? trace_hardirqs_on+0xbd/0x310 [ 424.978590] ? __ia32_sys_read+0xb0/0xb0 [ 424.982666] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 424.988132] __x64_sys_renameat+0x9a/0x100 [ 424.992420] do_syscall_64+0x1b9/0x820 [ 424.996313] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 425.001688] ? syscall_return_slowpath+0x5e0/0x5e0 [ 425.006623] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 425.011475] ? trace_hardirqs_on_caller+0x310/0x310 [ 425.016517] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 425.021549] ? prepare_exit_to_usermode+0x291/0x3b0 [ 425.026581] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 425.031469] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.036674] RIP: 0033:0x457669 [ 425.039886] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 425.058795] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 425.066518] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 425.073798] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 425.081075] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 425.088375] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 425.095652] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:21 executing program 1 (fault-call:9 fault-nth:26): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:21 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) [ 425.179762] 9pnet: Insufficient options for proto=fd [ 425.186828] 9pnet: Insufficient options for proto=fd 10:23:21 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) ioctl$NBD_CLEAR_QUE(r1, 0xab05) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:21 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:21 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x3, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(0x0, 0xffff, 0x0) renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x4) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x321801, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, 0x0, 0x34, &(0x7f0000000440)={0x19, 0x0, 0x3f}) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f453bc5a8100000000000000000000000003e0000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000080000000000000005e36d60de98c1c9d07398e5000000000000008e519901d693e390c2849abe6b14901a84289395a7196030fff7de511ccc5ca7c28e06a93d17547dca88fcb8a976ea0a02af6313836d11f153dbdce844c037d1e369823e4f636d2df139a6c59c22a869e8bd3f509f64fece575ec56bc4c27ff2332b4bacd980500a913659920c86fb"], 0xd2) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e22, 0x2, @dev={0xfe, 0x80, [], 0x19}, 0x3}], 0x1c) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000300)={0x30, 0x5, 0x0, {0x0, 0x5, 0x0, 0x1f}}, 0x30) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 10:23:21 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'eui%<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 425.427194] 9pnet: Insufficient options for proto=fd [ 425.439412] FAULT_INJECTION: forcing a failure. [ 425.439412] name failslab, interval 1, probability 0, space 0, times 0 [ 425.451164] CPU: 1 PID: 16348 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 425.458544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 425.467903] Call Trace: [ 425.470518] dump_stack+0x1d3/0x2c6 [ 425.474192] ? dump_stack_print_info.cold.1+0x20/0x20 [ 425.479390] ? find_held_lock+0x36/0x1c0 [ 425.483470] should_fail.cold.4+0xa/0x17 [ 425.487564] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 425.492690] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 425.497628] ? kasan_check_read+0x11/0x20 [ 425.501813] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 425.507102] ? rcu_softirq_qs+0x20/0x20 [ 425.511102] ? rcu_softirq_qs+0x20/0x20 [ 425.515084] ? unwind_dump+0x190/0x190 [ 425.518996] ? graph_lock+0x270/0x270 [ 425.522828] ? is_bpf_text_address+0xd3/0x170 [ 425.527588] ? kernel_text_address+0x79/0xf0 [ 425.532013] ? __lock_is_held+0xb5/0x140 [ 425.536106] ? ___might_sleep+0x1ed/0x300 [ 425.540276] ? arch_local_save_flags+0x40/0x40 [ 425.544859] ? save_stack+0x43/0xd0 [ 425.548488] ? kasan_kmalloc+0xc7/0xe0 [ 425.552385] ? kasan_slab_alloc+0x12/0x20 [ 425.556533] ? kmem_cache_alloc+0x12e/0x730 [ 425.560863] ? ovl_alloc_inode+0x1b/0x190 [ 425.565061] __should_failslab+0x124/0x180 [ 425.569312] should_failslab+0x9/0x14 [ 425.573129] kmem_cache_alloc+0x2be/0x730 [ 425.577282] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 425.582331] ? map_id_range_down+0x1ee/0x430 [ 425.586756] new_inode_smack+0x20/0xb0 [ 425.590644] smack_inode_alloc_security+0x92/0x100 [ 425.595588] security_inode_alloc+0x73/0xd0 [ 425.599921] inode_init_always+0x68f/0xd80 [ 425.604158] ? get_nr_inodes+0x120/0x120 [ 425.608243] ? psi_task_change.cold.11+0x1ac/0x1ac [ 425.613189] ? rcu_read_lock_sched_held+0x108/0x120 [ 425.618235] ? kmem_cache_alloc+0x33a/0x730 [ 425.622579] ? find_inode.isra.19+0xc3/0x210 [ 425.626997] ? ovl_i_callback+0x30/0x30 [ 425.630984] alloc_inode+0x80/0x190 [ 425.634618] iget5_locked+0x124/0x1c0 [ 425.638415] ? ovl_inode_test+0x50/0x50 [ 425.642399] ? ovl_get_redirect_xattr.cold.17+0x47/0x47 [ 425.647793] ovl_get_inode+0x97f/0xd9b [ 425.651702] ovl_lookup+0xd4c/0x29c0 [ 425.655449] ? ovl_path_next+0x2e0/0x2e0 [ 425.659540] ? do_raw_spin_unlock+0xa7/0x330 [ 425.663991] ? do_raw_spin_trylock+0x270/0x270 [ 425.668593] ? _raw_spin_unlock+0x2c/0x50 [ 425.672760] ? d_alloc+0x290/0x380 [ 425.676318] __lookup_hash+0x12e/0x190 [ 425.680223] do_renameat2+0x6c1/0x1180 [ 425.684130] ? user_path_create+0x40/0x40 [ 425.688295] ? __lock_is_held+0xb5/0x140 [ 425.692390] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 425.697935] ? check_preemption_disabled+0x48/0x280 [ 425.702979] ? __sb_end_write+0xd9/0x110 [ 425.707052] ? fput+0x130/0x1a0 [ 425.710333] ? do_syscall_64+0x9a/0x820 [ 425.714359] ? do_syscall_64+0x9a/0x820 [ 425.718354] ? lockdep_hardirqs_on+0x421/0x5c0 [ 425.722937] ? trace_hardirqs_on+0xbd/0x310 [ 425.727261] ? __ia32_sys_read+0xb0/0xb0 [ 425.731321] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 425.736820] __x64_sys_renameat+0x9a/0x100 [ 425.741063] do_syscall_64+0x1b9/0x820 [ 425.744954] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 425.750327] ? syscall_return_slowpath+0x5e0/0x5e0 [ 425.755256] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 425.760114] ? trace_hardirqs_on_caller+0x310/0x310 [ 425.765134] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 425.770174] ? prepare_exit_to_usermode+0x291/0x3b0 [ 425.775203] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 425.780071] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 425.785279] RIP: 0033:0x457669 [ 425.788500] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 425.807412] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 425.815120] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 425.822431] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 425.829700] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 425.836980] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 425.844254] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:22 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid\t'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:23:22 executing program 1 (fault-call:9 fault-nth:27): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:22 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}, 0x38}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 425.968456] 9pnet: Insufficient options for proto=fd 10:23:22 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, 0x0, 0x0, 0x0) 10:23:22 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 426.133756] FAULT_INJECTION: forcing a failure. [ 426.133756] name failslab, interval 1, probability 0, space 0, times 0 [ 426.237850] CPU: 0 PID: 16368 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 426.245266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 426.254665] Call Trace: [ 426.257266] dump_stack+0x1d3/0x2c6 [ 426.260910] ? dump_stack_print_info.cold.1+0x20/0x20 [ 426.266132] ? find_held_lock+0x36/0x1c0 [ 426.270231] should_fail.cold.4+0xa/0x17 [ 426.274322] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 426.279612] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 426.284555] ? kasan_check_read+0x11/0x20 [ 426.288720] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 426.294478] ? rcu_softirq_qs+0x20/0x20 [ 426.298481] ? rcu_softirq_qs+0x20/0x20 [ 426.302467] ? unwind_dump+0x190/0x190 [ 426.306372] ? graph_lock+0x270/0x270 [ 426.310194] ? is_bpf_text_address+0xd3/0x170 [ 426.314706] ? kernel_text_address+0x79/0xf0 [ 426.319170] ? __lock_is_held+0xb5/0x140 [ 426.323254] ? ___might_sleep+0x1ed/0x300 [ 426.327421] ? arch_local_save_flags+0x40/0x40 [ 426.332025] ? save_stack+0x43/0xd0 [ 426.335664] ? kasan_kmalloc+0xc7/0xe0 [ 426.339567] ? kasan_slab_alloc+0x12/0x20 [ 426.343727] ? kmem_cache_alloc+0x12e/0x730 [ 426.348068] ? ovl_alloc_inode+0x1b/0x190 [ 426.352234] __should_failslab+0x124/0x180 [ 426.356489] should_failslab+0x9/0x14 [ 426.360303] kmem_cache_alloc+0x2be/0x730 [ 426.364467] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 426.369517] ? map_id_range_down+0x1ee/0x430 [ 426.373965] new_inode_smack+0x20/0xb0 [ 426.377887] smack_inode_alloc_security+0x92/0x100 [ 426.382844] security_inode_alloc+0x73/0xd0 10:23:23 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_mount_image$hfs(&(0x7f0000000100)='hfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001ac0)={[{@part={'part', 0x3d, 0xffffffff}}]}) [ 426.387213] inode_init_always+0x68f/0xd80 [ 426.391512] ? get_nr_inodes+0x120/0x120 [ 426.395587] ? psi_task_change.cold.11+0x1ac/0x1ac [ 426.400568] ? rcu_read_lock_sched_held+0x108/0x120 [ 426.405596] ? kmem_cache_alloc+0x33a/0x730 [ 426.409944] ? ovl_i_callback+0x30/0x30 [ 426.413954] alloc_inode+0x80/0x190 [ 426.417612] iget5_locked+0x124/0x1c0 [ 426.421425] ? ovl_inode_test+0x50/0x50 [ 426.425417] ? ovl_get_redirect_xattr.cold.17+0x47/0x47 [ 426.430800] ovl_get_inode+0x97f/0xd9b [ 426.434707] ovl_lookup+0xd4c/0x29c0 [ 426.438480] ? ovl_path_next+0x2e0/0x2e0 [ 426.442570] ? do_raw_spin_unlock+0xa7/0x330 [ 426.442589] ? do_raw_spin_trylock+0x270/0x270 [ 426.442622] ? _raw_spin_unlock+0x2c/0x50 [ 426.442638] ? d_alloc+0x290/0x380 [ 426.442690] __lookup_hash+0x12e/0x190 [ 426.451704] do_renameat2+0x6c1/0x1180 [ 426.451743] ? user_path_create+0x40/0x40 [ 426.451766] ? __lock_is_held+0xb5/0x140 [ 426.451791] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 426.480999] ? check_preemption_disabled+0x48/0x280 10:23:23 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'%mackfshat', 0x3d, 'wfdno'}}]}}) [ 426.486049] ? __sb_end_write+0xd9/0x110 [ 426.490120] ? fput+0x130/0x1a0 [ 426.493403] ? do_syscall_64+0x9a/0x820 [ 426.494315] 9pnet: Insufficient options for proto=fd [ 426.497394] ? do_syscall_64+0x9a/0x820 [ 426.497411] ? lockdep_hardirqs_on+0x421/0x5c0 [ 426.497431] ? trace_hardirqs_on+0xbd/0x310 [ 426.515387] ? __ia32_sys_read+0xb0/0xb0 [ 426.519465] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 426.524940] __x64_sys_renameat+0x9a/0x100 [ 426.524964] do_syscall_64+0x1b9/0x820 [ 426.524999] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 426.533109] ? syscall_return_slowpath+0x5e0/0x5e0 [ 426.533126] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 426.533143] ? trace_hardirqs_on_caller+0x310/0x310 [ 426.533167] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 426.558303] ? prepare_exit_to_usermode+0x291/0x3b0 [ 426.563349] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 426.568223] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 426.573428] RIP: 0033:0x457669 [ 426.576637] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 426.595548] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 426.603268] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 426.610554] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 426.617852] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 426.625142] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 426.627829] 9pnet: Insufficient options for proto=fd 10:23:23 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'dmackfshat', 0x3d, 'wfdno'}}]}}) 10:23:23 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(r0, 0x3) [ 426.632422] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 [ 426.666750] hfs: part requires an argument [ 426.671639] hfs: unable to parse mount options 10:23:23 executing program 1 (fault-call:9 fault-nth:28): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 426.834338] 9pnet: Insufficient options for proto=fd 10:23:23 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'omackfshat', 0x3d, 'wfdno'}}]}}) [ 426.873053] 9pnet: Insufficient options for proto=fd 10:23:23 executing program 5: 10:23:23 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 427.006176] FAULT_INJECTION: forcing a failure. [ 427.006176] name failslab, interval 1, probability 0, space 0, times 0 10:23:23 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) [ 427.124481] CPU: 0 PID: 16410 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 427.131899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 427.141258] Call Trace: [ 427.141428] dump_stack+0x1d3/0x2c6 [ 427.141453] ? dump_stack_print_info.cold.1+0x20/0x20 [ 427.141491] should_fail.cold.4+0xa/0x17 [ 427.141517] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 427.162102] ? print_usage_bug+0xc0/0xc0 [ 427.166190] ? __vfs_getxattr+0xee/0x150 [ 427.170298] ? smk_fetch.part.24+0x7e/0x100 10:23:23 executing program 5: [ 427.174629] ? smack_d_instantiate+0x94e/0xea0 [ 427.179223] ? security_d_instantiate+0x5c/0xf0 [ 427.183919] ? do_renameat2+0x6c1/0x1180 [ 427.188003] ? __x64_sys_renameat+0x9a/0x100 [ 427.192416] ? do_syscall_64+0x1b9/0x820 [ 427.196500] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.201871] ? do_raw_spin_unlock+0xa7/0x330 [ 427.206289] ? graph_lock+0x270/0x270 [ 427.210109] ? find_held_lock+0x36/0x1c0 [ 427.214198] ? __lock_is_held+0xb5/0x140 [ 427.218286] ? ___might_sleep+0x1ed/0x300 [ 427.222460] ? arch_local_save_flags+0x40/0x40 [ 427.227055] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.227078] __should_failslab+0x124/0x180 [ 427.227095] should_failslab+0x9/0x14 [ 427.240717] __kmalloc+0x2e0/0x770 [ 427.240739] ? smk_parse_smack+0x1fb/0x310 [ 427.240760] smk_parse_smack+0x1fb/0x310 [ 427.240779] smk_import_entry+0x77/0x420 [ 427.256707] ? smk_netlbl_mls+0x260/0x260 [ 427.260879] ? do_raw_spin_trylock+0x270/0x270 [ 427.265493] ? kernel_text_address+0x79/0xf0 [ 427.269926] smk_fetch.part.24+0xed/0x100 [ 427.274091] smack_d_instantiate+0x94e/0xea0 [ 427.278544] ? smk_fetch.part.24+0x100/0x100 [ 427.282985] ? save_stack+0xa9/0xd0 [ 427.286625] ? save_stack+0x43/0xd0 [ 427.290284] ? __kasan_slab_free+0x102/0x150 [ 427.295189] security_d_instantiate+0x5c/0xf0 [ 427.299733] d_splice_alias+0x120/0x11d0 [ 427.303811] ? trace_hardirqs_off+0xb8/0x310 [ 427.308226] ? kasan_check_read+0x11/0x20 [ 427.312384] ? do_raw_spin_unlock+0xa7/0x330 [ 427.316805] ? d_instantiate_anon+0x30/0x30 [ 427.321130] ? lock_downgrade+0x900/0x900 10:23:23 executing program 5: [ 427.325295] ? graph_lock+0x270/0x270 [ 427.329154] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.334712] ? check_preemption_disabled+0x48/0x280 [ 427.339789] ? __lock_is_held+0xb5/0x140 [ 427.343871] ? ovl_lookup+0xe67/0x29c0 [ 427.343890] ? rcu_read_lock_sched_held+0x108/0x120 [ 427.343909] ovl_lookup+0xe77/0x29c0 [ 427.352837] ? ovl_path_next+0x2e0/0x2e0 [ 427.352864] ? do_raw_spin_unlock+0xa7/0x330 [ 427.352880] ? do_raw_spin_trylock+0x270/0x270 [ 427.352940] ? _raw_spin_unlock+0x2c/0x50 [ 427.352954] ? d_alloc+0x290/0x380 [ 427.352999] __lookup_hash+0x12e/0x190 [ 427.381358] do_renameat2+0x6c1/0x1180 [ 427.385307] ? user_path_create+0x40/0x40 [ 427.389952] ? __lock_is_held+0xb5/0x140 [ 427.394051] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 427.399611] ? check_preemption_disabled+0x48/0x280 [ 427.404652] ? __sb_end_write+0xd9/0x110 [ 427.408735] ? fput+0x130/0x1a0 [ 427.412047] ? do_syscall_64+0x9a/0x820 [ 427.416043] ? do_syscall_64+0x9a/0x820 [ 427.420057] ? lockdep_hardirqs_on+0x421/0x5c0 10:23:24 executing program 5: [ 427.424659] ? trace_hardirqs_on+0xbd/0x310 [ 427.429183] ? __ia32_sys_read+0xb0/0xb0 [ 427.433264] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 427.438746] __x64_sys_renameat+0x9a/0x100 [ 427.443024] do_syscall_64+0x1b9/0x820 [ 427.446932] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 427.452334] ? syscall_return_slowpath+0x5e0/0x5e0 [ 427.457289] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 427.462156] ? trace_hardirqs_on_caller+0x310/0x310 [ 427.467200] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 427.472233] ? prepare_exit_to_usermode+0x291/0x3b0 [ 427.477280] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 427.482155] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 427.487368] RIP: 0033:0x457669 [ 427.490594] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 427.509522] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 427.517252] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 10:23:24 executing program 5: [ 427.524543] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 427.531833] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 427.539123] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 427.546412] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:24 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'umackfshat', 0x3d, 'wfdno'}}]}}) 10:23:24 executing program 1 (fault-call:9 fault-nth:29): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:24 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) setsockopt$inet6_MCAST_LEAVE_GROUP(r1, 0x29, 0x2d, &(0x7f0000000180)={0x5, {{0xa, 0x4e21, 0xff, @empty, 0x80000001}}}, 0x88) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:24 executing program 5: [ 427.865886] 9pnet: Insufficient options for proto=fd 10:23:24 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'xmackfshat', 0x3d, 'wfdno'}}]}}) 10:23:24 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:24 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'\nmackfshat', 0x3d, 'wfdno'}}]}}) [ 427.963476] FAULT_INJECTION: forcing a failure. [ 427.963476] name failslab, interval 1, probability 0, space 0, times 0 [ 428.002046] 9pnet: Insufficient options for proto=fd [ 428.019082] CPU: 0 PID: 16454 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 428.026492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.035862] Call Trace: [ 428.038507] dump_stack+0x1d3/0x2c6 [ 428.042184] ? dump_stack_print_info.cold.1+0x20/0x20 [ 428.047423] should_fail.cold.4+0xa/0x17 [ 428.051517] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 428.056649] ? find_held_lock+0x36/0x1c0 [ 428.060728] ? smk_access+0x53b/0x700 [ 428.064549] ? graph_lock+0x270/0x270 [ 428.068377] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.073933] ? smack_log+0x423/0x590 [ 428.073959] ? find_held_lock+0x36/0x1c0 [ 428.074008] ? __lock_is_held+0xb5/0x140 [ 428.074039] ? ___might_sleep+0x1ed/0x300 [ 428.090041] ? arch_local_save_flags+0x40/0x40 [ 428.094648] ? unwind_get_return_address+0x61/0xa0 [ 428.099622] __should_failslab+0x124/0x180 [ 428.103886] should_failslab+0x9/0x14 [ 428.107722] __kmalloc_track_caller+0x2d1/0x760 [ 428.112420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.118008] ? cap_inode_getsecurity+0x50e/0x820 [ 428.122792] ? smack_inode_getsecurity+0x227/0x360 [ 428.127757] kstrdup+0x39/0x70 [ 428.128276] 9pnet: Insufficient options for proto=fd [ 428.130994] smack_inode_getsecurity+0x227/0x360 [ 428.131020] security_inode_getsecurity+0xe1/0x130 [ 428.131044] vfs_getxattr+0x1db/0x390 [ 428.149648] ? xattr_permission+0x310/0x310 [ 428.154008] ? ovl_dentry_real+0x210/0x210 [ 428.154038] ovl_xattr_get+0x76/0xb0 [ 428.154058] ovl_other_xattr_get+0x35/0x40 [ 428.162024] ? ovl_other_xattr_set+0x50/0x50 [ 428.170664] __vfs_getxattr+0xee/0x150 [ 428.174583] ? __vfs_setxattr+0x180/0x180 [ 428.178772] ? do_raw_spin_trylock+0x270/0x270 [ 428.183398] ? kernel_text_address+0x79/0xf0 [ 428.187853] smk_fetch.part.24+0x7e/0x100 [ 428.192037] smack_d_instantiate+0x94e/0xea0 [ 428.196485] ? smk_fetch.part.24+0x100/0x100 [ 428.200918] ? save_stack+0xa9/0xd0 [ 428.204570] ? save_stack+0x43/0xd0 [ 428.208238] ? __kasan_slab_free+0x102/0x150 [ 428.212680] security_d_instantiate+0x5c/0xf0 [ 428.217202] d_splice_alias+0x120/0x11d0 [ 428.221284] ? trace_hardirqs_off+0xb8/0x310 [ 428.225720] ? kasan_check_read+0x11/0x20 [ 428.229892] ? do_raw_spin_unlock+0xa7/0x330 [ 428.234433] ? d_instantiate_anon+0x30/0x30 [ 428.238775] ? lock_downgrade+0x900/0x900 [ 428.242951] ? graph_lock+0x270/0x270 [ 428.246814] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.252380] ? check_preemption_disabled+0x48/0x280 [ 428.257434] ? __lock_is_held+0xb5/0x140 [ 428.261528] ? ovl_lookup+0xe67/0x29c0 [ 428.265441] ? rcu_read_lock_sched_held+0x108/0x120 [ 428.270494] ovl_lookup+0xe77/0x29c0 [ 428.274263] ? ovl_path_next+0x2e0/0x2e0 [ 428.278404] ? do_raw_spin_unlock+0xa7/0x330 [ 428.282835] ? do_raw_spin_trylock+0x270/0x270 [ 428.287453] ? _raw_spin_unlock+0x2c/0x50 [ 428.291626] ? d_alloc+0x290/0x380 [ 428.295213] __lookup_hash+0x12e/0x190 [ 428.299130] do_renameat2+0x6c1/0x1180 [ 428.303065] ? user_path_create+0x40/0x40 [ 428.307243] ? __lock_is_held+0xb5/0x140 [ 428.311344] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.316909] ? check_preemption_disabled+0x48/0x280 [ 428.321958] ? __sb_end_write+0xd9/0x110 [ 428.326072] ? fput+0x130/0x1a0 [ 428.329379] ? do_syscall_64+0x9a/0x820 [ 428.333378] ? do_syscall_64+0x9a/0x820 [ 428.337373] ? lockdep_hardirqs_on+0x421/0x5c0 [ 428.342003] ? trace_hardirqs_on+0xbd/0x310 [ 428.346348] ? __ia32_sys_read+0xb0/0xb0 [ 428.350439] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 428.355920] __x64_sys_renameat+0x9a/0x100 [ 428.360181] do_syscall_64+0x1b9/0x820 [ 428.364094] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 428.369480] ? syscall_return_slowpath+0x5e0/0x5e0 [ 428.374433] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.379299] ? trace_hardirqs_on_caller+0x310/0x310 [ 428.384340] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 428.389386] ? prepare_exit_to_usermode+0x291/0x3b0 [ 428.394432] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 428.399319] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 428.404526] RIP: 0033:0x457669 [ 428.407742] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 428.426661] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 428.434383] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 428.441647] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 428.448912] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 428.456182] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 428.463468] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:25 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'sma%kfshat', 0x3d, 'wfdno'}}]}}) 10:23:25 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 10:23:25 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) socket$inet6_sctp(0xa, 0x0, 0x84) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) add_key(&(0x7f0000000040)='dns_resolver\x00', 0x0, &(0x7f0000000100)="f1adeb1af858baacf3badb1d79cae63160297c5622f1bd4355db6251ba98a1e2907b45d18f94a48704000000222a0027dec36a9f5f10be85cdfbb42864d37ef802ac13632e6787578d000000d38f350b8b23000000000000000000", 0x5b, 0xfffffffffffffffb) 10:23:25 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x200}, 0x0, &(0x7f0000000140)={0x1b7, 0xfffffffffffff801, 0x0, 0x0, 0x800000000000}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:25 executing program 1 (fault-call:9 fault-nth:30): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 428.595685] 9pnet: Insufficient options for proto=fd 10:23:25 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'sma\nkfshat', 0x3d, 'wfdno'}}]}}) [ 428.620569] 9pnet: Insufficient options for proto=fd [ 428.637326] Option ' ' to dns_resolver key: bad/missing value 10:23:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$video(&(0x7f0000000280)='/dev/video#\x00', 0x3, 0x0) ioctl$VIDIOC_S_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000040)={0x0, 0x1, 0x0, [], &(0x7f0000000000)={0x980913, 0x0, [], @p_u8=0x0}}) [ 428.709577] Option ' ' to dns_resolver key: bad/missing value [ 428.740146] FAULT_INJECTION: forcing a failure. [ 428.740146] name failslab, interval 1, probability 0, space 0, times 0 [ 428.792205] 9pnet: Insufficient options for proto=fd [ 428.803133] CPU: 1 PID: 16502 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 428.810539] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 428.819925] Call Trace: [ 428.822564] dump_stack+0x1d3/0x2c6 [ 428.826228] ? dump_stack_print_info.cold.1+0x20/0x20 [ 428.831466] should_fail.cold.4+0xa/0x17 [ 428.835565] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 428.840710] ? graph_lock+0x270/0x270 [ 428.844538] ? save_stack+0x43/0xd0 [ 428.848189] ? __kasan_slab_free+0x102/0x150 [ 428.852637] ? kasan_slab_free+0xe/0x10 [ 428.856643] ? find_held_lock+0x36/0x1c0 [ 428.860740] ? __lock_is_held+0xb5/0x140 [ 428.864844] ? ___might_sleep+0x1ed/0x300 [ 428.869028] ? arch_local_save_flags+0x40/0x40 [ 428.873632] ? kfree+0x107/0x230 [ 428.877049] ? lockdep_hardirqs_on+0x421/0x5c0 [ 428.881679] __should_failslab+0x124/0x180 [ 428.885936] should_failslab+0x9/0x14 [ 428.889779] kmem_cache_alloc_trace+0x2d7/0x750 [ 428.894470] ? __kasan_slab_free+0x119/0x150 [ 428.898914] ? smk_fetch.part.24+0xb3/0x100 [ 428.903263] smk_fetch.part.24+0x5a/0x100 [ 428.907439] smack_d_instantiate+0xa46/0xea0 [ 428.911890] ? smk_fetch.part.24+0x100/0x100 [ 428.916325] ? save_stack+0xa9/0xd0 [ 428.919995] ? save_stack+0x43/0xd0 [ 428.923659] ? __kasan_slab_free+0x102/0x150 [ 428.928101] security_d_instantiate+0x5c/0xf0 [ 428.932629] d_splice_alias+0x120/0x11d0 [ 428.936713] ? trace_hardirqs_off+0xb8/0x310 [ 428.941143] ? kasan_check_read+0x11/0x20 [ 428.945375] ? do_raw_spin_unlock+0xa7/0x330 [ 428.949812] ? d_instantiate_anon+0x30/0x30 [ 428.954158] ? lock_downgrade+0x900/0x900 [ 428.958337] ? graph_lock+0x270/0x270 [ 428.962173] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 428.967741] ? check_preemption_disabled+0x48/0x280 [ 428.972796] ? __lock_is_held+0xb5/0x140 [ 428.976892] ? ovl_lookup+0xe67/0x29c0 [ 428.980805] ? rcu_read_lock_sched_held+0x108/0x120 [ 428.985851] ovl_lookup+0xe77/0x29c0 [ 428.989611] ? ovl_path_next+0x2e0/0x2e0 [ 428.993705] ? do_raw_spin_unlock+0xa7/0x330 [ 428.998139] ? do_raw_spin_trylock+0x270/0x270 [ 429.002761] ? _raw_spin_unlock+0x2c/0x50 [ 429.006932] ? d_alloc+0x290/0x380 [ 429.010541] __lookup_hash+0x12e/0x190 [ 429.014462] do_renameat2+0x6c1/0x1180 [ 429.018404] ? user_path_create+0x40/0x40 [ 429.022583] ? __lock_is_held+0xb5/0x140 [ 429.026685] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 429.032243] ? check_preemption_disabled+0x48/0x280 [ 429.037297] ? __sb_end_write+0xd9/0x110 [ 429.041386] ? fput+0x130/0x1a0 [ 429.044686] ? do_syscall_64+0x9a/0x820 [ 429.048684] ? do_syscall_64+0x9a/0x820 [ 429.052800] ? lockdep_hardirqs_on+0x421/0x5c0 [ 429.057409] ? trace_hardirqs_on+0xbd/0x310 [ 429.061749] ? __ia32_sys_read+0xb0/0xb0 [ 429.065837] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 429.071319] __x64_sys_renameat+0x9a/0x100 [ 429.075587] do_syscall_64+0x1b9/0x820 [ 429.079508] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 429.084904] ? syscall_return_slowpath+0x5e0/0x5e0 10:23:25 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smack/shat', 0x3d, 'wfdno'}}]}}) [ 429.089855] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 429.094726] ? trace_hardirqs_on_caller+0x310/0x310 [ 429.099770] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 429.104920] ? prepare_exit_to_usermode+0x291/0x3b0 [ 429.109966] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 429.114870] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 429.120081] RIP: 0033:0x457669 [ 429.123295] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 10:23:25 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0x3, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$usbmon(0x0, 0xffff, 0x0) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x321801, 0x0) r3 = getpid() rt_tgsigqueueinfo(r3, 0x0, 0x34, &(0x7f0000000440)={0x19, 0x4, 0x3f}) write$binfmt_elf32(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="7f453bc5a8100000000000000000000000003e0000000000000000003800000000000000000000000000200000000000000000000000000000000000000000000000000000000000080000000000000005e36d60de98c1c9d07398e5000000000000008e519901d693e390c2849abe6b14901a84289395a7196030fff7de511ccc5ca7c28e06a93d17547dca88fcb8a976ea0a02af6313836d11f153dbdce844c037d1e369823e4f636d2df139a6c59c22a869e8bd3f509f64fece575ec56bc4c27ff2332b4bacd980500a913659920c86fb44a56bf19040878c6032ceccdc6203ee0d36ee73aefe79e667410b3fcd4f"], 0xf0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX(r1, 0x84, 0x6e, &(0x7f0000000240)=[@in6={0xa, 0x4e22, 0x2, @dev={0xfe, 0x80, [], 0x19}, 0x3}], 0x1c) ioctl$LOOP_CHANGE_FD(r2, 0x4c06, r1) write$FUSE_NOTIFY_RETRIEVE(r2, &(0x7f0000000300)={0x30, 0x5, 0x0, {0x0, 0x5, 0x2264, 0x1f}}, 0x30) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 10:23:25 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 429.142210] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 429.149939] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 429.157244] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 429.164530] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 429.164541] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 429.164551] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:25 executing program 1 (fault-call:9 fault-nth:31): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:26 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 10:23:26 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:26 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(r1, 0xc008551c, &(0x7f0000000100)={0x3ff, 0xc, [0x9, 0x7ff, 0x2]}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:26 executing program 5: perf_event_open(&(0x7f0000000500)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r0, 0x1, 0xf, &(0x7f0000d1c000)=0x6, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20}, 0x1c) [ 429.926185] FAULT_INJECTION: forcing a failure. [ 429.926185] name failslab, interval 1, probability 0, space 0, times 0 [ 429.991318] CPU: 1 PID: 16548 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 429.998710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.008083] Call Trace: [ 430.010817] dump_stack+0x1d3/0x2c6 [ 430.014478] ? dump_stack_print_info.cold.1+0x20/0x20 [ 430.019723] should_fail.cold.4+0xa/0x17 [ 430.023820] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 430.028967] ? graph_lock+0x270/0x270 [ 430.032818] ? save_stack+0x43/0xd0 [ 430.036472] ? __kasan_slab_free+0x102/0x150 [ 430.040910] ? kasan_slab_free+0xe/0x10 [ 430.044916] ? find_held_lock+0x36/0x1c0 [ 430.049030] ? __lock_is_held+0xb5/0x140 [ 430.053135] ? ___might_sleep+0x1ed/0x300 [ 430.057314] ? arch_local_save_flags+0x40/0x40 [ 430.061924] ? kfree+0x107/0x230 [ 430.065315] ? lockdep_hardirqs_on+0x421/0x5c0 [ 430.069932] __should_failslab+0x124/0x180 [ 430.074233] should_failslab+0x9/0x14 [ 430.078056] kmem_cache_alloc_trace+0x2d7/0x750 [ 430.082753] ? __kasan_slab_free+0x119/0x150 [ 430.087193] ? smk_fetch.part.24+0xb3/0x100 10:23:26 executing program 5: clone(0x4004300, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000100)) ptrace(0x10, r0) ptrace$getregset(0x4203, r0, 0x0, 0x0) [ 430.091543] smk_fetch.part.24+0x5a/0x100 [ 430.095721] smack_d_instantiate+0xa46/0xea0 [ 430.100169] ? smk_fetch.part.24+0x100/0x100 [ 430.104596] ? save_stack+0xa9/0xd0 [ 430.104614] ? save_stack+0x43/0xd0 [ 430.104629] ? __kasan_slab_free+0x102/0x150 [ 430.104655] security_d_instantiate+0x5c/0xf0 [ 430.104676] d_splice_alias+0x120/0x11d0 [ 430.104691] ? trace_hardirqs_off+0xb8/0x310 [ 430.104704] ? kasan_check_read+0x11/0x20 [ 430.104726] ? do_raw_spin_unlock+0xa7/0x330 [ 430.120931] ? d_instantiate_anon+0x30/0x30 [ 430.120945] ? lock_downgrade+0x900/0x900 [ 430.120967] ? graph_lock+0x270/0x270 [ 430.121015] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.121034] ? check_preemption_disabled+0x48/0x280 [ 430.121062] ? __lock_is_held+0xb5/0x140 [ 430.165028] ? ovl_lookup+0xe67/0x29c0 [ 430.168943] ? rcu_read_lock_sched_held+0x108/0x120 [ 430.174030] ovl_lookup+0xe77/0x29c0 [ 430.177798] ? ovl_path_next+0x2e0/0x2e0 [ 430.181902] ? do_raw_spin_unlock+0xa7/0x330 [ 430.186334] ? do_raw_spin_trylock+0x270/0x270 [ 430.190955] ? _raw_spin_unlock+0x2c/0x50 [ 430.195154] ? d_alloc+0x290/0x380 [ 430.198745] __lookup_hash+0x12e/0x190 [ 430.202668] do_renameat2+0x6c1/0x1180 [ 430.206600] ? user_path_create+0x40/0x40 [ 430.210779] ? __lock_is_held+0xb5/0x140 [ 430.214876] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 430.220441] ? check_preemption_disabled+0x48/0x280 [ 430.225499] ? __sb_end_write+0xd9/0x110 [ 430.229592] ? fput+0x130/0x1a0 [ 430.232895] ? do_syscall_64+0x9a/0x820 [ 430.236893] ? do_syscall_64+0x9a/0x820 [ 430.240890] ? lockdep_hardirqs_on+0x421/0x5c0 [ 430.245501] ? trace_hardirqs_on+0xbd/0x310 [ 430.249842] ? __ia32_sys_read+0xb0/0xb0 [ 430.253933] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 430.259436] __x64_sys_renameat+0x9a/0x100 [ 430.263702] do_syscall_64+0x1b9/0x820 [ 430.267618] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 430.273035] ? syscall_return_slowpath+0x5e0/0x5e0 [ 430.278014] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 430.282874] ? trace_hardirqs_on_caller+0x310/0x310 [ 430.287892] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 430.292911] ? prepare_exit_to_usermode+0x291/0x3b0 [ 430.297935] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 430.302782] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 430.307990] RIP: 0033:0x457669 [ 430.311184] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 430.330081] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 10:23:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:27 executing program 5: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 430.337791] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 430.345072] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 430.352338] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 430.359619] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 430.366905] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:27 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smack\nshat', 0x3d, 'wfdno'}}]}}) 10:23:27 executing program 1 (fault-call:9 fault-nth:32): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:27 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r1, 0x408c5333, &(0x7f0000000180)={0x7, 0x6, 0x7, 'queue1\x00', 0x830}) 10:23:27 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) [ 430.940601] FAULT_INJECTION: forcing a failure. [ 430.940601] name failslab, interval 1, probability 0, space 0, times 0 [ 430.952165] CPU: 0 PID: 16581 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 430.959552] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 430.968920] Call Trace: [ 430.971543] dump_stack+0x1d3/0x2c6 [ 430.975206] ? dump_stack_print_info.cold.1+0x20/0x20 [ 430.980462] should_fail.cold.4+0xa/0x17 [ 430.984557] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 430.989690] ? debug_smp_processor_id+0x1c/0x20 [ 430.989722] ? graph_lock+0x270/0x270 [ 430.989739] ? perf_trace_lock+0x7a0/0x7a0 [ 430.989765] ? find_held_lock+0x36/0x1c0 [ 430.998251] ? __lock_is_held+0xb5/0x140 [ 431.010660] ? ___might_sleep+0x1ed/0x300 [ 431.014830] ? arch_local_save_flags+0x40/0x40 [ 431.019448] __should_failslab+0x124/0x180 [ 431.023705] should_failslab+0x9/0x14 [ 431.027534] kmem_cache_alloc+0x2be/0x730 [ 431.031723] __d_alloc+0xc8/0xb90 [ 431.035201] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 431.040241] ? d_alloc_parallel+0x1f40/0x1f40 [ 431.044747] ? d_lookup+0x255/0x300 [ 431.048387] ? d_lookup+0x255/0x300 [ 431.052030] ? lockdep_hardirqs_on+0x421/0x5c0 [ 431.056633] ? lookup_dcache+0x22/0x140 [ 431.060652] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 431.066120] ? do_raw_spin_trylock+0x270/0x270 [ 431.070727] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 431.075761] d_alloc+0x96/0x380 [ 431.079056] ? __d_lookup+0x9e0/0x9e0 [ 431.082872] ? __d_alloc+0xb90/0xb90 [ 431.086613] __lookup_hash+0xd9/0x190 [ 431.090433] do_renameat2+0x76a/0x1180 [ 431.094358] ? user_path_create+0x40/0x40 [ 431.098524] ? __lock_is_held+0xb5/0x140 [ 431.102608] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 431.108167] ? check_preemption_disabled+0x48/0x280 [ 431.113206] ? __sb_end_write+0xd9/0x110 [ 431.117285] ? fput+0x130/0x1a0 [ 431.120585] ? do_syscall_64+0x9a/0x820 [ 431.124576] ? do_syscall_64+0x9a/0x820 [ 431.128563] ? lockdep_hardirqs_on+0x421/0x5c0 [ 431.133163] ? trace_hardirqs_on+0xbd/0x310 [ 431.137494] ? __ia32_sys_read+0xb0/0xb0 [ 431.141571] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 431.147049] __x64_sys_renameat+0x9a/0x100 [ 431.151301] do_syscall_64+0x1b9/0x820 [ 431.155206] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 431.160585] ? syscall_return_slowpath+0x5e0/0x5e0 [ 431.165528] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 431.170390] ? trace_hardirqs_on_caller+0x310/0x310 [ 431.175437] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 431.180495] ? prepare_exit_to_usermode+0x291/0x3b0 [ 431.185537] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 431.190405] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.195603] RIP: 0033:0x457669 [ 431.198811] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 431.217771] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 431.225504] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 431.232782] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 10:23:27 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 431.240108] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 431.247392] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 431.254672] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:27 executing program 5 (fault-call:7 fault-nth:0): mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 431.293250] device bridge_slave_1 left promiscuous mode [ 431.298959] bridge0: port 2(bridge_slave_1) entered disabled state 10:23:28 executing program 1 (fault-call:9 fault-nth:33): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 431.374928] device bridge_slave_0 left promiscuous mode [ 431.381780] bridge0: port 1(bridge_slave_0) entered disabled state [ 431.461298] IPVS: ftp: loaded support on port[0] = 21 [ 431.587446] team0 (unregistering): Port device team_slave_1 removed [ 431.600228] FAULT_INJECTION: forcing a failure. [ 431.600228] name failslab, interval 1, probability 0, space 0, times 0 [ 431.636439] CPU: 1 PID: 16599 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 431.643838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 431.653209] Call Trace: [ 431.655832] dump_stack+0x1d3/0x2c6 [ 431.659505] ? dump_stack_print_info.cold.1+0x20/0x20 [ 431.664743] should_fail.cold.4+0xa/0x17 [ 431.668837] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 431.674000] ? debug_smp_processor_id+0x1c/0x20 [ 431.678710] ? graph_lock+0x270/0x270 [ 431.682537] ? perf_trace_lock+0x7a0/0x7a0 [ 431.686808] ? find_held_lock+0x36/0x1c0 [ 431.690891] ? __lock_is_held+0xb5/0x140 [ 431.694999] ? ___might_sleep+0x1ed/0x300 [ 431.699163] ? arch_local_save_flags+0x40/0x40 [ 431.703752] __should_failslab+0x124/0x180 [ 431.708005] should_failslab+0x9/0x14 [ 431.711808] kmem_cache_alloc+0x2be/0x730 [ 431.716008] __d_alloc+0xc8/0xb90 [ 431.719507] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 431.724559] ? d_alloc_parallel+0x1f40/0x1f40 [ 431.729078] ? d_lookup+0x255/0x300 [ 431.732730] ? d_lookup+0x255/0x300 [ 431.736383] ? lockdep_hardirqs_on+0x421/0x5c0 [ 431.741016] ? lookup_dcache+0x22/0x140 [ 431.745034] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 431.750519] ? do_raw_spin_trylock+0x270/0x270 [ 431.755138] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 431.760186] d_alloc+0x96/0x380 [ 431.763498] ? __d_lookup+0x9e0/0x9e0 [ 431.767325] ? __d_alloc+0xb90/0xb90 [ 431.771080] __lookup_hash+0xd9/0x190 [ 431.774914] do_renameat2+0x76a/0x1180 [ 431.778847] ? user_path_create+0x40/0x40 [ 431.783052] ? __lock_is_held+0xb5/0x140 10:23:28 executing program 4: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r2, 0xffff) prctl$PR_SVE_SET_VL(0x32, 0x1bd5d) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 431.787147] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 431.792709] ? check_preemption_disabled+0x48/0x280 [ 431.797757] ? __sb_end_write+0xd9/0x110 [ 431.801846] ? fput+0x130/0x1a0 [ 431.805153] ? do_syscall_64+0x9a/0x820 [ 431.809155] ? do_syscall_64+0x9a/0x820 [ 431.813158] ? lockdep_hardirqs_on+0x421/0x5c0 [ 431.817760] ? trace_hardirqs_on+0xbd/0x310 [ 431.817776] ? __ia32_sys_read+0xb0/0xb0 [ 431.817795] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 431.817821] __x64_sys_renameat+0x9a/0x100 [ 431.817841] do_syscall_64+0x1b9/0x820 [ 431.826237] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 431.826257] ? syscall_return_slowpath+0x5e0/0x5e0 [ 431.826273] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 431.826291] ? trace_hardirqs_on_caller+0x310/0x310 [ 431.826310] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 431.826330] ? prepare_exit_to_usermode+0x291/0x3b0 [ 431.826354] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 431.826385] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 431.880411] RIP: 0033:0x457669 [ 431.883636] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 431.902584] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 431.910309] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 431.917587] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 431.924857] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 10:23:28 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 10:23:28 executing program 1 (fault-call:9 fault-nth:34): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 431.932132] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 431.939409] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 [ 431.948335] team0 (unregistering): Port device team_slave_0 removed [ 431.973427] bond0 (unregistering): Releasing backup interface bond_slave_1 10:23:28 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 432.025637] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 432.159756] FAULT_INJECTION: forcing a failure. [ 432.159756] name failslab, interval 1, probability 0, space 0, times 0 [ 432.194039] CPU: 1 PID: 16615 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 432.195863] FAULT_INJECTION: forcing a failure. [ 432.195863] name fail_futex, interval 1, probability 0, space 0, times 0 [ 432.201426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.201435] Call Trace: [ 432.201462] dump_stack+0x1d3/0x2c6 [ 432.201495] ? dump_stack_print_info.cold.1+0x20/0x20 [ 432.201539] should_fail.cold.4+0xa/0x17 [ 432.222270] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 432.222300] ? lock_downgrade+0x900/0x900 [ 432.222322] ? check_preemption_disabled+0x48/0x280 [ 432.233723] ? graph_lock+0x270/0x270 [ 432.233742] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 432.233758] ? kasan_check_read+0x11/0x20 [ 432.233775] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 432.233799] ? find_held_lock+0x36/0x1c0 [ 432.233823] ? __lock_is_held+0xb5/0x140 [ 432.233860] ? ___might_sleep+0x1ed/0x300 [ 432.247184] ? arch_local_save_flags+0x40/0x40 [ 432.270388] ? dput+0x15/0x20 [ 432.270407] ? ovl_lookup_single+0xd0/0x870 [ 432.270432] __should_failslab+0x124/0x180 [ 432.270453] should_failslab+0x9/0x14 [ 432.270467] __kmalloc+0x2e0/0x770 [ 432.270491] ? ovl_lookup_single+0x870/0x870 [ 432.270510] ? ovl_path_real+0x400/0x400 [ 432.306367] ? ovl_alloc_entry+0x24/0x70 [ 432.318897] ? rcu_read_lock_sched_held+0x108/0x120 [ 432.323937] ovl_alloc_entry+0x24/0x70 [ 432.327871] ovl_lookup+0xa24/0x29c0 [ 432.327910] ? ovl_path_next+0x2e0/0x2e0 [ 432.335697] ? do_raw_spin_unlock+0xa7/0x330 [ 432.340126] ? do_raw_spin_trylock+0x270/0x270 [ 432.344747] ? _raw_spin_unlock+0x2c/0x50 [ 432.348913] ? d_alloc+0x290/0x380 [ 432.348932] ? __d_alloc+0xb90/0xb90 [ 432.348963] __lookup_hash+0x12e/0x190 [ 432.349008] do_renameat2+0x76a/0x1180 [ 432.364084] ? user_path_create+0x40/0x40 [ 432.368260] ? __lock_is_held+0xb5/0x140 [ 432.372351] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.372371] ? check_preemption_disabled+0x48/0x280 [ 432.372396] ? __sb_end_write+0xd9/0x110 [ 432.372418] ? fput+0x130/0x1a0 [ 432.372436] ? do_syscall_64+0x9a/0x820 [ 432.372452] ? do_syscall_64+0x9a/0x820 [ 432.372467] ? lockdep_hardirqs_on+0x421/0x5c0 [ 432.372506] ? trace_hardirqs_on+0xbd/0x310 [ 432.394374] ? __ia32_sys_read+0xb0/0xb0 [ 432.394394] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 432.394418] __x64_sys_renameat+0x9a/0x100 [ 432.394439] do_syscall_64+0x1b9/0x820 [ 432.394458] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 432.394476] ? syscall_return_slowpath+0x5e0/0x5e0 [ 432.394499] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 432.394517] ? trace_hardirqs_on_caller+0x310/0x310 [ 432.394535] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 432.394555] ? prepare_exit_to_usermode+0x291/0x3b0 [ 432.394577] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 432.417064] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 432.417082] RIP: 0033:0x457669 [ 432.425211] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 432.425221] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 432.425237] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 432.425247] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 432.425257] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 432.425267] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 432.425277] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 [ 432.431336] CPU: 1 PID: 16594 Comm: syz-executor5 Not tainted 4.20.0-rc7+ #161 [ 432.440623] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 432.440629] Call Trace: [ 432.440649] dump_stack+0x1d3/0x2c6 [ 432.440670] ? dump_stack_print_info.cold.1+0x20/0x20 [ 432.440700] should_fail.cold.4+0xa/0x17 [ 432.440721] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 432.440745] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.450776] ? check_preemption_disabled+0x48/0x280 [ 432.450801] ? __lock_acquire+0x62f/0x4c20 [ 432.450816] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 432.450840] ? perf_trace_lock+0x7a0/0x7a0 [ 432.450865] ? print_usage_bug+0xc0/0xc0 [ 432.450887] ? __lock_acquire+0x62f/0x4c20 [ 432.460753] ? print_usage_bug+0xc0/0xc0 [ 432.460777] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.460795] ? check_preemption_disabled+0x48/0x280 [ 432.460819] get_futex_key+0x127d/0x21b0 [ 432.460835] ? free_one_page+0xcae/0x1700 [ 432.460863] ? futex_lock_pi_atomic+0x360/0x360 [ 432.469245] ? __lock_acquire+0x62f/0x4c20 [ 432.469264] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.469280] ? print_usage_bug+0xc0/0xc0 [ 432.469305] ? print_usage_bug+0xc0/0xc0 [ 432.532302] ? mark_held_locks+0x130/0x130 [ 432.532320] ? perf_trace_lock_acquire+0x15b/0x800 [ 432.532396] ? clockevents_program_event+0x158/0x370 [ 432.532422] ? __lock_acquire+0x62f/0x4c20 [ 432.532440] ? print_usage_bug+0xc0/0xc0 [ 432.532456] ? __lock_acquire+0x62f/0x4c20 [ 432.532489] ? mark_held_locks+0x130/0x130 [ 432.532510] ? check_noncircular+0x20/0x20 [ 432.532531] ? __lock_acquire+0x62f/0x4c20 [ 432.532550] ? graph_lock+0x270/0x270 [ 432.549274] ? graph_lock+0x270/0x270 [ 432.549296] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.549314] ? check_preemption_disabled+0x48/0x280 [ 432.549337] ? debug_smp_processor_id+0x1c/0x20 [ 432.549354] ? perf_trace_lock_acquire+0x15b/0x800 [ 432.549371] ? mark_held_locks+0x130/0x130 [ 432.549394] ? perf_trace_lock+0x7a0/0x7a0 [ 432.549416] ? graph_lock+0x270/0x270 [ 432.560839] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.560857] ? check_preemption_disabled+0x48/0x280 [ 432.560893] ? find_held_lock+0x36/0x1c0 [ 432.560909] ? print_usage_bug+0xc0/0xc0 [ 432.560929] ? print_usage_bug+0xc0/0xc0 [ 432.560944] ? is_bpf_text_address+0xac/0x170 [ 432.560959] ? print_usage_bug+0xc0/0xc0 10:23:29 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 432.560993] ? lock_downgrade+0x900/0x900 [ 432.561011] ? print_usage_bug+0xc0/0xc0 [ 432.561029] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 432.580745] ? kasan_check_read+0x11/0x20 [ 432.580763] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 432.580784] futex_wake+0x1ac/0x760 [ 432.580810] ? get_futex_key+0x21b0/0x21b0 [ 432.580828] ? __lock_acquire+0x62f/0x4c20 [ 432.580852] ? __lock_acquire+0x62f/0x4c20 [ 432.580879] do_futex+0x2e4/0x26d0 [ 432.580900] ? mark_held_locks+0x130/0x130 [ 432.580917] ? debug_smp_processor_id+0x1c/0x20 [ 432.580938] ? exit_robust_list+0x280/0x280 [ 432.598397] ? debug_smp_processor_id+0x1c/0x20 [ 432.598416] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.598436] ? check_preemption_disabled+0x48/0x280 [ 432.612280] ? perf_trace_lock_acquire+0x15b/0x800 [ 432.612298] ? graph_lock+0x270/0x270 [ 432.612316] ? graph_lock+0x270/0x270 [ 432.612344] ? find_held_lock+0x36/0x1c0 [ 432.612364] ? graph_lock+0x270/0x270 [ 432.612382] ? find_held_lock+0x36/0x1c0 [ 432.612406] ? find_held_lock+0x36/0x1c0 [ 432.612433] ? find_held_lock+0x36/0x1c0 [ 432.612467] ? __might_fault+0x12b/0x1e0 [ 432.625710] ? lock_downgrade+0x900/0x900 [ 432.625730] ? lock_release+0xa00/0xa00 [ 432.625744] ? arch_local_save_flags+0x40/0x40 [ 432.625787] mm_release+0x46a/0x5f0 [ 432.625806] ? mm_access+0x160/0x160 [ 432.625823] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 432.625848] ? _raw_spin_unlock_irq+0x60/0x80 [ 432.625865] ? acct_collect+0x70c/0x860 [ 432.625886] do_exit+0x570/0x26d0 [ 432.625902] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 432.625925] ? mm_update_next_owner+0x990/0x990 [ 432.625943] ? print_usage_bug+0xc0/0xc0 [ 432.640412] ? __lock_acquire+0x62f/0x4c20 [ 432.640431] ? debug_object_active_state+0x2f5/0x4d0 [ 432.640451] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 432.640469] ? _raw_spin_unlock_irqrestore+0x82/0xd0 [ 432.640503] ? __lock_acquire+0x62f/0x4c20 [ 432.640539] ? mark_held_locks+0x130/0x130 [ 432.640554] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 432.640575] ? debug_smp_processor_id+0x1c/0x20 [ 432.657861] ? perf_trace_lock_acquire+0x15b/0x800 [ 432.657880] ? check_preemption_disabled+0x48/0x280 [ 432.657905] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 432.657922] ? check_preemption_disabled+0x48/0x280 [ 432.657946] ? debug_smp_processor_id+0x1c/0x20 [ 432.657963] ? perf_trace_lock_acquire+0x15b/0x800 [ 432.657995] ? mnt_get_count+0x150/0x150 [ 432.658032] ? graph_lock+0x270/0x270 [ 432.658047] ? find_held_lock+0x36/0x1c0 [ 432.658071] ? memset+0x31/0x40 [ 432.684162] ? find_held_lock+0x36/0x1c0 [ 432.684190] ? get_signal+0x95b/0x1980 [ 432.684211] ? _raw_spin_unlock_irq+0x27/0x80 [ 432.684227] ? _raw_spin_unlock_irq+0x27/0x80 [ 432.684249] do_group_exit+0x177/0x440 [ 432.684266] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 432.684282] ? __ia32_sys_exit+0x50/0x50 [ 432.684310] get_signal+0x8b0/0x1980 [ 432.684336] ? ptrace_notify+0x130/0x130 [ 432.684352] ? lock_downgrade+0x900/0x900 [ 432.684376] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 432.696235] ? poll_select_copy_remaining+0x433/0x6a0 [ 432.696258] ? poll_freewait+0x260/0x260 [ 432.696287] do_signal+0x9c/0x21c0 [ 432.696305] ? wait_for_completion+0x8a0/0x8a0 [ 432.696325] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 432.696346] ? setup_sigcontext+0x7d0/0x7d0 [ 432.696359] ? trace_hardirqs_on_caller+0xc0/0x310 [ 432.696378] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 432.711596] ? trace_hardirqs_off+0x310/0x310 [ 432.711612] ? exit_to_usermode_loop+0x8c/0x380 [ 432.711628] ? exit_to_usermode_loop+0x8c/0x380 [ 432.711643] ? lockdep_hardirqs_on+0x421/0x5c0 [ 432.711658] ? trace_hardirqs_on+0xbd/0x310 [ 432.711675] ? do_syscall_64+0x6be/0x820 [ 432.711707] exit_to_usermode_loop+0x2e5/0x380 [ 432.711726] ? syscall_trace_enter+0x1260/0x1260 [ 432.711740] ? __x64_sys_pselect6+0x200/0x280 [ 432.711756] ? __x64_sys_pselect6+0x20a/0x280 [ 432.734445] do_syscall_64+0x6be/0x820 [ 432.734488] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 432.734510] ? syscall_return_slowpath+0x5e0/0x5e0 [ 432.734524] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 432.734540] ? trace_hardirqs_on_caller+0x310/0x310 [ 432.734556] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 432.734573] ? prepare_exit_to_usermode+0x291/0x3b0 [ 432.734595] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 432.734618] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 432.734630] RIP: 0033:0x457669 [ 432.734644] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 432.734652] RSP: 002b:00007f1e16036c78 EFLAGS: 00000246 ORIG_RAX: 000000000000010e [ 432.734672] RAX: fffffffffffffdfe RBX: 00007f1e16036c90 RCX: 0000000000457669 [ 432.747769] RDX: 0000000020000100 RSI: 00000000200000c0 RDI: 0000000000000040 [ 432.747779] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 432.747802] R10: 0000000020000140 R11: 0000000000000246 R12: 00007f1e160376d4 [ 432.747810] R13: 00000000004c3a26 R14: 00000000004d6498 R15: 0000000000000009 [ 433.257832] bond0 (unregistering): Released all slaves [ 433.989499] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.996035] bridge0: port 1(bridge_slave_0) entered disabled state [ 434.003822] device bridge_slave_0 entered promiscuous mode [ 434.141680] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.148297] bridge0: port 2(bridge_slave_1) entered disabled state [ 434.163480] device bridge_slave_1 entered promiscuous mode [ 434.251759] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 434.341401] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 434.553494] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 434.645035] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 434.914638] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 434.922086] team0: Port device team_slave_0 added [ 434.970108] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 434.978039] team0: Port device team_slave_1 added [ 435.023934] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 435.075012] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 435.107256] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 435.114742] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 435.122888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 435.153539] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_1: link is not ready [ 435.160579] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 435.170195] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 435.559053] bridge0: port 2(bridge_slave_1) entered blocking state [ 435.565452] bridge0: port 2(bridge_slave_1) entered forwarding state [ 435.572055] bridge0: port 1(bridge_slave_0) entered blocking state [ 435.578476] bridge0: port 1(bridge_slave_0) entered forwarding state [ 435.586078] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 436.402791] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 436.612240] 8021q: adding VLAN 0 to HW filter on device bond0 [ 436.711752] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 436.807772] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 436.814088] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 436.821020] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 436.918609] 8021q: adding VLAN 0 to HW filter on device team0 10:23:34 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smack%shat', 0x3d, 'wfdno'}}]}}) 10:23:34 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f00000004c0)="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", 0xfffffffffffffe87) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r2, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) openat$vhost_vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vhost-vsock\x00', 0x2, 0x0) 10:23:34 executing program 3: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 10:23:34 executing program 1 (fault-call:9 fault-nth:35): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:34 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 437.501814] 9pnet: Insufficient options for proto=fd [ 437.508591] 9pnet: Insufficient options for proto=fd 10:23:34 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smack.shat', 0x3d, 'wfdno'}}]}}) [ 437.595421] 9pnet: Insufficient options for proto=fd [ 437.603396] FAULT_INJECTION: forcing a failure. [ 437.603396] name failslab, interval 1, probability 0, space 0, times 0 [ 437.658790] CPU: 1 PID: 16902 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 437.666173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 437.675539] Call Trace: [ 437.678150] dump_stack+0x1d3/0x2c6 [ 437.681806] ? dump_stack_print_info.cold.1+0x20/0x20 [ 437.687046] should_fail.cold.4+0xa/0x17 [ 437.691136] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 437.696264] ? save_stack+0x43/0xd0 [ 437.699900] ? kasan_kmalloc+0xc7/0xe0 [ 437.703799] ? __kmalloc+0x15b/0x770 [ 437.707528] ? simple_xattr_alloc+0x3e/0xa0 [ 437.711864] ? simple_xattr_set+0xb6/0x750 [ 437.716115] ? graph_lock+0x270/0x270 [ 437.719931] ? vfs_setxattr+0xd8/0x100 [ 437.723844] ? ovl_check_setxattr+0xf3/0x130 [ 437.728269] ? ovl_set_impure+0xaf/0x110 [ 437.732345] ? ovl_copy_up_one+0x9a4/0x2f10 [ 437.736676] ? ovl_copy_up_flags+0x14e/0x1d0 [ 437.741100] ? ovl_copy_up+0x17/0x1a [ 437.744840] ? find_held_lock+0x36/0x1c0 [ 437.748927] ? __lock_is_held+0xb5/0x140 [ 437.753032] ? ___might_sleep+0x1ed/0x300 [ 437.757229] ? arch_local_save_flags+0x40/0x40 [ 437.761855] __should_failslab+0x124/0x180 [ 437.766112] should_failslab+0x9/0x14 [ 437.769930] __kmalloc_track_caller+0x2d1/0x760 [ 437.774619] ? __lock_acquire+0x62f/0x4c20 [ 437.778868] ? smk_access+0x53b/0x700 [ 437.782864] ? simple_xattr_set+0xd4/0x750 [ 437.787119] kstrdup+0x39/0x70 [ 437.790330] simple_xattr_set+0xd4/0x750 [ 437.794412] ? simple_xattr_get+0x180/0x180 [ 437.798809] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.804485] ? evm_protected_xattr+0x206/0x290 [ 437.809127] shmem_xattr_handler_set+0x42/0x50 [ 437.813728] ? shmem_file_llseek+0x280/0x280 [ 437.818149] __vfs_setxattr+0x124/0x180 [ 437.822149] ? xattr_resolve_name+0x430/0x430 [ 437.826672] __vfs_setxattr_noperm+0x11d/0x410 [ 437.831275] vfs_setxattr+0xd8/0x100 [ 437.835019] ovl_check_setxattr+0xf3/0x130 [ 437.839273] ovl_set_impure+0xaf/0x110 [ 437.843183] ovl_copy_up_one+0x9a4/0x2f10 [ 437.847363] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.852946] ? check_preemption_disabled+0x48/0x280 [ 437.858038] ? ovl_copy_up_inode.part.9+0x5f0/0x5f0 [ 437.863086] ? graph_lock+0x270/0x270 [ 437.866901] ? graph_lock+0x270/0x270 [ 437.870713] ? perf_trace_lock_acquire+0x15b/0x800 [ 437.875723] ? perf_trace_lock_acquire+0x15b/0x800 [ 437.880693] ? find_held_lock+0x36/0x1c0 [ 437.884775] ? find_held_lock+0x36/0x1c0 [ 437.888855] ? dget_parent+0x1a5/0x6a0 [ 437.892768] ? lock_downgrade+0x900/0x900 [ 437.897064] ? check_preemption_disabled+0x48/0x280 [ 437.902156] ovl_copy_up_flags+0x14e/0x1d0 [ 437.906411] ovl_copy_up+0x17/0x1a [ 437.909988] ovl_rename+0x2a0/0x1a20 [ 437.913748] ? lockref_get+0x42/0x50 [ 437.917516] ? ovl_clear_empty+0x6f0/0x6f0 [ 437.921777] ? lock_two_nondirectories+0xdd/0x120 [ 437.926636] ? _down_write_nest_lock+0x130/0x130 [ 437.931423] vfs_rename+0x7fc/0x1a90 [ 437.935194] ? lookup_one_len+0x220/0x220 [ 437.939360] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.944914] ? security_path_rename+0x210/0x300 [ 437.949599] do_renameat2+0xea5/0x1180 [ 437.953559] ? user_path_create+0x40/0x40 10:23:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 437.957738] ? __lock_is_held+0xb5/0x140 [ 437.957774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 437.957794] ? check_preemption_disabled+0x48/0x280 [ 437.967395] ? __sb_end_write+0xd9/0x110 [ 437.967415] ? fput+0x130/0x1a0 [ 437.967433] ? do_syscall_64+0x9a/0x820 [ 437.967450] ? do_syscall_64+0x9a/0x820 [ 437.967465] ? lockdep_hardirqs_on+0x421/0x5c0 [ 437.967503] ? trace_hardirqs_on+0xbd/0x310 [ 437.967531] ? __ia32_sys_read+0xb0/0xb0 [ 437.967549] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 437.967587] __x64_sys_renameat+0x9a/0x100 [ 437.967606] do_syscall_64+0x1b9/0x820 [ 438.014463] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 438.019843] ? syscall_return_slowpath+0x5e0/0x5e0 [ 438.024778] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 438.029632] ? trace_hardirqs_on_caller+0x310/0x310 [ 438.034670] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 438.039698] ? prepare_exit_to_usermode+0x291/0x3b0 [ 438.044755] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 438.049621] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.054829] RIP: 0033:0x457669 [ 438.058041] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 438.076979] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 438.084726] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 438.092028] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 438.099335] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 10:23:34 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackf\nhat', 0x3d, 'wfdno'}}]}}) [ 438.106615] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 438.113892] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 [ 438.134868] 9pnet: Insufficient options for proto=fd 10:23:34 executing program 1 (fault-call:9 fault-nth:36): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:34 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackf%hat', 0x3d, 'wfdno'}}]}}) [ 438.229232] 9pnet: Insufficient options for proto=fd 10:23:34 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d, 0x0}}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 438.323544] 9pnet: Insufficient options for proto=fd [ 438.341945] FAULT_INJECTION: forcing a failure. [ 438.341945] name failslab, interval 1, probability 0, space 0, times 0 [ 438.344614] 9pnet: Insufficient options for proto=fd [ 438.386148] CPU: 0 PID: 16940 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 438.393538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 438.402910] Call Trace: [ 438.402937] dump_stack+0x1d3/0x2c6 [ 438.402963] ? dump_stack_print_info.cold.1+0x20/0x20 [ 438.403018] should_fail.cold.4+0xa/0x17 [ 438.418496] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 438.423620] ? __lock_acquire+0x62f/0x4c20 [ 438.427873] ? __update_load_avg_se+0xae0/0xae0 [ 438.432552] ? graph_lock+0x270/0x270 [ 438.436367] ? graph_lock+0x270/0x270 [ 438.440195] ? find_held_lock+0x36/0x1c0 [ 438.444300] ? __lock_is_held+0xb5/0x140 [ 438.448425] ? ___might_sleep+0x1ed/0x300 [ 438.452589] ? arch_local_save_flags+0x40/0x40 [ 438.457185] ? smk_access+0x53b/0x700 [ 438.461021] ? debug_smp_processor_id+0x1c/0x20 [ 438.465713] __should_failslab+0x124/0x180 [ 438.470001] should_failslab+0x9/0x14 [ 438.473818] __kmalloc+0x2e0/0x770 [ 438.477373] ? smk_access+0x53b/0x700 [ 438.480186] 9pnet: Insufficient options for proto=fd [ 438.481185] ? perf_trace_lock+0x7a0/0x7a0 [ 438.481205] ? simple_xattr_alloc+0x3e/0xa0 [ 438.481226] simple_xattr_alloc+0x3e/0xa0 [ 438.494916] simple_xattr_set+0xb6/0x750 [ 438.503145] ? simple_xattr_get+0x180/0x180 [ 438.503181] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.503205] ? evm_protected_xattr+0x206/0x290 [ 438.512295] 9pnet: Insufficient options for proto=fd [ 438.513055] shmem_xattr_handler_set+0x42/0x50 [ 438.513076] ? shmem_file_llseek+0x280/0x280 [ 438.513092] __vfs_setxattr+0x124/0x180 10:23:35 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfdhat', 0x3d, 'wfdno'}}]}}) [ 438.513112] ? xattr_resolve_name+0x430/0x430 [ 438.531764] __vfs_setxattr_noperm+0x11d/0x410 [ 438.544820] vfs_setxattr+0xd8/0x100 [ 438.548553] ovl_check_setxattr+0xf3/0x130 [ 438.552815] ovl_set_impure+0xaf/0x110 [ 438.556765] ovl_copy_up_one+0x9a4/0x2f10 [ 438.560934] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.566498] ? check_preemption_disabled+0x48/0x280 [ 438.571560] ? ovl_copy_up_inode.part.9+0x5f0/0x5f0 [ 438.576604] ? graph_lock+0x270/0x270 [ 438.580427] ? graph_lock+0x270/0x270 [ 438.584242] ? perf_trace_lock_acquire+0x15b/0x800 [ 438.589193] ? perf_trace_lock_acquire+0x15b/0x800 [ 438.594130] ? find_held_lock+0x36/0x1c0 [ 438.598192] ? find_held_lock+0x36/0x1c0 [ 438.602242] ? dget_parent+0x1a5/0x6a0 [ 438.606115] ? lock_downgrade+0x900/0x900 [ 438.610283] ? check_preemption_disabled+0x48/0x280 [ 438.615345] ovl_copy_up_flags+0x14e/0x1d0 [ 438.619565] ovl_copy_up+0x17/0x1a [ 438.623105] ovl_rename+0x2a0/0x1a20 [ 438.626822] ? lockref_get+0x42/0x50 [ 438.630527] ? ovl_clear_empty+0x6f0/0x6f0 [ 438.634743] ? lock_two_nondirectories+0xdd/0x120 [ 438.639571] ? _down_write_nest_lock+0x130/0x130 [ 438.644334] vfs_rename+0x7fc/0x1a90 [ 438.648069] ? lookup_one_len+0x220/0x220 [ 438.652202] ? security_path_rename+0xe8/0x300 [ 438.656771] ? security_path_rename+0xf7/0x300 [ 438.661337] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.666884] ? security_path_rename+0x210/0x300 [ 438.671553] do_renameat2+0xea5/0x1180 [ 438.675447] ? user_path_create+0x40/0x40 [ 438.679579] ? __lock_is_held+0xb5/0x140 [ 438.683631] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 438.689167] ? check_preemption_disabled+0x48/0x280 [ 438.694173] ? __sb_end_write+0xd9/0x110 [ 438.698221] ? fput+0x130/0x1a0 [ 438.701488] ? do_syscall_64+0x9a/0x820 [ 438.705449] ? do_syscall_64+0x9a/0x820 [ 438.709408] ? lockdep_hardirqs_on+0x421/0x5c0 [ 438.713984] ? trace_hardirqs_on+0xbd/0x310 [ 438.718291] ? __ia32_sys_read+0xb0/0xb0 [ 438.722334] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 438.727775] __x64_sys_renameat+0x9a/0x100 [ 438.732015] do_syscall_64+0x1b9/0x820 [ 438.735887] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 438.741235] ? syscall_return_slowpath+0x5e0/0x5e0 [ 438.746144] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 438.750977] ? trace_hardirqs_on_caller+0x310/0x310 [ 438.755990] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 438.761015] ? prepare_exit_to_usermode+0x291/0x3b0 [ 438.766035] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 438.770882] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 438.776058] RIP: 0033:0x457669 [ 438.779247] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 438.798142] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 438.805866] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 438.813121] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 438.820372] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 438.827625] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 438.834903] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:35 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000100)={0x0}, &(0x7f0000000180)=0xc) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) tgkill(r1, r2, 0x6) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:35 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x800000000000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:35 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfohat', 0x3d, 'wfdno'}}]}}) 10:23:35 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x10000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:35 executing program 1 (fault-call:9 fault-nth:37): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:35 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r2, 0xffff) prctl$PR_SVE_SET_VL(0x32, 0x1bd5d) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 439.026019] 9pnet: Insufficient options for proto=fd [ 439.071704] FAULT_INJECTION: forcing a failure. [ 439.071704] name failslab, interval 1, probability 0, space 0, times 0 [ 439.083229] CPU: 1 PID: 16975 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 439.090609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.099982] Call Trace: [ 439.102609] dump_stack+0x1d3/0x2c6 [ 439.106261] ? dump_stack_print_info.cold.1+0x20/0x20 [ 439.111496] should_fail.cold.4+0xa/0x17 [ 439.115578] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 439.120701] ? save_stack+0x43/0xd0 [ 439.124367] ? kasan_kmalloc+0xc7/0xe0 [ 439.128263] ? __kmalloc+0x15b/0x770 [ 439.131994] ? simple_xattr_alloc+0x3e/0xa0 [ 439.136324] ? simple_xattr_set+0xb6/0x750 [ 439.140575] ? graph_lock+0x270/0x270 [ 439.144385] ? vfs_setxattr+0xd8/0x100 [ 439.148287] ? ovl_check_setxattr+0xf3/0x130 [ 439.152707] ? ovl_set_impure+0xaf/0x110 [ 439.156791] ? ovl_copy_up_one+0x9a4/0x2f10 [ 439.161123] ? ovl_copy_up_flags+0x14e/0x1d0 [ 439.165537] ? ovl_copy_up+0x17/0x1a [ 439.169270] ? find_held_lock+0x36/0x1c0 [ 439.173350] ? __lock_is_held+0xb5/0x140 [ 439.177424] ? dwc3_gadget_set_link_state+0x728/0x11e0 [ 439.182721] ? ___might_sleep+0x1ed/0x300 [ 439.186882] ? arch_local_save_flags+0x40/0x40 [ 439.191491] __should_failslab+0x124/0x180 [ 439.195742] should_failslab+0x9/0x14 [ 439.199565] __kmalloc_track_caller+0x2d1/0x760 [ 439.204244] ? __lock_acquire+0x62f/0x4c20 [ 439.208492] ? smk_access+0x53b/0x700 [ 439.212305] ? simple_xattr_set+0xd4/0x750 [ 439.216597] kstrdup+0x39/0x70 [ 439.219832] simple_xattr_set+0xd4/0x750 [ 439.223910] ? simple_xattr_get+0x180/0x180 [ 439.228264] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.233820] ? evm_protected_xattr+0x206/0x290 [ 439.238458] shmem_xattr_handler_set+0x42/0x50 [ 439.243054] ? shmem_file_llseek+0x280/0x280 [ 439.247488] __vfs_setxattr+0x124/0x180 [ 439.251474] ? xattr_resolve_name+0x430/0x430 [ 439.256004] __vfs_setxattr_noperm+0x11d/0x410 [ 439.260601] vfs_setxattr+0xd8/0x100 [ 439.264327] ovl_check_setxattr+0xf3/0x130 [ 439.268592] ovl_set_impure+0xaf/0x110 [ 439.272522] ovl_copy_up_one+0x9a4/0x2f10 [ 439.276695] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.282246] ? check_preemption_disabled+0x48/0x280 [ 439.287297] ? ovl_copy_up_inode.part.9+0x5f0/0x5f0 [ 439.292341] ? graph_lock+0x270/0x270 [ 439.296298] ? graph_lock+0x270/0x270 [ 439.300106] ? perf_trace_lock_acquire+0x15b/0x800 [ 439.305045] ? perf_trace_lock_acquire+0x15b/0x800 [ 439.310048] ? find_held_lock+0x36/0x1c0 [ 439.314128] ? find_held_lock+0x36/0x1c0 [ 439.318219] ? dget_parent+0x1a5/0x6a0 [ 439.322135] ? lock_downgrade+0x900/0x900 [ 439.326305] ? check_preemption_disabled+0x48/0x280 [ 439.331391] ovl_copy_up_flags+0x14e/0x1d0 [ 439.335643] ovl_copy_up+0x17/0x1a [ 439.339205] ovl_rename+0x2a0/0x1a20 [ 439.342951] ? lockref_get+0x42/0x50 [ 439.346719] ? ovl_clear_empty+0x6f0/0x6f0 [ 439.350966] ? lock_two_nondirectories+0xdd/0x120 [ 439.355836] ? _down_write_nest_lock+0x130/0x130 [ 439.360625] vfs_rename+0x7fc/0x1a90 [ 439.364372] ? lookup_one_len+0x220/0x220 [ 439.368629] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.374188] ? security_path_rename+0x210/0x300 [ 439.378846] do_renameat2+0xea5/0x1180 [ 439.382730] ? user_path_create+0x40/0x40 [ 439.386868] ? __lock_is_held+0xb5/0x140 [ 439.390923] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.396463] ? check_preemption_disabled+0x48/0x280 [ 439.401532] ? __sb_end_write+0xd9/0x110 [ 439.405632] ? fput+0x130/0x1a0 [ 439.408914] ? do_syscall_64+0x9a/0x820 [ 439.412882] ? do_syscall_64+0x9a/0x820 [ 439.416844] ? lockdep_hardirqs_on+0x421/0x5c0 [ 439.421412] ? trace_hardirqs_on+0xbd/0x310 [ 439.425718] ? __ia32_sys_read+0xb0/0xb0 [ 439.429763] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 439.435217] __x64_sys_renameat+0x9a/0x100 [ 439.439464] do_syscall_64+0x1b9/0x820 [ 439.443343] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 439.448728] ? syscall_return_slowpath+0x5e0/0x5e0 [ 439.453660] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 439.458512] ? trace_hardirqs_on_caller+0x310/0x310 [ 439.463538] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 439.468575] ? prepare_exit_to_usermode+0x291/0x3b0 [ 439.473599] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 439.478450] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 439.483677] RIP: 0033:0x457669 [ 439.486861] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 439.505759] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 439.513452] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 10:23:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0xf0ffffff}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:36 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfuhat', 0x3d, 'wfdno'}}]}}) [ 439.520719] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 439.528006] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 439.535261] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 439.542525] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:36 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfxhat', 0x3d, 'wfdno'}}]}}) [ 439.598453] 9pnet: Insufficient options for proto=fd 10:23:36 executing program 1 (fault-call:9 fault-nth:38): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 439.775626] FAULT_INJECTION: forcing a failure. [ 439.775626] name failslab, interval 1, probability 0, space 0, times 0 [ 439.798104] 9pnet: Insufficient options for proto=fd [ 439.820292] CPU: 0 PID: 16995 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 439.827686] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 439.837047] Call Trace: [ 439.839657] dump_stack+0x1d3/0x2c6 [ 439.843370] ? dump_stack_print_info.cold.1+0x20/0x20 [ 439.848602] should_fail.cold.4+0xa/0x17 [ 439.852713] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 439.857844] ? save_stack+0x43/0xd0 [ 439.861498] ? kasan_kmalloc+0xc7/0xe0 [ 439.865415] ? __kmalloc+0x15b/0x770 [ 439.869146] ? simple_xattr_alloc+0x3e/0xa0 [ 439.873485] ? simple_xattr_set+0xb6/0x750 [ 439.877748] ? graph_lock+0x270/0x270 [ 439.881563] ? vfs_setxattr+0xd8/0x100 [ 439.885466] ? ovl_check_setxattr+0xf3/0x130 [ 439.889892] ? ovl_set_impure+0xaf/0x110 [ 439.893985] ? ovl_copy_up_one+0x9a4/0x2f10 [ 439.898333] ? ovl_copy_up_flags+0x14e/0x1d0 [ 439.902752] ? ovl_copy_up+0x17/0x1a [ 439.906486] ? find_held_lock+0x36/0x1c0 [ 439.910571] ? __lock_is_held+0xb5/0x140 [ 439.914653] ? rds_message_inc_copy_to_user+0x138/0x350 [ 439.920050] ? ___might_sleep+0x1ed/0x300 [ 439.924215] ? arch_local_save_flags+0x40/0x40 [ 439.928840] __should_failslab+0x124/0x180 [ 439.933098] should_failslab+0x9/0x14 [ 439.936918] __kmalloc_track_caller+0x2d1/0x760 [ 439.941598] ? __lock_acquire+0x62f/0x4c20 [ 439.945853] ? smk_access+0x53b/0x700 [ 439.949680] ? simple_xattr_set+0xd4/0x750 [ 439.953947] kstrdup+0x39/0x70 [ 439.957191] simple_xattr_set+0xd4/0x750 [ 439.961282] ? simple_xattr_get+0x180/0x180 [ 439.965628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 439.971205] ? evm_protected_xattr+0x206/0x290 [ 439.975815] shmem_xattr_handler_set+0x42/0x50 [ 439.980416] ? shmem_file_llseek+0x280/0x280 [ 439.984841] __vfs_setxattr+0x124/0x180 [ 439.988843] ? xattr_resolve_name+0x430/0x430 [ 439.993371] __vfs_setxattr_noperm+0x11d/0x410 [ 439.997992] vfs_setxattr+0xd8/0x100 [ 440.001731] ovl_check_setxattr+0xf3/0x130 [ 440.006011] ovl_set_impure+0xaf/0x110 [ 440.009916] ovl_copy_up_one+0x9a4/0x2f10 [ 440.014082] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.019632] ? check_preemption_disabled+0x48/0x280 [ 440.024674] ? ovl_copy_up_inode.part.9+0x5f0/0x5f0 [ 440.029736] ? graph_lock+0x270/0x270 [ 440.033558] ? graph_lock+0x270/0x270 [ 440.037373] ? perf_trace_lock_acquire+0x15b/0x800 [ 440.042314] ? perf_trace_lock_acquire+0x15b/0x800 [ 440.047263] ? find_held_lock+0x36/0x1c0 [ 440.048469] 9pnet: Insufficient options for proto=fd [ 440.051346] ? find_held_lock+0x36/0x1c0 [ 440.051392] ? dget_parent+0x1a5/0x6a0 [ 440.064440] ? lock_downgrade+0x900/0x900 [ 440.068599] ? check_preemption_disabled+0x48/0x280 10:23:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x5000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:36 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfsha\n', 0x3d, 'wfdno'}}]}}) [ 440.073688] ovl_copy_up_flags+0x14e/0x1d0 [ 440.077941] ovl_copy_up+0x17/0x1a [ 440.081512] ovl_rename+0x2a0/0x1a20 [ 440.085256] ? lockref_get+0x42/0x50 [ 440.089074] ? ovl_clear_empty+0x6f0/0x6f0 [ 440.093327] ? lock_two_nondirectories+0xdd/0x120 [ 440.098206] ? _down_write_nest_lock+0x130/0x130 [ 440.103017] vfs_rename+0x7fc/0x1a90 [ 440.106772] ? lookup_one_len+0x220/0x220 [ 440.110943] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.116512] ? security_path_rename+0x210/0x300 [ 440.117047] 9pnet: Insufficient options for proto=fd [ 440.121203] do_renameat2+0xea5/0x1180 [ 440.121239] ? user_path_create+0x40/0x40 [ 440.134381] ? __lock_is_held+0xb5/0x140 [ 440.138467] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.141162] 9pnet: Insufficient options for proto=fd [ 440.144021] ? check_preemption_disabled+0x48/0x280 [ 440.144047] ? __sb_end_write+0xd9/0x110 [ 440.144069] ? fput+0x130/0x1a0 [ 440.144091] ? do_syscall_64+0x9a/0x820 [ 440.165502] ? do_syscall_64+0x9a/0x820 [ 440.169488] ? lockdep_hardirqs_on+0x421/0x5c0 [ 440.174088] ? trace_hardirqs_on+0xbd/0x310 [ 440.178419] ? __ia32_sys_read+0xb0/0xb0 [ 440.182490] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 440.187955] __x64_sys_renameat+0x9a/0x100 [ 440.192222] do_syscall_64+0x1b9/0x820 [ 440.196139] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 440.201512] ? syscall_return_slowpath+0x5e0/0x5e0 [ 440.206443] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 440.206460] ? trace_hardirqs_on_caller+0x310/0x310 [ 440.206478] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 440.206496] ? prepare_exit_to_usermode+0x291/0x3b0 [ 440.206519] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 440.216373] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.226367] RIP: 0033:0x457669 [ 440.226383] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 440.226391] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 440.226405] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 10:23:36 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_tcp_int(r0, 0x6, 0x1f, &(0x7f0000000100)=0x5, 0x4) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x0, &(0x7f0000000140)={0x1ba, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x6}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:36 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfsha%', 0x3d, 'wfdno'}}]}}) 10:23:36 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x8}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 440.226414] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 440.226427] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 440.236431] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 440.236441] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:36 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x10}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:36 executing program 1 (fault-call:9 fault-nth:39): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:36 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r2, 0xffff) prctl$PR_SVE_SET_VL(0x32, 0x1bd5d) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 440.338740] 9pnet: Insufficient options for proto=fd 10:23:37 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0xa, 'wfdno'}}]}}) [ 440.364488] 9pnet: Insufficient options for proto=fd [ 440.410083] FAULT_INJECTION: forcing a failure. [ 440.410083] name failslab, interval 1, probability 0, space 0, times 0 [ 440.438652] 9pnet: Insufficient options for proto=fd 10:23:37 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x25, 'wfdno'}}]}}) [ 440.503205] CPU: 1 PID: 17030 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 440.510590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 440.520019] Call Trace: [ 440.522628] dump_stack+0x1d3/0x2c6 [ 440.526301] ? dump_stack_print_info.cold.1+0x20/0x20 [ 440.531524] should_fail.cold.4+0xa/0x17 [ 440.535601] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 440.540770] ? __lock_acquire+0x62f/0x4c20 [ 440.545038] ? graph_lock+0x270/0x270 [ 440.548877] ? find_held_lock+0x36/0x1c0 [ 440.552963] ? __lock_is_held+0xb5/0x140 [ 440.557136] ? ___might_sleep+0x1ed/0x300 [ 440.561294] ? arch_local_save_flags+0x40/0x40 [ 440.565917] ? is_bpf_text_address+0xd3/0x170 [ 440.570431] ? kernel_text_address+0x79/0xf0 [ 440.574860] __should_failslab+0x124/0x180 [ 440.579109] should_failslab+0x9/0x14 [ 440.582919] kmem_cache_alloc_trace+0x2d7/0x750 [ 440.587616] new_task_smack+0x104/0x320 [ 440.591605] ? smack_sb_kern_mount+0x410/0x410 [ 440.596207] ? smack_inode_copy_up+0x145/0x1b0 [ 440.600812] ? security_inode_copy_up+0x54/0xb0 [ 440.605499] ? ovl_copy_up_one+0xd69/0x2f10 [ 440.609841] ? ovl_copy_up_flags+0x14e/0x1d0 [ 440.614259] ? ovl_copy_up+0x17/0x1a [ 440.617993] ? ovl_rename+0x2a0/0x1a20 [ 440.621899] ? vfs_rename+0x7fc/0x1a90 [ 440.625797] ? do_renameat2+0xea5/0x1180 [ 440.629884] ? __x64_sys_renameat+0x9a/0x100 [ 440.634323] ? do_syscall_64+0x1b9/0x820 [ 440.638413] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.643789] ? percpu_ref_put_many+0x11c/0x260 [ 440.648415] smack_cred_prepare+0x109/0x940 10:23:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x3b9ac9ff}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 440.652760] ? kasan_check_read+0x11/0x20 [ 440.656918] ? graph_lock+0x270/0x270 [ 440.660722] ? rcu_softirq_qs+0x20/0x20 [ 440.664708] ? smack_cred_alloc_blank+0x70/0x70 [ 440.669406] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.674953] ? refcount_inc_not_zero_checked+0x1e5/0x2f0 [ 440.677614] 9pnet: Insufficient options for proto=fd [ 440.680420] ? refcount_add_not_zero_checked+0x330/0x330 [ 440.680458] ? rcu_read_lock_sched_held+0x108/0x120 [ 440.680488] security_prepare_creds+0x60/0xc0 10:23:37 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'w%dno'}}]}}) [ 440.680509] prepare_creds+0x3b9/0x4d0 [ 440.680526] ? abort_creds+0x2a0/0x2a0 [ 440.680547] ? down_write_nested+0x8e/0x130 [ 440.680565] ? _down_write_nest_lock+0x130/0x130 [ 440.708380] smack_inode_copy_up+0x145/0x1b0 [ 440.708402] security_inode_copy_up+0x54/0xb0 [ 440.708422] ovl_copy_up_one+0xd69/0x2f10 [ 440.708439] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.708460] ? check_preemption_disabled+0x48/0x280 [ 440.721923] ? ovl_copy_up_inode.part.9+0x5f0/0x5f0 [ 440.721956] ? graph_lock+0x270/0x270 [ 440.721986] ? graph_lock+0x270/0x270 [ 440.722016] ? perf_trace_lock_acquire+0x15b/0x800 [ 440.722047] ? perf_trace_lock_acquire+0x15b/0x800 [ 440.722072] ? find_held_lock+0x36/0x1c0 [ 440.722095] ? find_held_lock+0x36/0x1c0 [ 440.767746] ? dget_parent+0x1a5/0x6a0 [ 440.767763] ? lock_downgrade+0x900/0x900 [ 440.767778] ? check_preemption_disabled+0x48/0x280 [ 440.767842] ovl_copy_up_flags+0x14e/0x1d0 [ 440.767861] ovl_copy_up+0x17/0x1a [ 440.767881] ovl_rename+0x2a0/0x1a20 [ 440.775808] ? lockref_get+0x42/0x50 [ 440.775837] ? ovl_clear_empty+0x6f0/0x6f0 [ 440.775851] ? lock_two_nondirectories+0xdd/0x120 [ 440.775867] ? _down_write_nest_lock+0x130/0x130 [ 440.775897] vfs_rename+0x7fc/0x1a90 [ 440.775925] ? lookup_one_len+0x220/0x220 [ 440.775948] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.775964] ? security_path_rename+0x210/0x300 [ 440.776011] do_renameat2+0xea5/0x1180 [ 440.776043] ? user_path_create+0x40/0x40 [ 440.840212] ? __lock_is_held+0xb5/0x140 [ 440.844320] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 440.849869] ? check_preemption_disabled+0x48/0x280 [ 440.854908] ? __sb_end_write+0xd9/0x110 [ 440.858992] ? fput+0x130/0x1a0 [ 440.862318] ? do_syscall_64+0x9a/0x820 [ 440.866318] ? do_syscall_64+0x9a/0x820 [ 440.870321] ? lockdep_hardirqs_on+0x421/0x5c0 [ 440.874934] ? trace_hardirqs_on+0xbd/0x310 [ 440.879286] ? __ia32_sys_read+0xb0/0xb0 [ 440.883360] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 440.888841] __x64_sys_renameat+0x9a/0x100 [ 440.893123] do_syscall_64+0x1b9/0x820 [ 440.897027] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 440.902414] ? syscall_return_slowpath+0x5e0/0x5e0 [ 440.907357] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 440.912221] ? trace_hardirqs_on_caller+0x310/0x310 [ 440.917251] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 440.922287] ? prepare_exit_to_usermode+0x291/0x3b0 [ 440.927334] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 440.932196] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 440.937397] RIP: 0033:0x457669 [ 440.940616] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 440.959536] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 440.967266] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 440.974539] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 440.981811] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 440.983328] 9pnet: Insufficient options for proto=fd [ 440.989097] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 10:23:37 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'w.dno'}}]}}) [ 440.989108] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 [ 441.022513] 9pnet: Insufficient options for proto=fd 10:23:37 executing program 1 (fault-call:9 fault-nth:40): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 441.171114] 9pnet: Insufficient options for proto=fd [ 441.171351] 9pnet: Insufficient options for proto=fd 10:23:37 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000180)=@nat={'nat\x00', 0x19, 0x3, 0x3b8, [0x20000400, 0x0, 0x0, 0x200005a8, 0x20000680], 0x0, &(0x7f0000000100), &(0x7f0000000800)=ANY=[@ANYBLOB="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"]}, 0x43c) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:37 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x100000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:37 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'w/dno'}}]}}) 10:23:37 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0xfb00}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 441.329048] FAULT_INJECTION: forcing a failure. [ 441.329048] name failslab, interval 1, probability 0, space 0, times 0 [ 441.335426] 9pnet: Insufficient options for proto=fd [ 441.383097] CPU: 0 PID: 17081 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 441.390486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 441.399845] Call Trace: [ 441.402452] dump_stack+0x1d3/0x2c6 [ 441.406121] ? dump_stack_print_info.cold.1+0x20/0x20 [ 441.411334] should_fail.cold.4+0xa/0x17 [ 441.415414] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 441.420568] ? mark_held_locks+0xc7/0x130 [ 441.424728] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.430379] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.435923] ? check_preemption_disabled+0x48/0x280 [ 441.440976] ? graph_lock+0x270/0x270 [ 441.444857] ? debug_smp_processor_id+0x1c/0x20 [ 441.449571] ? perf_trace_lock_acquire+0x15b/0x800 [ 441.454546] ? find_held_lock+0x36/0x1c0 [ 441.458630] ? __lock_is_held+0xb5/0x140 [ 441.462709] ? ___might_sleep+0x1ed/0x300 [ 441.466862] ? arch_local_save_flags+0x40/0x40 [ 441.471455] ? find_held_lock+0x36/0x1c0 [ 441.475533] __should_failslab+0x124/0x180 [ 441.479799] should_failslab+0x9/0x14 [ 441.483621] kmem_cache_alloc+0x2be/0x730 [ 441.487779] ? lock_downgrade+0x900/0x900 [ 441.491934] ? check_preemption_disabled+0x48/0x280 [ 441.497024] __d_alloc+0xc8/0xb90 [ 441.500491] ? __lock_acquire+0x62f/0x4c20 [ 441.504738] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 441.509799] ? mark_held_locks+0x130/0x130 [ 441.514047] ? unwind_get_return_address+0x61/0xa0 [ 441.519051] ? __save_stack_trace+0x8d/0xf0 [ 441.523402] d_alloc+0x96/0x380 [ 441.523420] ? debug_smp_processor_id+0x1c/0x20 10:23:38 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'w\ndno'}}]}}) [ 441.523439] ? __d_alloc+0xb90/0xb90 [ 441.531387] d_alloc_parallel+0x15a/0x1f40 [ 441.531404] ? find_held_lock+0x36/0x1c0 [ 441.531425] ? graph_lock+0x270/0x270 [ 441.536825] kernel msg: ebtables bug: please report to author: Wrong len argument [ 441.539360] ? graph_lock+0x270/0x270 [ 441.539383] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.539406] ? __d_lookup_rcu+0xaa0/0xaa0 [ 441.568380] ? find_held_lock+0x36/0x1c0 [ 441.572467] ? __d_lookup+0x591/0x9e0 [ 441.576282] ? lock_downgrade+0x900/0x900 [ 441.580477] ? check_preemption_disabled+0x48/0x280 [ 441.585514] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 441.585623] 9pnet: Insufficient options for proto=fd [ 441.590452] ? kasan_check_read+0x11/0x20 [ 441.590469] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 441.590485] ? rcu_softirq_qs+0x20/0x20 [ 441.590512] ? __lockdep_init_map+0x105/0x590 [ 441.590533] ? __lockdep_init_map+0x105/0x590 [ 441.609023] ? lockdep_init_map+0x9/0x10 [ 441.609038] ? __init_waitqueue_head+0x9e/0x150 [ 441.609053] ? init_wait_entry+0x1c0/0x1c0 [ 441.609071] ? d_lookup+0x255/0x300 [ 441.618043] ? d_lookup+0x255/0x300 [ 441.618059] ? lockdep_hardirqs_on+0x421/0x5c0 [ 441.618096] __lookup_slow+0x1e6/0x540 [ 441.618114] ? vfs_unlink+0x510/0x510 [ 441.650604] ? d_lookup+0x20d/0x300 [ 441.654273] lookup_one_len+0x1d8/0x220 [ 441.658284] ? lookup_one_len_unlocked+0x100/0x100 [ 441.663249] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 441.668835] ovl_lookup_temp+0x101/0x190 [ 441.672917] ? ovl_read_iter+0x420/0x420 [ 441.677045] ? override_creds+0x195/0x1f0 [ 441.681206] ? __validate_process_creds+0x540/0x540 [ 441.686242] ? smack_inode_copy_up+0x130/0x1b0 [ 441.690844] ovl_create_temp+0x1e/0x60 [ 441.694759] ovl_copy_up_one+0xe16/0x2f10 [ 441.698922] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.704477] ? check_preemption_disabled+0x48/0x280 [ 441.709517] ? ovl_copy_up_inode.part.9+0x5f0/0x5f0 [ 441.714568] ? graph_lock+0x270/0x270 [ 441.718390] ? graph_lock+0x270/0x270 [ 441.722209] ? perf_trace_lock_acquire+0x15b/0x800 [ 441.727172] ? perf_trace_lock_acquire+0x15b/0x800 [ 441.732172] ? find_held_lock+0x36/0x1c0 [ 441.736252] ? find_held_lock+0x36/0x1c0 [ 441.740338] ? dget_parent+0x1a5/0x6a0 [ 441.744238] ? lock_downgrade+0x900/0x900 [ 441.748399] ? check_preemption_disabled+0x48/0x280 [ 441.753512] ovl_copy_up_flags+0x14e/0x1d0 [ 441.757802] ovl_copy_up+0x17/0x1a [ 441.761357] ovl_rename+0x2a0/0x1a20 [ 441.765089] ? lockref_get+0x42/0x50 [ 441.768832] ? ovl_clear_empty+0x6f0/0x6f0 [ 441.773081] ? lock_two_nondirectories+0xdd/0x120 [ 441.777958] ? _down_write_nest_lock+0x130/0x130 [ 441.782752] vfs_rename+0x7fc/0x1a90 [ 441.786491] ? lookup_one_len+0x220/0x220 [ 441.790643] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.796185] ? security_path_rename+0x210/0x300 [ 441.800843] do_renameat2+0xea5/0x1180 [ 441.804726] ? user_path_create+0x40/0x40 [ 441.808860] ? __lock_is_held+0xb5/0x140 [ 441.812938] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 441.818512] ? check_preemption_disabled+0x48/0x280 [ 441.823547] ? __sb_end_write+0xd9/0x110 [ 441.827608] ? fput+0x130/0x1a0 [ 441.830886] ? do_syscall_64+0x9a/0x820 [ 441.834874] ? do_syscall_64+0x9a/0x820 [ 441.838834] ? lockdep_hardirqs_on+0x421/0x5c0 [ 441.843404] ? trace_hardirqs_on+0xbd/0x310 [ 441.847756] ? __ia32_sys_read+0xb0/0xb0 [ 441.851818] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 441.857314] __x64_sys_renameat+0x9a/0x100 [ 441.861553] do_syscall_64+0x1b9/0x820 [ 441.865439] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 441.870803] ? syscall_return_slowpath+0x5e0/0x5e0 [ 441.875741] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 441.880584] ? trace_hardirqs_on_caller+0x310/0x310 [ 441.885587] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 441.890590] ? prepare_exit_to_usermode+0x291/0x3b0 [ 441.895612] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 441.900448] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 441.905624] RIP: 0033:0x457669 [ 441.908800] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 441.927685] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 10:23:38 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r2, 0xffff) prctl$PR_SVE_SET_VL(0x32, 0x1bd5d) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x2}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:38 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wf%no'}}]}}) [ 441.935374] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 441.942627] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 441.949901] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 441.957177] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 441.964449] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:38 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wf\nno'}}]}}) [ 442.023048] 9pnet: Insufficient options for proto=fd 10:23:38 executing program 1 (fault-call:9 fault-nth:41): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:38 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfd%o'}}]}}) [ 442.138613] 9pnet: Insufficient options for proto=fd [ 442.148440] 9pnet: Insufficient options for proto=fd [ 442.172579] FAULT_INJECTION: forcing a failure. [ 442.172579] name failslab, interval 1, probability 0, space 0, times 0 [ 442.184580] CPU: 0 PID: 17125 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 442.191957] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 442.191978] Call Trace: [ 442.203942] dump_stack+0x1d3/0x2c6 [ 442.207603] ? dump_stack_print_info.cold.1+0x20/0x20 [ 442.212814] should_fail.cold.4+0xa/0x17 [ 442.212836] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 442.212858] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.212894] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.212944] ? check_preemption_disabled+0x48/0x280 10:23:38 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x200000000000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 442.238189] ? graph_lock+0x270/0x270 [ 442.242005] ? debug_smp_processor_id+0x1c/0x20 [ 442.246693] ? perf_trace_lock_acquire+0x15b/0x800 [ 442.251637] ? find_held_lock+0x36/0x1c0 [ 442.255729] ? __lock_is_held+0xb5/0x140 [ 442.259827] ? ___might_sleep+0x1ed/0x300 [ 442.259850] ? arch_local_save_flags+0x40/0x40 [ 442.268613] ? find_held_lock+0x36/0x1c0 [ 442.268637] __should_failslab+0x124/0x180 [ 442.268655] should_failslab+0x9/0x14 [ 442.280821] kmem_cache_alloc+0x2be/0x730 [ 442.285017] ? lock_downgrade+0x900/0x900 [ 442.289062] 9pnet: Insufficient options for proto=fd [ 442.289176] ? check_preemption_disabled+0x48/0x280 [ 442.299325] __d_alloc+0xc8/0xb90 [ 442.302788] ? __lock_acquire+0x62f/0x4c20 [ 442.307054] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 442.307090] ? mark_held_locks+0x130/0x130 [ 442.316374] ? unwind_get_return_address+0x61/0xa0 [ 442.321347] ? __save_stack_trace+0x8d/0xf0 [ 442.321377] d_alloc+0x96/0x380 [ 442.328363] 9pnet: Insufficient options for proto=fd [ 442.328985] ? debug_smp_processor_id+0x1c/0x20 [ 442.329002] ? __d_alloc+0xb90/0xb90 [ 442.329028] d_alloc_parallel+0x15a/0x1f40 [ 442.346724] ? find_held_lock+0x36/0x1c0 [ 442.350796] ? graph_lock+0x270/0x270 [ 442.354636] ? graph_lock+0x270/0x270 [ 442.358468] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.364022] ? __d_lookup_rcu+0xaa0/0xaa0 [ 442.368201] ? find_held_lock+0x36/0x1c0 [ 442.372286] ? __d_lookup+0x591/0x9e0 [ 442.376114] ? lock_downgrade+0x900/0x900 [ 442.380276] ? check_preemption_disabled+0x48/0x280 [ 442.385340] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 442.390285] ? kasan_check_read+0x11/0x20 [ 442.394458] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 442.399746] ? rcu_softirq_qs+0x20/0x20 [ 442.403762] ? __lockdep_init_map+0x105/0x590 [ 442.408280] ? __lockdep_init_map+0x105/0x590 [ 442.412806] ? lockdep_init_map+0x9/0x10 [ 442.416893] ? __init_waitqueue_head+0x9e/0x150 [ 442.421579] ? init_wait_entry+0x1c0/0x1c0 [ 442.425848] ? d_lookup+0x255/0x300 [ 442.429482] ? d_lookup+0x255/0x300 [ 442.433111] ? lockdep_hardirqs_on+0x421/0x5c0 [ 442.437721] __lookup_slow+0x1e6/0x540 [ 442.441656] ? vfs_unlink+0x510/0x510 [ 442.445481] ? d_lookup+0x20d/0x300 [ 442.449165] lookup_one_len+0x1d8/0x220 [ 442.453160] ? lookup_one_len_unlocked+0x100/0x100 [ 442.458109] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 442.463670] ovl_lookup_temp+0x101/0x190 [ 442.467718] ? ovl_read_iter+0x420/0x420 [ 442.471805] ? override_creds+0x195/0x1f0 [ 442.475982] ? __validate_process_creds+0x540/0x540 [ 442.481009] ? smack_inode_copy_up+0x130/0x1b0 [ 442.485589] ovl_create_temp+0x1e/0x60 [ 442.489481] ovl_copy_up_one+0xe16/0x2f10 [ 442.493620] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.499149] ? check_preemption_disabled+0x48/0x280 [ 442.504158] ? ovl_copy_up_inode.part.9+0x5f0/0x5f0 [ 442.509197] ? graph_lock+0x270/0x270 [ 442.513010] ? graph_lock+0x270/0x270 [ 442.516826] ? perf_trace_lock_acquire+0x15b/0x800 [ 442.521762] ? perf_trace_lock_acquire+0x15b/0x800 [ 442.526685] ? find_held_lock+0x36/0x1c0 [ 442.530738] ? find_held_lock+0x36/0x1c0 [ 442.534808] ? dget_parent+0x1a5/0x6a0 [ 442.538700] ? lock_downgrade+0x900/0x900 [ 442.542860] ? check_preemption_disabled+0x48/0x280 [ 442.547901] ovl_copy_up_flags+0x14e/0x1d0 [ 442.552129] ovl_copy_up+0x17/0x1a [ 442.555658] ovl_rename+0x2a0/0x1a20 [ 442.559370] ? lockref_get+0x42/0x50 [ 442.563087] ? ovl_clear_empty+0x6f0/0x6f0 [ 442.567326] ? lock_two_nondirectories+0xdd/0x120 [ 442.572158] ? _down_write_nest_lock+0x130/0x130 [ 442.576910] vfs_rename+0x7fc/0x1a90 [ 442.580635] ? lookup_one_len+0x220/0x220 [ 442.584774] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.590320] ? security_path_rename+0x210/0x300 [ 442.594993] do_renameat2+0xea5/0x1180 [ 442.598892] ? user_path_create+0x40/0x40 [ 442.603049] ? __lock_is_held+0xb5/0x140 [ 442.607106] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 442.612642] ? check_preemption_disabled+0x48/0x280 [ 442.617664] ? __sb_end_write+0xd9/0x110 [ 442.621717] ? fput+0x130/0x1a0 [ 442.625010] ? do_syscall_64+0x9a/0x820 [ 442.628989] ? do_syscall_64+0x9a/0x820 [ 442.632950] ? lockdep_hardirqs_on+0x421/0x5c0 [ 442.637550] ? trace_hardirqs_on+0xbd/0x310 [ 442.641861] ? __ia32_sys_read+0xb0/0xb0 [ 442.645911] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 442.651383] __x64_sys_renameat+0x9a/0x100 [ 442.655611] do_syscall_64+0x1b9/0x820 [ 442.659491] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 442.664847] ? syscall_return_slowpath+0x5e0/0x5e0 [ 442.669764] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 442.674626] ? trace_hardirqs_on_caller+0x310/0x310 [ 442.679632] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 442.684635] ? prepare_exit_to_usermode+0x291/0x3b0 [ 442.689643] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 442.694524] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 442.699699] RIP: 0033:0x457669 [ 442.702878] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 442.721766] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 442.729458] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 442.736712] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 442.743983] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 442.751239] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 442.758498] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 [ 442.771205] kernel msg: ebtables bug: please report to author: Wrong len argument 10:23:39 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000280)='TIPC\x00') sendmsg$TIPC_CMD_DISABLE_BEARER(r0, &(0x7f0000000800)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x2c, r1, 0x20, 0x70bd2c, 0x25dfdbfe, {{}, 0x0, 0x4102, 0x0, {0x10, 0x13, @l2={'eth', 0x3a, 'vlan0\x00'}}}, ["", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x4}, 0x20004040) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) ioctl$KVM_SET_LAPIC(r2, 0x4400ae8f, &(0x7f0000000400)={"0d330572979954377a60287c0a08b78f7d32c27040c5e2cdfdcfae97ea24ea50f66b8dd6f4d483fc16f000818d31fe264f0f056989d408338a48d2251a87d359ceccb581579cd9a3d683c118702adad332e33a74b6e7e64fc5efda9c3bf1c551da27717c5db41304c13f82aed3872c9da1cae924b56b3d0f5ad1b7eadc554933df3818684a065f9c1cfcd031618c98fa46e4b70c0e6d00c714aa4b6c37e7c6828d3c1e02de900ec10accb23b1d4923fe31c9a9e534a8a1000efbfe0a707d09e8f2cbb247d5cc65dbb339928dc152ba44af7bbf6c7a29b2815c82a65d67a8b2248f64b8caa97f219db460c0593adef662b11a70ef9607edd6c08de0e6fcb6d627763b8cac3bee731927181568cff95954e6688f5cad0c38d2a6724900c53cd14c490bb110ba1bbf5f666f9da033ef50c107aaa215a7c70c85fad76e16fa9bd9c9e23111813369ded17c5da26ff2e44f3ee67d00b4dc5994629ba79b6d5ab48fc20d4b9753de400b70f34a894202d8666e9ad7938ab187ce6224f7e43db7dd27ee9c4b421f3c320cb32d585af838927280996df193a7c43a46b56b38c9c444cb746ab7728fc09eaff8e8f6c14a267ca44eba01512693125991b097f4c473b9834bcaf2bc29ea9ac57941fb546db7bf8b13166a1274dafc4afc1762ecbc18cfe9eefceba4f208e2047c27c9deb3c8b3f9c8d708aa7e1877df9da0c37a74f1a78c25d1a99b7e2a3ae61de868107459b0b6f6a1c5153f36214f7aef73f4e072ad26533f6a4418e73f94d9ba91a9eeb9952e38470d390f6c2c05d19fdcd9b180ac4ade5410ace6349e5787d54cc4ece8f16407ff12905fefd8984febc19fc9a6bb6e5c72ecf0984e31910fc2c424a57511430df5d0bcd719c10e0840a1e17467ec285dd927ad875f3583e4532479726eb50377fea2b5cbf3456697fb007d747f0ceb404c4eee4830816710c97683a9f49f17fe57a42b2876a7ee75e8c292fd3cebce7f752b7daedba6161bd13345c84ca0562515b417729527a91f4bf8e631c300f26b4c2fd35d7a399867f9e7944e48b1ca30d3b4f8b25f08aa19267236159a8e368705f60b890f2638e96a53ff98bd14a6bdee7b8fcf27cc3af519e77280f26299a9c2540ceb0c9bfd03b48101b6332cf2d5cffed6be4299c1f05c61ee11966bb9be9c00d7e28e8dc9ba325f36148f770efcf8c50043ed22741815b633c0a2bf19db438bbecc4d63f2bf67012a6ec2ff1054c402489da4860337810cc5eae2465e8c18a7e076f2d8207478de421563b7ae30087c3d554e6bba7ebbc13b740e487fe6a80f24e835d216e3f49d6f7059ce4ad2be4d03cba2c4e403b865e4dd5d83612549eff80a698218e1bf710595d5a359695608b62f36a9093b13b570fca5738ef37158d454a5a1dad778a5f11ec336808bd83dc37b21b47f4dd331b15892142634"}) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) futimesat(r3, &(0x7f0000000100)='./file0\x00', &(0x7f0000000200)={{r4, r5/1000+30000}, {r6, r7/1000+10000}}) r8 = getuid() setsockopt$inet_IP_XFRM_POLICY(r3, 0x0, 0x11, &(0x7f0000000840)={{{@in6=@mcast1, @in=@loopback, 0x4e22, 0xca, 0x4e22, 0x7, 0x2, 0xa0, 0x80, 0x0, 0x0, r8}, {0x4, 0x1, 0x1, 0x45, 0x6, 0x4, 0xdad4, 0xdf}, {0x0, 0x101, 0x9, 0xffff}, 0x10001, 0x0, 0x0, 0x1, 0x1, 0x2}, {{@in=@multicast1, 0x4d3, 0xff}, 0x2, @in6=@mcast1, 0x3505, 0x6, 0x3, 0x1000, 0x4, 0x10000, 0x1000}}, 0xe8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:39 executing program 1 (fault-call:9 fault-nth:42): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:39 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfd\no'}}]}}) 10:23:39 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x1000000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:39 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x4000000000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 442.917094] 9pnet: Insufficient options for proto=fd [ 442.955937] 9pnet: Insufficient options for proto=fd [ 442.967682] FAULT_INJECTION: forcing a failure. [ 442.967682] name failslab, interval 1, probability 0, space 0, times 0 [ 442.984809] CPU: 1 PID: 17150 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 442.992187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.001540] Call Trace: [ 443.004162] dump_stack+0x1d3/0x2c6 [ 443.007807] ? dump_stack_print_info.cold.1+0x20/0x20 [ 443.013013] ? mark_held_locks+0x130/0x130 [ 443.017256] ? check_preemption_disabled+0x48/0x280 [ 443.022276] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.027837] should_fail.cold.4+0xa/0x17 [ 443.031920] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 443.037026] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.042588] ? check_preemption_disabled+0x48/0x280 [ 443.047622] ? debug_smp_processor_id+0x1c/0x20 [ 443.052301] ? perf_trace_lock_acquire+0x15b/0x800 [ 443.057237] ? graph_lock+0x270/0x270 [ 443.061043] ? perf_trace_lock+0x7a0/0x7a0 [ 443.065297] ? __lock_is_held+0xb5/0x140 [ 443.069379] ? lockdep_init_map+0x9/0x10 [ 443.073452] ? ___might_sleep+0x1ed/0x300 [ 443.077602] ? find_held_lock+0x36/0x1c0 [ 443.081679] ? arch_local_save_flags+0x40/0x40 [ 443.086281] __should_failslab+0x124/0x180 [ 443.090523] should_failslab+0x9/0x14 [ 443.094350] __kmalloc_track_caller+0x2d1/0x760 [ 443.099050] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 443.104333] ? rcu_softirq_qs+0x20/0x20 [ 443.108321] ? smack_inode_init_security+0x32e/0x630 [ 443.113432] kstrdup+0x39/0x70 [ 443.116634] smack_inode_init_security+0x32e/0x630 [ 443.121566] ? lockdep_annotate_inode_mutex_key+0x5b/0x70 [ 443.127118] security_inode_init_security+0x15d/0x3d0 [ 443.132320] ? shmem_tmpfile+0x110/0x110 [ 443.136389] ? unregister_lsm_notifier+0x20/0x20 [ 443.141165] ? make_kprojid+0x30/0x30 [ 443.144988] shmem_symlink+0x13c/0x960 [ 443.148884] ? shmem_file_read_iter+0x1010/0x1010 [ 443.153735] ? smack_file_ioctl+0x3c0/0x3c0 [ 443.158065] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 443.163608] ? security_capable+0x99/0xc0 [ 443.167763] ? privileged_wrt_inode_uidgid+0x68/0xd0 [ 443.172877] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.178419] ? security_inode_permission+0xd2/0x100 [ 443.183447] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.189005] vfs_symlink+0x37a/0x5d0 [ 443.192730] ovl_create_real+0x39c/0x410 [ 443.196801] ovl_create_temp+0x48/0x60 [ 443.200692] ovl_copy_up_one+0xe16/0x2f10 [ 443.204859] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.210401] ? check_preemption_disabled+0x48/0x280 [ 443.215455] ? ovl_copy_up_inode.part.9+0x5f0/0x5f0 [ 443.220518] ? graph_lock+0x270/0x270 [ 443.224347] ? graph_lock+0x270/0x270 [ 443.228164] ? perf_trace_lock_acquire+0x15b/0x800 [ 443.233109] ? perf_trace_lock_acquire+0x15b/0x800 [ 443.238072] ? find_held_lock+0x36/0x1c0 [ 443.242139] ? find_held_lock+0x36/0x1c0 [ 443.246205] ? dget_parent+0x1a5/0x6a0 [ 443.250104] ? lock_downgrade+0x900/0x900 [ 443.254248] ? check_preemption_disabled+0x48/0x280 [ 443.259306] ovl_copy_up_flags+0x14e/0x1d0 [ 443.263541] ovl_copy_up+0x17/0x1a [ 443.267083] ovl_rename+0x2a0/0x1a20 [ 443.270813] ? lockref_get+0x42/0x50 [ 443.274538] ? ovl_clear_empty+0x6f0/0x6f0 [ 443.278770] ? lock_two_nondirectories+0xdd/0x120 [ 443.283617] ? _down_write_nest_lock+0x130/0x130 [ 443.288383] vfs_rename+0x7fc/0x1a90 [ 443.292103] ? lookup_one_len+0x220/0x220 [ 443.296433] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.302019] ? security_path_rename+0x210/0x300 [ 443.306711] do_renameat2+0xea5/0x1180 [ 443.310611] ? user_path_create+0x40/0x40 [ 443.314762] ? __lock_is_held+0xb5/0x140 [ 443.318833] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.324375] ? check_preemption_disabled+0x48/0x280 [ 443.329399] ? __sb_end_write+0xd9/0x110 [ 443.333485] ? fput+0x130/0x1a0 [ 443.336771] ? do_syscall_64+0x9a/0x820 [ 443.340745] ? do_syscall_64+0x9a/0x820 [ 443.344737] ? lockdep_hardirqs_on+0x421/0x5c0 [ 443.349338] ? trace_hardirqs_on+0xbd/0x310 [ 443.353662] ? __ia32_sys_read+0xb0/0xb0 [ 443.357740] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 443.363206] __x64_sys_renameat+0x9a/0x100 [ 443.367453] do_syscall_64+0x1b9/0x820 [ 443.371349] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 443.376725] ? syscall_return_slowpath+0x5e0/0x5e0 [ 443.381654] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 443.386501] ? trace_hardirqs_on_caller+0x310/0x310 [ 443.391525] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 443.396547] ? prepare_exit_to_usermode+0x291/0x3b0 [ 443.401573] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 443.406428] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 443.411617] RIP: 0033:0x457669 [ 443.414816] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 443.434238] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 443.441963] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 443.449257] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 443.456522] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 443.463798] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 443.471061] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:40 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0xffff) prctl$PR_SVE_SET_VL(0x32, 0x1bd5d) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) 10:23:40 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdn\n'}}]}}) 10:23:40 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x100000000000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:40 executing program 1 (fault-call:9 fault-nth:43): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 443.602534] 9pnet: Insufficient options for proto=fd 10:23:40 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdn%'}}]}}) [ 443.730654] FAULT_INJECTION: forcing a failure. [ 443.730654] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 443.742498] CPU: 0 PID: 17171 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 443.749863] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 443.759244] Call Trace: [ 443.761868] dump_stack+0x1d3/0x2c6 [ 443.765545] ? dump_stack_print_info.cold.1+0x20/0x20 [ 443.770772] ? perf_trace_lock_acquire+0x15b/0x800 [ 443.775722] should_fail.cold.4+0xa/0x17 [ 443.779847] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 443.785009] ? check_preemption_disabled+0x48/0x280 [ 443.790076] ? debug_smp_processor_id+0x1c/0x20 [ 443.794778] ? perf_trace_lock_acquire+0x15b/0x800 [ 443.799734] ? perf_trace_lock+0x7a0/0x7a0 [ 443.799755] ? find_held_lock+0x36/0x1c0 [ 443.799775] ? graph_lock+0x270/0x270 [ 443.799817] ? get_mem_cgroup_from_mm+0x1e9/0x440 [ 443.816744] ? lock_downgrade+0x900/0x900 [ 443.820905] ? check_preemption_disabled+0x48/0x280 [ 443.825958] ? rcu_read_unlock+0x16/0x60 [ 443.829596] 9pnet: Insufficient options for proto=fd [ 443.830070] __alloc_pages_nodemask+0x366/0xea0 [ 443.839850] ? rcu_read_unlock_special+0x1d0/0x1d0 [ 443.844816] ? kasan_check_read+0x11/0x20 [ 443.849000] ? __alloc_pages_slowpath+0x2df0/0x2df0 [ 443.854031] ? __lock_is_held+0xb5/0x140 [ 443.858163] ? ___might_sleep+0x1ed/0x300 [ 443.862347] ? trace_hardirqs_off+0xb8/0x310 [ 443.866788] cache_grow_begin+0x91/0x8c0 [ 443.867159] 9pnet: Insufficient options for proto=fd [ 443.870881] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 443.870901] ? check_preemption_disabled+0x48/0x280 [ 443.870925] kmem_cache_alloc+0x665/0x730 [ 443.870953] ? shmem_destroy_callback+0xc0/0xc0 [ 443.870988] shmem_alloc_inode+0x1b/0x40 [ 443.899484] alloc_inode+0x63/0x190 [ 443.903135] new_inode_pseudo+0x71/0x1a0 [ 443.907232] ? prune_icache_sb+0x1c0/0x1c0 [ 443.911498] new_inode+0x1c/0x40 [ 443.914885] shmem_get_inode+0xf1/0x920 [ 443.918881] ? shmem_encode_fh+0x340/0x340 [ 443.923140] ? smack_privileged+0xd0/0xd0 [ 443.927302] ? vfs_unlink+0x510/0x510 [ 443.931126] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 443.936162] ? map_id_up+0x193/0x3d0 [ 443.939366] 9pnet: Insufficient options for proto=fd [ 443.939893] ? make_kprojid+0x30/0x30 [ 443.939919] shmem_symlink+0x112/0x960 [ 443.939938] ? shmem_file_read_iter+0x1010/0x1010 [ 443.939960] ? smack_file_ioctl+0x3c0/0x3c0 [ 443.961930] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 443.967485] ? security_capable+0x99/0xc0 [ 443.967508] ? privileged_wrt_inode_uidgid+0x68/0xd0 10:23:40 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x1000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:40 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}, 0x38}]}}) [ 443.967535] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.967550] ? security_inode_permission+0xd2/0x100 [ 443.967570] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 443.992899] vfs_symlink+0x37a/0x5d0 [ 443.996653] ovl_create_real+0x39c/0x410 [ 444.000734] ovl_create_temp+0x48/0x60 [ 444.004639] ovl_copy_up_one+0xe16/0x2f10 [ 444.008806] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.014367] ? check_preemption_disabled+0x48/0x280 [ 444.019404] ? ovl_copy_up_inode.part.9+0x5f0/0x5f0 [ 444.024450] ? graph_lock+0x270/0x270 [ 444.028261] ? graph_lock+0x270/0x270 [ 444.032079] ? perf_trace_lock_acquire+0x15b/0x800 [ 444.037036] ? perf_trace_lock_acquire+0x15b/0x800 [ 444.042007] ? find_held_lock+0x36/0x1c0 [ 444.046134] ? find_held_lock+0x36/0x1c0 [ 444.050218] ? dget_parent+0x1a5/0x6a0 [ 444.054136] ? lock_downgrade+0x900/0x900 [ 444.058320] ? check_preemption_disabled+0x48/0x280 [ 444.063445] ovl_copy_up_flags+0x14e/0x1d0 [ 444.067718] ovl_copy_up+0x17/0x1a [ 444.071287] ovl_rename+0x2a0/0x1a20 [ 444.075017] ? lockref_get+0x42/0x50 [ 444.078759] ? ovl_clear_empty+0x6f0/0x6f0 [ 444.083069] ? lock_two_nondirectories+0xdd/0x120 [ 444.087930] ? _down_write_nest_lock+0x130/0x130 [ 444.092728] vfs_rename+0x7fc/0x1a90 [ 444.096482] ? lookup_one_len+0x220/0x220 [ 444.100653] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.106208] ? security_path_rename+0x210/0x300 [ 444.110898] do_renameat2+0xea5/0x1180 [ 444.114835] ? user_path_create+0x40/0x40 [ 444.119018] ? __lock_is_held+0xb5/0x140 [ 444.123109] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.128663] ? check_preemption_disabled+0x48/0x280 [ 444.133692] ? __sb_end_write+0xd9/0x110 [ 444.137768] ? fput+0x130/0x1a0 [ 444.141043] ? do_syscall_64+0x9a/0x820 [ 444.145023] ? do_syscall_64+0x9a/0x820 [ 444.149031] ? lockdep_hardirqs_on+0x421/0x5c0 [ 444.153621] ? trace_hardirqs_on+0xbd/0x310 [ 444.157953] ? __ia32_sys_read+0xb0/0xb0 [ 444.162065] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 444.167506] __x64_sys_renameat+0x9a/0x100 [ 444.171731] do_syscall_64+0x1b9/0x820 [ 444.175631] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 444.181002] ? syscall_return_slowpath+0x5e0/0x5e0 [ 444.185928] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 444.190768] ? trace_hardirqs_on_caller+0x310/0x310 [ 444.195788] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 444.200808] ? prepare_exit_to_usermode+0x291/0x3b0 [ 444.205861] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 444.210737] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.215944] RIP: 0033:0x457669 [ 444.219137] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 444.238030] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 444.245738] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 444.253005] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 444.260275] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 444.267550] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 444.274805] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:41 executing program 4: mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r0, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) prctl$PR_SET_THP_DISABLE(0x29, 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:41 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0xf6ffffff00000000}}) 10:23:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x4e030000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:41 executing program 1 (fault-call:9 fault-nth:44): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 444.437679] 9pnet: Insufficient options for proto=fd 10:23:41 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x700000000000000}}) [ 444.465512] FAULT_INJECTION: forcing a failure. [ 444.465512] name failslab, interval 1, probability 0, space 0, times 0 [ 444.507495] CPU: 1 PID: 17202 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 444.514886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 444.524253] Call Trace: [ 444.526861] dump_stack+0x1d3/0x2c6 [ 444.530519] ? dump_stack_print_info.cold.1+0x20/0x20 [ 444.535739] should_fail.cold.4+0xa/0x17 [ 444.539834] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 444.544961] ? print_usage_bug+0xc0/0xc0 [ 444.549071] ? ovl_create_real+0x39c/0x410 [ 444.553328] ? ovl_create_temp+0x48/0x60 [ 444.557408] ? ovl_copy_up_one+0xe16/0x2f10 [ 444.561759] ? ovl_copy_up_flags+0x14e/0x1d0 [ 444.566179] ? do_renameat2+0xea5/0x1180 [ 444.570256] ? __x64_sys_renameat+0x9a/0x100 [ 444.574675] ? do_syscall_64+0x1b9/0x820 [ 444.578749] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.584122] ? do_raw_spin_unlock+0xa7/0x330 [ 444.588550] ? graph_lock+0x270/0x270 [ 444.592366] ? kasan_check_read+0x11/0x20 [ 444.594078] 9pnet: Insufficient options for proto=fd [ 444.596547] ? find_held_lock+0x36/0x1c0 [ 444.596570] ? __lock_is_held+0xb5/0x140 [ 444.596599] ? ___might_sleep+0x1ed/0x300 [ 444.596615] ? arch_local_save_flags+0x40/0x40 [ 444.596644] __should_failslab+0x124/0x180 [ 444.596664] should_failslab+0x9/0x14 [ 444.618577] __kmalloc_track_caller+0x2d1/0x760 [ 444.618601] ? make_kprojid+0x30/0x30 [ 444.618614] ? shmem_symlink+0x1b5/0x960 [ 444.618632] kmemdup+0x24/0x50 [ 444.618648] shmem_symlink+0x1b5/0x960 [ 444.618667] ? shmem_file_read_iter+0x1010/0x1010 [ 444.618683] ? smack_file_ioctl+0x3c0/0x3c0 [ 444.618703] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 444.626735] ? security_capable+0x99/0xc0 [ 444.626759] ? privileged_wrt_inode_uidgid+0x68/0xd0 [ 444.626786] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.626803] ? security_inode_permission+0xd2/0x100 [ 444.626824] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.626852] vfs_symlink+0x37a/0x5d0 [ 444.690113] ovl_create_real+0x39c/0x410 [ 444.694211] ovl_create_temp+0x48/0x60 [ 444.698105] ovl_copy_up_one+0xe16/0x2f10 [ 444.702240] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.707766] ? check_preemption_disabled+0x48/0x280 [ 444.712781] ? ovl_copy_up_inode.part.9+0x5f0/0x5f0 [ 444.717797] ? graph_lock+0x270/0x270 [ 444.721594] ? graph_lock+0x270/0x270 [ 444.725390] ? perf_trace_lock_acquire+0x15b/0x800 [ 444.730305] ? perf_trace_lock_acquire+0x15b/0x800 [ 444.735225] ? find_held_lock+0x36/0x1c0 [ 444.739333] ? find_held_lock+0x36/0x1c0 [ 444.743416] ? dget_parent+0x1a5/0x6a0 [ 444.747332] ? lock_downgrade+0x900/0x900 [ 444.751498] ? check_preemption_disabled+0x48/0x280 [ 444.756560] ovl_copy_up_flags+0x14e/0x1d0 [ 444.760791] ovl_copy_up+0x17/0x1a [ 444.764321] ovl_rename+0x2a0/0x1a20 [ 444.768026] ? lockref_get+0x42/0x50 [ 444.771756] ? ovl_clear_empty+0x6f0/0x6f0 [ 444.775986] ? lock_two_nondirectories+0xdd/0x120 [ 444.780817] ? _down_write_nest_lock+0x130/0x130 [ 444.785577] vfs_rename+0x7fc/0x1a90 [ 444.789283] ? lookup_one_len+0x220/0x220 [ 444.793421] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.798976] ? security_path_rename+0x210/0x300 [ 444.803639] do_renameat2+0xea5/0x1180 [ 444.807539] ? user_path_create+0x40/0x40 [ 444.811692] ? __lock_is_held+0xb5/0x140 [ 444.815768] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 444.821288] ? check_preemption_disabled+0x48/0x280 [ 444.826294] ? __sb_end_write+0xd9/0x110 [ 444.830340] ? fput+0x130/0x1a0 [ 444.833605] ? do_syscall_64+0x9a/0x820 [ 444.837576] ? do_syscall_64+0x9a/0x820 [ 444.841557] ? lockdep_hardirqs_on+0x421/0x5c0 [ 444.846140] ? trace_hardirqs_on+0xbd/0x310 [ 444.850443] ? __ia32_sys_read+0xb0/0xb0 [ 444.854529] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 444.860026] __x64_sys_renameat+0x9a/0x100 [ 444.864258] do_syscall_64+0x1b9/0x820 [ 444.868150] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 444.873536] ? syscall_return_slowpath+0x5e0/0x5e0 [ 444.878455] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 444.883290] ? trace_hardirqs_on_caller+0x310/0x310 [ 444.888296] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 444.893318] ? prepare_exit_to_usermode+0x291/0x3b0 [ 444.898379] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 444.903218] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 444.908391] RIP: 0033:0x457669 [ 444.911571] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 444.930461] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 444.938169] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 444.945425] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 10:23:41 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0xffff) prctl$PR_SVE_SET_VL(0x32, 0x1bd5d) 10:23:41 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0xf6ffffff}}) 10:23:41 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x400000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 444.952675] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 444.959924] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 444.967191] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:41 executing program 1 (fault-call:9 fault-nth:45): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:41 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x40000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:41 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x3f00000000000000}}) [ 445.073698] 9pnet: Insufficient options for proto=fd [ 445.093146] 9pnet: Insufficient options for proto=fd [ 445.216919] FAULT_INJECTION: forcing a failure. [ 445.216919] name failslab, interval 1, probability 0, space 0, times 0 [ 445.237942] CPU: 0 PID: 17237 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 445.245339] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 445.254692] Call Trace: [ 445.257343] dump_stack+0x1d3/0x2c6 [ 445.261029] ? dump_stack_print_info.cold.1+0x20/0x20 [ 445.266251] should_fail.cold.4+0xa/0x17 [ 445.270328] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 445.275440] ? save_stack+0xa9/0xd0 [ 445.279096] ? kstrdup+0x39/0x70 [ 445.282476] ? smack_inode_init_security+0x32e/0x630 [ 445.287584] ? security_inode_init_security+0x15d/0x3d0 [ 445.292964] ? shmem_symlink+0x13c/0x960 [ 445.297541] ? vfs_symlink+0x37a/0x5d0 [ 445.301446] ? ovl_create_real+0x39c/0x410 [ 445.305687] ? graph_lock+0x270/0x270 [ 445.309493] ? ovl_copy_up+0x17/0x1a [ 445.313225] ? ovl_rename+0x2a0/0x1a20 [ 445.317119] ? vfs_rename+0x7fc/0x1a90 [ 445.321035] ? do_renameat2+0xea5/0x1180 [ 445.325123] ? __x64_sys_renameat+0x9a/0x100 [ 445.329557] ? do_syscall_64+0x1b9/0x820 [ 445.333659] ? find_held_lock+0x36/0x1c0 [ 445.337744] ? __lock_is_held+0xb5/0x140 [ 445.341832] ? ___might_sleep+0x1ed/0x300 [ 445.346009] ? arch_local_save_flags+0x40/0x40 [ 445.350615] ? __lock_is_held+0xb5/0x140 [ 445.354706] __should_failslab+0x124/0x180 [ 445.358958] should_failslab+0x9/0x14 [ 445.362787] __kmalloc+0x2e0/0x770 [ 445.366338] ? rcu_softirq_qs+0x20/0x20 [ 445.370331] ? simple_xattr_alloc+0x3e/0xa0 [ 445.374673] simple_xattr_alloc+0x3e/0xa0 [ 445.378849] shmem_initxattrs+0xfe/0x1e0 [ 445.382928] security_inode_init_security+0x1d1/0x3d0 [ 445.388109] ? shmem_tmpfile+0x110/0x110 [ 445.392159] ? unregister_lsm_notifier+0x20/0x20 [ 445.396941] ? make_kprojid+0x30/0x30 [ 445.400764] shmem_symlink+0x13c/0x960 [ 445.404682] ? shmem_file_read_iter+0x1010/0x1010 [ 445.409529] ? smack_file_ioctl+0x3c0/0x3c0 [ 445.413854] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 445.419392] ? security_capable+0x99/0xc0 [ 445.423560] ? privileged_wrt_inode_uidgid+0x68/0xd0 [ 445.428779] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.434317] ? security_inode_permission+0xd2/0x100 [ 445.439321] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.444846] vfs_symlink+0x37a/0x5d0 [ 445.448565] ovl_create_real+0x39c/0x410 [ 445.452629] ovl_create_temp+0x48/0x60 [ 445.456518] ovl_copy_up_one+0xe16/0x2f10 [ 445.460666] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.466190] ? check_preemption_disabled+0x48/0x280 [ 445.471210] ? ovl_copy_up_inode.part.9+0x5f0/0x5f0 [ 445.476240] ? graph_lock+0x270/0x270 [ 445.480032] ? graph_lock+0x270/0x270 [ 445.483841] ? perf_trace_lock_acquire+0x15b/0x800 [ 445.488778] ? perf_trace_lock_acquire+0x15b/0x800 [ 445.493709] ? find_held_lock+0x36/0x1c0 [ 445.497773] ? find_held_lock+0x36/0x1c0 [ 445.501841] ? dget_parent+0x1a5/0x6a0 [ 445.505779] ? lock_downgrade+0x900/0x900 [ 445.509935] ? check_preemption_disabled+0x48/0x280 [ 445.514964] ovl_copy_up_flags+0x14e/0x1d0 [ 445.519203] ovl_copy_up+0x17/0x1a [ 445.522775] ovl_rename+0x2a0/0x1a20 [ 445.526519] ? lockref_get+0x42/0x50 [ 445.530260] ? ovl_clear_empty+0x6f0/0x6f0 [ 445.534506] ? lock_two_nondirectories+0xdd/0x120 [ 445.539360] ? _down_write_nest_lock+0x130/0x130 [ 445.544137] vfs_rename+0x7fc/0x1a90 [ 445.547887] ? lookup_one_len+0x220/0x220 [ 445.552085] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.557630] ? security_path_rename+0x210/0x300 [ 445.562317] do_renameat2+0xea5/0x1180 [ 445.566229] ? user_path_create+0x40/0x40 [ 445.570391] ? __lock_is_held+0xb5/0x140 [ 445.574472] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 445.580048] ? check_preemption_disabled+0x48/0x280 [ 445.580203] 9pnet: Insufficient options for proto=fd [ 445.585081] ? __sb_end_write+0xd9/0x110 [ 445.585102] ? fput+0x130/0x1a0 [ 445.585118] ? do_syscall_64+0x9a/0x820 [ 445.585133] ? do_syscall_64+0x9a/0x820 [ 445.585151] ? lockdep_hardirqs_on+0x421/0x5c0 [ 445.610089] ? trace_hardirqs_on+0xbd/0x310 [ 445.614429] ? __ia32_sys_read+0xb0/0xb0 [ 445.618508] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 445.623948] __x64_sys_renameat+0x9a/0x100 [ 445.628214] do_syscall_64+0x1b9/0x820 [ 445.632106] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 445.637457] ? syscall_return_slowpath+0x5e0/0x5e0 [ 445.642387] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 445.647225] ? trace_hardirqs_on_caller+0x310/0x310 [ 445.652250] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 445.657268] ? prepare_exit_to_usermode+0x291/0x3b0 [ 445.662283] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 445.667150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 445.672344] RIP: 0033:0x457669 [ 445.675530] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 445.694416] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 445.702128] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 445.709383] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 10:23:42 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x6000000}}) 10:23:42 executing program 4: mkdir(&(0x7f0000000200)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x1, 0x0) ioctl$sock_inet_SIOCSIFBRDADDR(r3, 0x891a, &(0x7f0000000180)={'ifb0\x00', {0x2, 0x4e24, @loopback}}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNDETACHFILTER(r1, 0x401054d6, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r2, 0xc0bc5310, &(0x7f0000000240)) ioctl$sock_netdev_private(r0, 0x89ff, &(0x7f00000001c0)="45da6cb2dc2086661f3ad1ab8ec841f8509567be0846fe4151e37e4e930ab605bc77b38d8903cf0329153c1cf0bf084d8ad8006b") vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x500000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 445.716647] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 445.723913] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 445.731167] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:42 executing program 1 (fault-call:9 fault-nth:46): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:42 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x700}}) 10:23:42 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x1000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 445.844280] 9pnet: Insufficient options for proto=fd 10:23:42 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) listen(r1, 0xffff) 10:23:42 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x2000000}}) [ 446.024651] 9pnet: Insufficient options for proto=fd [ 446.031031] FAULT_INJECTION: forcing a failure. [ 446.031031] name failslab, interval 1, probability 0, space 0, times 0 [ 446.065527] CPU: 1 PID: 17276 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 446.072907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 446.082264] Call Trace: [ 446.084864] dump_stack+0x1d3/0x2c6 [ 446.088522] ? dump_stack_print_info.cold.1+0x20/0x20 [ 446.093749] should_fail.cold.4+0xa/0x17 [ 446.097831] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 446.102947] ? save_stack+0xa9/0xd0 [ 446.106595] ? save_stack+0x43/0xd0 [ 446.110238] ? shmem_initxattrs+0xfe/0x1e0 [ 446.114490] ? security_inode_init_security+0x1d1/0x3d0 [ 446.119878] ? shmem_symlink+0x13c/0x960 [ 446.123979] ? vfs_symlink+0x37a/0x5d0 [ 446.127887] ? ovl_create_real+0x39c/0x410 [ 446.132132] ? ovl_create_temp+0x48/0x60 [ 446.136213] ? graph_lock+0x270/0x270 [ 446.140156] ? ovl_rename+0x2a0/0x1a20 [ 446.141830] 9pnet: Insufficient options for proto=fd [ 446.144068] ? vfs_rename+0x7fc/0x1a90 [ 446.144084] ? do_renameat2+0xea5/0x1180 [ 446.144100] ? __x64_sys_renameat+0x9a/0x100 [ 446.144116] ? do_syscall_64+0x1b9/0x820 10:23:42 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x4}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 446.144135] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 446.144161] ? find_held_lock+0x36/0x1c0 [ 446.144185] ? __lock_is_held+0xb5/0x140 [ 446.144214] ? ___might_sleep+0x1ed/0x300 [ 446.144232] ? arch_local_save_flags+0x40/0x40 [ 446.144261] __should_failslab+0x124/0x180 [ 446.179213] should_failslab+0x9/0x14 [ 446.179228] __kmalloc+0x2e0/0x770 [ 446.179246] ? memcpy+0x45/0x50 [ 446.179268] ? shmem_initxattrs+0x133/0x1e0 [ 446.187995] shmem_initxattrs+0x133/0x1e0 10:23:42 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0xedc0}}) [ 446.188017] security_inode_init_security+0x1d1/0x3d0 [ 446.188035] ? shmem_tmpfile+0x110/0x110 [ 446.188052] ? unregister_lsm_notifier+0x20/0x20 [ 446.188077] ? make_kprojid+0x30/0x30 [ 446.188099] shmem_symlink+0x13c/0x960 [ 446.233073] ? shmem_file_read_iter+0x1010/0x1010 [ 446.237932] ? smack_file_ioctl+0x3c0/0x3c0 [ 446.242279] ? __sanitizer_cov_trace_const_cmp4+0x19/0x20 [ 446.247836] ? security_capable+0x99/0xc0 [ 446.247860] ? privileged_wrt_inode_uidgid+0x68/0xd0 [ 446.247887] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.247903] ? security_inode_permission+0xd2/0x100 [ 446.247924] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.247946] vfs_symlink+0x37a/0x5d0 [ 446.247978] ovl_create_real+0x39c/0x410 [ 446.257230] ovl_create_temp+0x48/0x60 [ 446.257248] ovl_copy_up_one+0xe16/0x2f10 [ 446.257266] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.257285] ? check_preemption_disabled+0x48/0x280 [ 446.257310] ? ovl_copy_up_inode.part.9+0x5f0/0x5f0 [ 446.257346] ? graph_lock+0x270/0x270 [ 446.257369] ? graph_lock+0x270/0x270 10:23:42 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x600}}) [ 446.257385] ? perf_trace_lock_acquire+0x15b/0x800 [ 446.257401] ? perf_trace_lock_acquire+0x15b/0x800 [ 446.257442] ? find_held_lock+0x36/0x1c0 [ 446.312780] 9pnet: Insufficient options for proto=fd [ 446.317375] ? find_held_lock+0x36/0x1c0 [ 446.317403] ? dget_parent+0x1a5/0x6a0 [ 446.317419] ? lock_downgrade+0x900/0x900 [ 446.317436] ? check_preemption_disabled+0x48/0x280 [ 446.317513] ovl_copy_up_flags+0x14e/0x1d0 [ 446.338361] 9pnet: Insufficient options for proto=fd [ 446.339513] ovl_copy_up+0x17/0x1a [ 446.339530] ovl_rename+0x2a0/0x1a20 [ 446.339547] ? lockref_get+0x42/0x50 [ 446.339578] ? ovl_clear_empty+0x6f0/0x6f0 [ 446.339593] ? lock_two_nondirectories+0xdd/0x120 [ 446.339612] ? _down_write_nest_lock+0x130/0x130 [ 446.382993] vfs_rename+0x7fc/0x1a90 [ 446.386738] ? lookup_one_len+0x220/0x220 [ 446.390923] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.393430] 9pnet: Insufficient options for proto=fd [ 446.396488] ? security_path_rename+0x210/0x300 [ 446.396512] do_renameat2+0xea5/0x1180 [ 446.396550] ? user_path_create+0x40/0x40 10:23:43 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x3}}) [ 446.396571] ? __lock_is_held+0xb5/0x140 [ 446.396597] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 446.396614] ? check_preemption_disabled+0x48/0x280 [ 446.396638] ? __sb_end_write+0xd9/0x110 [ 446.433170] ? fput+0x130/0x1a0 [ 446.436496] ? do_syscall_64+0x9a/0x820 [ 446.440485] ? do_syscall_64+0x9a/0x820 [ 446.444491] ? lockdep_hardirqs_on+0x421/0x5c0 [ 446.449102] ? trace_hardirqs_on+0xbd/0x310 [ 446.453434] ? __ia32_sys_read+0xb0/0xb0 [ 446.457522] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 446.463018] __x64_sys_renameat+0x9a/0x100 [ 446.467266] do_syscall_64+0x1b9/0x820 [ 446.471168] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 446.476541] ? syscall_return_slowpath+0x5e0/0x5e0 [ 446.481513] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 446.486402] ? trace_hardirqs_on_caller+0x310/0x310 [ 446.491424] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 446.496450] ? prepare_exit_to_usermode+0x291/0x3b0 [ 446.501533] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 446.506424] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 446.511614] RIP: 0033:0x457669 [ 446.514815] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 446.533737] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000108 [ 446.541452] RAX: ffffffffffffffda RBX: 00007fd581f9ac90 RCX: 0000000000457669 [ 446.548738] RDX: 0000000000000004 RSI: 0000000020000240 RDI: 0000000000000004 [ 446.556052] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 446.563324] R10: 00000000200007c0 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 446.570597] R13: 00000000004c3bf2 R14: 00000000004d6888 R15: 0000000000000005 10:23:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x4e03}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:43 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x300}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:43 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = getuid() ioctl$TUNSETOWNER(r1, 0x400454cc, r2) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000100)={'bpq0\x00'}) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) r3 = add_key$user(&(0x7f00000001c0)='user\x00', &(0x7f0000000200)={'syz', 0x0}, &(0x7f0000000240)="ea843766f6634fabbdc100a16354f79fcd91c3ae52819bf1843436e6727760e8dc7125184ce2ee23ed9e90a4716bf8cd7bd8f4d6f097d39bd48a3600aecd573f35bac7991de59c66b9174dd7932b2e27000533a24e9832e5fe7f95407367a5df86e3f6356e01201eca966225628eb305d73089f4ae233bd7b15122", 0x7b, 0xfffffffffffffffc) r4 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$negate(0xd, r3, 0x1, r4) 10:23:43 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:43 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 10:23:43 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0xffffff8d}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:43 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000700)={'team0\x00', 0x0}) connect(r0, &(0x7f0000000740)=@xdp={0x2c, 0x6, r1, 0x1}, 0x80) syz_mount_image$xfs(&(0x7f00000000c0)='xfs\x00', &(0x7f0000000280)='.//ile0\x00', 0x3f, 0x5, &(0x7f0000000600)=[{&(0x7f00000002c0)="55779a105a2bf0baa04631575f947010551f18e70e0d9f5bd0ef0e739dcf9b81a1", 0x21, 0x28}, {&(0x7f0000000340)="6f4c6be80636e6e78a4bcd9ddc123e7e957fd456a76e10b6dc4dcc51e66ebc48dbbe89031145a4823b0f34b3d6dd75475c8ea049b2a99a120c32fae3c60622841ea0afa61e7f80237d1a7295832edb43ce78d73a707083df1655545114e43cff5508caa1", 0x64, 0x3}, {&(0x7f00000003c0)="1b9a1ed10a8fd071fe2ca5a0e4377f90dfb5a68ffdfe56a19abaad561156b9ad3b51ac24b7b2773d1c0338593b35b09951c1f9af9b66ef1601c1e689cbad0d88fe7a979868bd6cb533dfea23753207c5513ffcff081a049b5a1f449dc22c61c6e82e870404512da3548e36b70e39a80f9c5c94797aa01f9cfcb02de5bd12b08892684af28a6fe38c8bd4783e6461634b5287930cd9215a2ae6453a85ef48b62dc3fbdda6bc18a9e0876e40290b26f12d14dfe62537e62a1d0590906d19a420adb41488199817af71d8155b1a8ad29482a83dfd7bfb50fff5bf60d3a326e889b008df424d3562884e690417590230b887b14f", 0xf2, 0x40}, {&(0x7f00000004c0)="986cbf60af594d0669e13d8a86d53a774a77931cddced22e2fed6605a715543584c85dfa7285d46ca33b978d9d8b2180d398a92435329fdad611871af8f2766832a6118ea5abee0b94e96c5e23a654c95e0a1c421e49d82c967c1aaa432d3b685b73a69b5ab5e385bf8055678266a927f8d33d8bf759037896901de525ea0d5da9e71205c5fcbe9ec70b247f2c8416f98d89541d14a7412a69af1d9e03d4edfc91c9d274d9f660c07e92c66c5945ecbf6fb95e6301555a186962ac5ffc11152ff6e447727735590640ae", 0xca, 0xfff}, {&(0x7f00000005c0)="fe4c9d6eb4cf4aef7744e2e96b7b3372e0a222040dec8a6eeece91400160cf422bd2a2c9c3a6bd82ce71", 0x2a, 0x9}], 0x84000, &(0x7f0000000800)=ANY=[@ANYBLOB="62736467726f7570732c736d61636b66736465663d76626f786e657430657468316b6579726969785f61636c5f6163636573732c2d6d643573756d70707030766d6e6574312c6d6561737572652c006fd3db4c92f2367b0f5b7282bdd6f7023c14ff394f8deac64906273049085a0229226798df98ab5686f56d392dfa3a81ee6aa0c53a97dc1c8f3ed993271bd3d2e3bf1171c4d198c519f360c8999661c679898a829c1b254b2fdd5f1dba9050b48b47cc3e308d"]) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f0000000180)='./file0/f.le.\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="757070656264e3c3eb9fb9f08871653069723d2e3a66696c07002c776f726b6469723d2e2766696c65328a00000000000000"]) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:44 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file1\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000000)='./file1\x00', r0, &(0x7f0000000080)='./file1\x00') fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000280)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f00000003c0)={r1, &(0x7f0000000340)=""/65}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r2 = open(&(0x7f0000000180)='.//ile0/file0\x00', 0x1ffffc, 0x23) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:44 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x5000000}}) 10:23:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0xfb00000000000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 447.609350] IPVS: ftp: loaded support on port[0] = 21 10:23:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0xf0ffffff00000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:44 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$VIDIOC_DECODER_CMD(r0, 0xc0485660, &(0x7f0000000340)={0x277662bf4ce54d06, 0x1, @raw_data=[0x40, 0x3, 0xffffffff, 0x50c39737, 0x5, 0xe0000000000, 0x7, 0x20000000000000, 0x80, 0x7, 0x5, 0x9, 0x1ff, 0xff, 0x3, 0x4046]}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000180)=0xffffffffffffffff, 0x4) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') faccessat(r0, &(0x7f0000000000)='./file0/f.le.\x00', 0x40, 0xe00) [ 447.654090] overlayfs: filesystem on './file0' not supported as upperdir [ 447.723471] device bridge_slave_1 left promiscuous mode [ 447.729108] bridge0: port 2(bridge_slave_1) entered disabled state [ 447.783903] device bridge_slave_0 left promiscuous mode [ 447.796585] bridge0: port 1(bridge_slave_0) entered disabled state 10:23:44 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) 10:23:44 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x9}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 447.956448] overlayfs: filesystem on './file0' not supported as upperdir 10:23:44 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:44 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0xffffffff7fffffff, 0x8000) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r1) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:44 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0xf0ffffff7f0000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 448.124235] team0 (unregistering): Port device team_slave_1 removed [ 448.138303] team0 (unregistering): Port device team_slave_0 removed [ 448.155247] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 448.228816] bond0 (unregistering): Releasing backup interface bond_slave_0 10:23:44 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000180)='./file1\x00', &(0x7f0000000280)='./file0/f.le.\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') ioctl$TIOCLINUX4(r0, 0x541c, &(0x7f0000000000)) [ 448.404626] bond0 (unregistering): Released all slaves 10:23:45 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x4904000000000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:45 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='pagemap\x00') accept$unix(r0, &(0x7f0000000340)=@abs, &(0x7f0000000280)=0x6e) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r1) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6ffba5484d69723d2e3a66696c65302c776f726b6469723d2e2f66696c6531"]) ioctl$VIDIOC_ENUM_FREQ_BANDS(r1, 0xc0405665, &(0x7f0000000000)={0x80, 0x7, 0x100, 0x407, 0x5, 0x80000000, 0x2}) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r2, &(0x7f00000003c0)='./file1\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') [ 448.726404] overlayfs: unrecognized mount option "loűĄHMir=.:file0" or missing value [ 448.776106] overlayfs: unrecognized mount option "loűĄHMir=.:file0" or missing value [ 449.597025] bridge0: port 1(bridge_slave_0) entered blocking state [ 449.605043] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.612547] device bridge_slave_0 entered promiscuous mode [ 449.660683] bridge0: port 2(bridge_slave_1) entered blocking state [ 449.667585] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.675313] device bridge_slave_1 entered promiscuous mode [ 449.722149] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 449.770855] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 449.910304] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 449.958964] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 450.188208] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 450.195425] team0: Port device team_slave_0 added [ 450.227447] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 450.234619] team0: Port device team_slave_1 added [ 450.272767] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 450.323009] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 450.372316] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 450.405044] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 450.734223] bridge0: port 2(bridge_slave_1) entered blocking state [ 450.740582] bridge0: port 2(bridge_slave_1) entered forwarding state [ 450.747299] bridge0: port 1(bridge_slave_0) entered blocking state [ 450.753675] bridge0: port 1(bridge_slave_0) entered forwarding state [ 450.760785] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 451.522681] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 451.767647] 8021q: adding VLAN 0 to HW filter on device bond0 [ 451.863315] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 451.957566] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 451.963930] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 451.970875] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 452.068400] 8021q: adding VLAN 0 to HW filter on device team0 10:23:49 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0xebffffff}}) 10:23:49 executing program 1: mkdir(&(0x7f0000000340)='./file0/f.le.\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="d670706572646972726b6469723d2e2f66696c65310000000000010000000000000000000000000000000000000000000081c318"]) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') write$FUSE_GETXATTR(r0, &(0x7f0000000180)={0x18, 0xfffffffffffffff5, 0x5, {0x3ff}}, 0x18) 10:23:49 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)) 10:23:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x8000000000000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:49 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x8}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:49 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x40080, 0x0) r1 = getpgrp(0xffffffffffffffff) ioctl$TIOCSPGRP(r0, 0x5410, &(0x7f0000000200)=r1) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') [ 452.658209] 9pnet: Insufficient options for proto=fd [ 452.664604] 9pnet: Insufficient options for proto=fd [ 452.738815] overlayfs: unrecognized mount option "Öpperdirrkdir=./file1" or missing value 10:23:49 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) [ 452.817032] overlayfs: unrecognized mount option "Öpperdirrkdir=./file1" or missing value [ 452.843149] 9pnet: Insufficient options for proto=fd 10:23:49 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0xc0ed0000}}) [ 452.866685] 9pnet: Insufficient options for proto=fd 10:23:49 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e3a66696c65302c776f726b6469723d2e2f85ad6c6531"]) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:49 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) [ 453.027909] 9pnet: Insufficient options for proto=fd 10:23:49 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x100000000000000}}) 10:23:49 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) [ 453.191766] overlayfs: failed to resolve './…­le1': -2 10:23:49 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x2000000000000000}}) 10:23:49 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x8dffffff00000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 453.267911] 9pnet: Insufficient options for proto=fd [ 453.279705] overlayfs: failed to resolve './…­le1': -2 10:23:50 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:50 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) [ 453.410847] 9pnet: Insufficient options for proto=fd 10:23:50 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x4000000000000}}) 10:23:50 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x8000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0xfb000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:50 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x80000000000000) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) setxattr$system_posix_acl(&(0x7f0000000400)='./file1\x00', &(0x7f0000000440)='system.posix_acl_default\x00', &(0x7f0000000480)={{}, {0x1, 0x2}, [{0x2, 0x7, r1}], {}, [{0x8, 0x7, r2}, {0x8, 0x2, r2}, {0x8, 0x2, r2}], {0x10, 0x2}, {0x20, 0x2}}, 0x44, 0x2) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioprio_set$uid(0x3, r1, 0x9) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r3, 0x114, 0xa, &(0x7f0000000540), 0x1) lsetxattr$security_ima(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f0000000280)=@ng={0x4, 0x8, "168a"}, 0x4, 0x1) openat$dir(0xffffffffffffff9c, &(0x7f0000000500)='./file1\x00', 0x44180, 0x40) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:50 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) 10:23:50 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 453.650281] 9pnet: Insufficient options for proto=fd 10:23:50 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x60}}) 10:23:50 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:23:50 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_mount_image$bfs(&(0x7f0000000180)='bfs\x00', &(0x7f0000000240)='.//ile0\x00', 0x9, 0x0, &(0x7f0000000280), 0x2000001, 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000000)='./file0/f.le.\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 453.833074] 9pnet: Insufficient options for proto=fd 10:23:50 executing program 3: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:23:50 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x7ffffffff000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:50 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0xffffffeb}}) 10:23:50 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) ioctl$BINDER_SET_CONTEXT_MGR(r0, 0x40046207, 0x0) mkdir(&(0x7f0000000200)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000180)={0x0, 0x10001}, &(0x7f0000000280)=0x8) setsockopt$inet_sctp6_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x5, &(0x7f0000000340)={r1, @in={{0x2, 0x4e22, @loopback}}}, 0x84) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lkwerdir=rkdir=./file1']) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) prctl$PR_SVE_GET_VL(0x33, 0x5614) openat$apparmor_thread_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') [ 454.124091] overlayfs: unrecognized mount option "lkwerdir=rkdir=./file1" or missing value [ 454.161850] 9pnet: Insufficient options for proto=fd [ 454.173889] 9pnet: Insufficient options for proto=fd [ 454.191540] overlayfs: unrecognized mount option "lkwerdir=rkdir=./file1" or missing value 10:23:51 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x40000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:51 executing program 3: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:23:51 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x8cffffff00000000}}) 10:23:51 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYRESOCT=r0, @ANYBLOB="098b5ed1673da1839c704d74d0142baf27d4284c420b4d", @ANYRESOCT=r0, @ANYRES64=r0, @ANYPTR64, @ANYRESDEC=r0]) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:51 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x7fffef05}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:51 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x1ffffffffffffe) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) clock_gettime(0x7, &(0x7f0000000180)) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f00000001c0)=0x12, 0x4) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet6_dccp_buf(r1, 0x21, 0xc, &(0x7f0000000200)="11f952553a4ee163d0ab9267b14717862998ff8019b3aaecb9fc0022291ae87fd5a139bb915ab2061ce1d346e5b4fe3758526832b478200a9a95", 0x3a) 10:23:51 executing program 3: setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 454.643362] overlayfs: unrecognized mount option "00000000000000000000003 ‹^Ńg=ˇśpMtĐ+Ż'Ô(LB M00000000000000000000003" or missing value [ 454.672313] 9pnet: Insufficient options for proto=fd 10:23:51 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x6000}}) 10:23:51 executing program 3: r0 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:23:51 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) setxattr$security_smack_entry(&(0x7f0000000180)='./file0/f.le.\x00', &(0x7f0000000280)='security.SMACK64IPOUT\x00', &(0x7f0000000340)='overlay\x00', 0x8, 0x1) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, &(0x7f00000005c0)={0x1f, {{0x2, 0x4e24, @multicast1}}, 0x0, 0x2, [{{0x2, 0x4e20, @empty}}, {{0x2, 0x4e22, @rand_addr=0x9}}]}, 0x190) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000003c0)='TIPCv2\x00') sendmsg$TIPC_NL_MON_SET(r1, &(0x7f0000000580)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000540)={&(0x7f0000000400)={0x134, r2, 0x4, 0x70bd28, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xc, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x28, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x7}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x800}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0xc73f}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}]}, @TIPC_NLA_NODE={0x18, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x8e76}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_LINK={0xd4, 0x4, [@TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff00000001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffffffffffc0}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb018}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x34, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xcf8}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}]}]}, 0x134}, 0x1, 0x0, 0x0, 0x4000050}, 0x0) ioctl$TCSETA(r0, 0x5406, &(0x7f0000000000)={0x8, 0x0, 0xfff, 0x5d, 0x9, 0x3ff, 0x6, 0x7, 0x8, 0x3}) 10:23:51 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0xedc000000000}}) 10:23:51 executing program 3: r0 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 454.960669] 9pnet: Insufficient options for proto=fd [ 455.067558] 9pnet: Insufficient options for proto=fd [ 455.089301] 9pnet: Insufficient options for proto=fd [ 455.106318] overlayfs: filesystem on './file1' not supported as upperdir 10:23:52 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x400000000000000}}) 10:23:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x34e}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:52 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x9000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:52 executing program 3: r0 = socket(0x0, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:23:52 executing program 1: mkdir(&(0x7f0000000500)='./file0\x00', 0xfffffffffffffffd) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f0000000580)='./file0/f.le.\x00', 0x0, 0x0) eventfd2(0x81, 0x0) fchdir(r0) mkdir(&(0x7f0000000540)='./file0/f.le.\x00', 0x102) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f0000000280)=0xc) acct(&(0x7f0000000400)='./file0\x00') getresgid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f00000003c0)) chown(&(0x7f0000000000)='./file0/f.le.\x00', r1, r2) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') setxattr$security_smack_entry(&(0x7f00000001c0)='./file0/f.le.\x00', &(0x7f00000005c0)='security.SMACK64IPIN\x00', &(0x7f0000000600)='tmpfs\x00', 0x6, 0x1) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302cff7f00000000000000000000696c65302c776f726b6469723d2e2f66696c6531"]) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$VIDIOC_ENUM_FMT(r3, 0xc0405602, &(0x7f0000000200)={0x6, 0xf, 0x2, "6a24ef07984b92daab20a8aaf2b0db67dc00745f01b412a434fcb6b5718578d6", 0x32344d59}) mount$overlay(0x0, &(0x7f0000000440)='.//ile0/file0\x00', &(0x7f0000000480)='overlay\x00', 0x40, &(0x7f00000004c0)={[{@metacopy_on='metacopy=on'}, {@default_permissions='default_permissions'}]}) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:52 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x2) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000240)=0xffffffffffffffff, 0x4) clock_gettime(0x0, &(0x7f0000000180)={0x0, 0x0}) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000200)={{r3, r4/1000+10000}, {r5, r6/1000+10000}}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000400)={{0x2000, 0x1f000, 0xf, 0x7a, 0x7, 0x0, 0xbe7, 0x6, 0x6, 0x5, 0x5c6, 0x3}, {0x6000, 0xd002, 0x3, 0xfffffffffffffffc, 0x7, 0x3, 0x0, 0x2e640000, 0xf83, 0x4, 0x5, 0x401}, {0xf000, 0x3002, 0x3, 0x8, 0x100, 0x6, 0x800, 0x8, 0x9, 0x10000, 0xfffffffffffffff9, 0x364}, {0x0, 0x11f001, 0xf, 0x4, 0x400, 0x80000001, 0x6, 0x8, 0x2ee, 0x6, 0x20, 0x3f}, {0x6004, 0x7002, 0xb, 0x8, 0x9, 0x100, 0x5, 0x2, 0x1, 0x9, 0x8, 0x6}, {0xf000, 0x0, 0x0, 0x3, 0x5, 0x10001, 0xfffffffffffff000, 0x5, 0x2, 0x3f, 0x400, 0xaa4f}, {0x2000, 0x4, 0xa, 0x1, 0x800, 0x40, 0xc8e, 0x1, 0x40, 0x5, 0x46, 0x2}, {0x7000, 0x0, 0x0, 0xffff, 0x7, 0x6, 0x3a, 0x2, 0x0, 0x3, 0x6, 0x1}, {0x106000, 0x100000}, {0x100002, 0x1000}, 0x10000, 0x0, 0x3000, 0x10080, 0xf, 0x4000, 0x6002, [0x1, 0x48a05dbf, 0x0, 0x7]}) [ 455.534039] 9pnet: Insufficient options for proto=fd 10:23:52 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x3f000000}}) [ 455.566248] 9pnet: Insufficient options for proto=fd 10:23:52 executing program 3: r0 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 455.589747] overlayfs: unrecognized mount option "˙" or missing value [ 455.634898] overlayfs: unrecognized mount option "˙" or missing value 10:23:52 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x2000}}) [ 455.691745] 9pnet: Insufficient options for proto=fd 10:23:52 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) unlink(&(0x7f0000000340)='./file1/../file0\x00') fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$VIDIOC_TRY_EXT_CTRLS(r0, 0xc0205649, &(0x7f0000000280)={0x9d0000, 0x3, 0x2, [], &(0x7f0000000180)={0x9a093e, 0x1, [], @string=&(0x7f0000000000)=0x3}}) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:52 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x49040000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:52 executing program 3: r0 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:23:52 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x7}}) [ 455.879280] 9pnet: Insufficient options for proto=fd 10:23:52 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) setxattr$security_ima(&(0x7f0000000000)='./file0/f.le.\x00', &(0x7f0000000180)='security.ima\x00', &(0x7f0000000280)=@v1={0x2, "5ed8a7a77f4fee52a69a5a87d669"}, 0xf, 0x3) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r0, 0x84, 0x4, &(0x7f0000000340), &(0x7f0000000380)=0x4) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 456.045728] 9pnet: Insufficient options for proto=fd [ 456.061377] 9pnet: Insufficient options for proto=fd 10:23:53 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x4000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:53 executing program 3: r0 = socket(0xa, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:23:53 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x600000000000000}}) 10:23:53 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x1000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:53 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='.//ile0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:53 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x80000) write$FUSE_LSEEK(r0, &(0x7f0000000200)={0x18, 0x0, 0x6, {0x9}}, 0x18) open$dir(&(0x7f0000000180)='./file0\x00', 0x2, 0x40) r1 = add_key$user(&(0x7f0000000240)='user\x00', &(0x7f0000000280)={'syz', 0x2}, &(0x7f0000000400)="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", 0x1000, 0xffffffffffffffff) r2 = add_key(&(0x7f00000002c0)='rxrpc\x00', &(0x7f0000000300)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$user(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f0000001400)="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", 0x1000, 0xfffffffffffffffb) keyctl$dh_compute(0x17, &(0x7f0000002400)={r1, r2, r3}, &(0x7f0000002440)=""/99, 0x63, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f00000001c0)={0xffffffffffffffff}) write(r4, &(0x7f0000000100), 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r4, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 456.514155] 9pnet: Insufficient options for proto=fd 10:23:53 executing program 3: socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:23:53 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x40000}}) 10:23:53 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000000)='/dev/audio#\x00', 0x2, 0x414402) ioctl$KVM_ASSIGN_SET_INTX_MASK(r0, 0x4040aea4, &(0x7f0000000180)={0x2, 0xfffffffffffff7ef, 0xc20, 0x2}) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r1) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f776572716089f263fc5b0a3c4941964d8b6469723d2e3a66696c65302c776f726b7469723d2e2f66696c6531"]) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r0, &(0x7f00000002c0)='./file1\x00', r2, &(0x7f0000000340)='.//ile0\x00') renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:53 executing program 3: socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 456.718279] 9pnet: Insufficient options for proto=fd 10:23:53 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x4000000}}) [ 456.754105] 9pnet: Insufficient options for proto=fd [ 456.838915] overlayfs: unrecognized mount option "lowerq`‰ňcü[ [ 456.838915] 0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x3}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x8000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:54 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x3f00}}) 10:23:54 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[]) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:54 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x2f0) 10:23:54 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:54 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x2f0) 10:23:54 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x300}}) 10:23:54 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) getsockopt$inet_tcp_int(r0, 0x6, 0x6, &(0x7f0000000180), &(0x7f0000000280)=0x4) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r1) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') [ 457.458222] 9pnet: Insufficient options for proto=fd [ 457.465050] overlayfs: missing 'lowerdir' [ 457.480587] overlayfs: missing 'lowerdir' [ 457.481987] 9pnet: Insufficient options for proto=fd 10:23:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x8dffffff}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 457.628102] 9pnet: Insufficient options for proto=fd 10:23:54 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, 0x0, 0x2f0) 10:23:54 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x500000000000000}}) [ 457.656088] 9pnet: Insufficient options for proto=fd [ 457.866607] 9pnet: Insufficient options for proto=fd [ 457.912012] 9pnet: Insufficient options for proto=fd 10:23:54 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x800000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:54 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) connect$vsock_stream(r0, &(0x7f0000000000)={0x28, 0x0, 0x2710, @reserved}, 0x10) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x800020, &(0x7f0000000400)=ANY=[@ANYRESHEX=r0, @ANYRESHEX=r0, @ANYRESDEC=r0, @ANYRES64=r0, @ANYRESDEC, @ANYPTR, @ANYRES64=r0]) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:54 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x0, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, 0x0}, 0x2f0) 10:23:54 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x8cffffff}}) 10:23:54 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0xffc99a3b}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:54 executing program 4: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ppp\x00', 0x0, 0x0) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000340)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_STATS(r0, &(0x7f0000000440)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)={0x1c, r1, 0x220, 0x70bd2d, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20000000}, 0x4000000) pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) write(r3, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x72, &(0x7f00000001c0)={0x0, 0x7, 0x20}, &(0x7f0000000200)=0xc) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000240)={r4, 0x800}, &(0x7f0000000280)=0x8) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:55 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0xffffff8c}}) 10:23:55 executing program 1: r0 = syz_open_dev$swradio(&(0x7f0000000440)='/dev/swradio#\x00', 0x1, 0x2) ioctl$KVM_SET_GUEST_DEBUG(r0, 0x4048ae9b, &(0x7f0000000480)={0x20000, 0x0, [0x800, 0x3332606, 0xb2, 0x2, 0x1, 0x100, 0xfffffffffffffff8, 0x4]}) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r1) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) r2 = getpgrp(0x0) timer_create(0x0, &(0x7f00000003c0)={0x0, 0x16, 0x1, @tid=r2}, &(0x7f0000000400)) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="757c7065006469723d4f726b6b69723d2ebf3cc40a0031bfaeb3017fa7d3eedb8c8ca80051d0a159e36101bdee73b3ff"]) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_LM(r1, 0x12, 0x3, &(0x7f0000000180), &(0x7f0000000280)=0x4) ioctl$KVM_SET_VAPIC_ADDR(r3, 0x4008ae93, &(0x7f0000000340)=0x4003) timer_create(0x7, &(0x7f0000000000)={0x0, 0x2d, 0x1}, &(0x7f0000000380)=0x0) timer_delete(r4) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000007c0)='./file0/f.le.\x00') [ 458.405481] 9pnet: Insufficient options for proto=fd [ 458.413390] kernel msg: ebtables bug: please report to author: Wrong len argument [ 458.426204] 9pnet: Insufficient options for proto=fd 10:23:55 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x0, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, 0x0}, 0x2f0) 10:23:55 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x5}}) [ 458.502903] 9pnet: Insufficient options for proto=fd 10:23:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x50}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 458.606552] overlayfs: unrecognized mount option "u|pe" or missing value [ 458.617604] kernel msg: ebtables bug: please report to author: Wrong len argument 10:23:55 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x6000000000000000}}) [ 458.663203] overlayfs: unrecognized mount option "u|pe" or missing value [ 458.680368] 9pnet: Insufficient options for proto=fd [ 458.810558] 9pnet: Insufficient options for proto=fd [ 458.823621] 9pnet: Insufficient options for proto=fd 10:23:55 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x300000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:55 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x0, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, 0x0}, 0x2f0) 10:23:55 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) setsockopt$bt_BT_SECURITY(r0, 0x112, 0x4, &(0x7f0000000180)={0x7ff, 0x1}, 0x2) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$VT_RESIZEX(r0, 0x560a, &(0x7f0000000000)={0x8, 0x200, 0x80000001, 0x7, 0x80000001, 0x5}) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) sendmsg(r0, &(0x7f0000002800)={&(0x7f0000000340)=@vsock={0x28, 0x0, 0xffffffff, @my=0x1}, 0x80, &(0x7f0000000600)=[{&(0x7f00000003c0)="d00f0fceb4b16ee86f80345cc8133a09483ae3d2b5e9b9570155bb26acd2abdba1a2723baab27827c975d42d76e18542de408166cf4d547de26a505dcf09131e388195f5b74469c191847c559424574644c96db1df4a83e9c6747a02446ad6ec090a189223fe44e1bbe9873a462603c56bd72e1beb008d8cc8db880068d56e920415ea042e1d4ffe74cc3e24e813830035", 0x91}, {&(0x7f0000000280)="51d4b98a270d01baba4191e890f3f67b5652866b16e6bc021470", 0x1a}, {&(0x7f0000000480)="78a5ab0381adf66aa03b32c231a2ff437617c41833def609c9", 0x19}, {&(0x7f00000004c0)="1cf6199cec69cc60406cf502aace1f129e716445d3a5a670846facca94b4f8a30a96785ce3da26601ffa713b2534105e2a4b0c88013e3f38a5e2df8b97cd3b4dc869f85678ef53c625d676bcf48f6d8e7f4f83d66b4ac96ef26b5660f0e0a728bacc9d4353fb474e0d1cedfd", 0x6c}, {&(0x7f0000000800)="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", 0x1000}, {&(0x7f0000001800)="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", 0x1000}, {&(0x7f0000000540)="f290f787455c95e35bfbad51d239561d39caa36540eb8a2e8f7a4d47b63655996b798bcae365075ce508a4bf952b8a2699ff6f414a93a767d92a924684ebd009e96bb3add05f9bab34c0dc4c35f2b983b978f338af3a758fbf6d443f26582ee60c52997a3a02c7aa2dc5cd94ea7a0fb5847b0b7f8a181d67b385af5cb1b89ac2cb0c4426c5256375027716", 0x8b}], 0x7, &(0x7f0000000680)=[{0x100, 0x88, 0x8, "eec46553dc0ba39e47d0dc82f9c042291ea82d36dece7734ee8da2a2c50d2e78a8871c66cd723213f3001ee95078a769810a3a8789943d246c193ba4d844fe4df8388ee3c951074b27f0c2862c257fff87284f268556e921daa4936262f2d4f99b20d64ad873631df1ca8c3299708e8c075bdd28d861e491d3f2296221b2eeeafce39987c1d861c528d76ffe4c9261ab97c49c395e5991959d54eaf9f357d226afb3d797df9635effa804b5409fdd9c4e8507131f444caa78d4f2c91e918be99d7f98808257050c13d9f17c020439360010397c54e8fb519eed9a4d87fa31d65ea600749d4d760c8c8ec8f466b3d519b"}, {0x20, 0x13f, 0xe884, "4445233e76600a346bdd9f6d2909"}], 0x120}, 0x800) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:55 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x20000000}}) 10:23:55 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0xfffffff0}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:56 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x60240, 0x0) ioctl$VIDIOC_S_FBUF(r0, 0x4030560b, &(0x7f0000000180)={0xb1, 0x1, &(0x7f0000000400)="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", {0x100000000, 0x7, 0x767b5d59, 0x9, 0xd2, 0x6, 0xf, 0x101}}) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x6eef848f) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 459.347455] kernel msg: ebtables bug: please report to author: Wrong len argument [ 459.356037] overlayfs: missing 'workdir' [ 459.361491] 9pnet: Insufficient options for proto=fd [ 459.395691] overlayfs: missing 'workdir' 10:23:56 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x90, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) 10:23:56 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0xfffffff6}}) 10:23:56 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getpid() fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="9e707065726069723d2e2f6a696c653010b8d6393126e8601f371c23268d7fdfff377e2c9212f749638ea27f2c6c000065302c0000000000006c65306c776f726a07000000000000006c6531"]) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r0, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000000)=0x0) sched_getscheduler(r2) 10:23:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x50000000000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:56 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x90, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) [ 459.535002] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 459.566108] 9pnet: Insufficient options for proto=fd 10:23:56 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0xffffffff00000000}}) [ 459.667874] overlayfs: unrecognized mount option "žpper`ir=./jile0¸Ö91&č`7#&Ťß˙7~" or missing value [ 459.733068] overlayfs: unrecognized mount option "žpper`ir=./jile0¸Ö91&č`7#&Ťß˙7~" or missing value [ 459.744517] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 459.766850] 9pnet: Insufficient options for proto=fd 10:23:56 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0xffffffff00000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:56 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x40000000}}) 10:23:56 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x90, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}]}, 0x108) 10:23:56 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x2000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:56 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) personality(0xf) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723df4d3a7d9da5ec76ef808437d010b2e3a66696c65302c77"]) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') mkdir(&(0x7f0000000000)='.//ile0\x00', 0x70) [ 460.276359] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 460.340050] 9pnet: Insufficient options for proto=fd [ 460.358321] overlayfs: unrecognized mount option "w" or missing value [ 460.365680] 9pnet: Insufficient options for proto=fd 10:23:57 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) fcntl$getown(r1, 0x9) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000, 0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x121c, 0x8000000000) 10:23:57 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:23:57 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x3000000}}) [ 460.419279] overlayfs: unrecognized mount option "w" or missing value 10:23:57 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 460.503539] kernel msg: ebtables bug: please report to author: bad policy 10:23:57 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,wo/file1\x00\x00\x00\x00\x00\x00\x00']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 460.560603] 9pnet: Insufficient options for proto=fd 10:23:57 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x4000000000000000}}) [ 460.596721] 9pnet: Insufficient options for proto=fd [ 460.668879] kernel msg: ebtables bug: please report to author: bad policy 10:23:57 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0x0, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 460.763464] 9pnet: Insufficient options for proto=fd [ 460.778201] overlayfs: unrecognized mount option "wo/file1" or missing value [ 460.835781] overlayfs: unrecognized mount option "wo/file1" or missing value [ 460.855728] kernel msg: ebtables bug: please report to author: bad policy 10:23:57 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0xebffffff00000000}}) 10:23:57 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0xfb}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:57 executing program 1: mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x81) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$ASHMEM_GET_NAME(r0, 0x81007702, &(0x7f0000000340)=""/102) getsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xc, &(0x7f0000000000), &(0x7f0000000280)=0x4) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:57 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x900000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:57 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x160, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x1d8) [ 461.281541] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 461.299563] 9pnet: Insufficient options for proto=fd [ 461.317201] 9pnet: Insufficient options for proto=fd 10:23:58 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) lsetxattr$security_smack_transmute(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000200)='TRUE', 0x4, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) syz_open_dev$video(&(0x7f0000000100)='/dev/video#\x00', 0x5, 0xa5b0bbefa3dad2e1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:58 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x300000000000000}}) 10:23:58 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x160, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x1d8) 10:23:58 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x8) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file0\x00', 0x5) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="75707065726069723d2e2f66696c65302c6c61ec97d9a26f7765726469723d2e3a66696c65302c776f726b6469723dbbcb307f2e2f"]) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 10:23:58 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x60000000}}) [ 461.495117] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 461.506574] 9pnet: Insufficient options for proto=fd [ 461.513103] 9pnet: Insufficient options for proto=fd 10:23:58 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x160, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}]}]}, 0x1d8) 10:23:58 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0xffc99a3b00000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 461.595885] overlayfs: unrecognized mount option "upper`ir=./file0" or missing value [ 461.629700] overlayfs: unrecognized mount option "upper`ir=./file0" or missing value 10:23:58 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file1\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$sock_inet_SIOCGARP(r0, 0x8954, &(0x7f0000000340)={{0x2, 0x4e23, @multicast1}, {0x0, @dev={[], 0x10}}, 0x2, {0x2, 0x4e22, @local}, 'yam0\x00'}) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065e863726469723d2e2f66696c65302c6c6f7765726469723d2e3a66696c65776f726b6469723d2e2f66696c"]) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') sendmsg$kcm(r0, &(0x7f0000000700)={&(0x7f00000003c0)=@alg={0x26, 'hash\x00', 0x0, 0x0, 'sha3-512-generic\x00'}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000440)="8e0b5a2d228be45c13ef5d08ad1c65ce6ac3cc0ae6dfe13c48287007ad9eb2c295f9e2084dcf9acbcaf81a6148991eafae791701803cb4b6cc4fd8639a90807c7b1cc273b7396a515ad87f2437553769bb1bf967a77cac69f45f4fe5103ce434778928fca66aae2316b9507534f18f2858d2de973d06d7b1996d74b6e2b1793277eb002beda7602c3029c8bef257424fd958d730cb150484ffd4a4dbbb84f32c8a63a453e011ba9fb9f6700a5ffaf952e04731a25872c20126a27fe7dcf3f20f31f743361b44", 0xc6}, {&(0x7f0000000000)="74a169b1455b278bbf2d02f80a92e2c509634e1f97cfaa42728ecc3d40398edd62", 0x21}, {&(0x7f0000000540)="d9389c6acd29a94c5c41ec2ffe06347a311f692aaecc88734688598ee8a59407e802289ec3bf48cf2a1313814cd7d38b0020675ccef84cae6b2e88e29dc38e4e6176f77036eeb6af27a9f99338f323a4c59a297d706993525fb8399b1bd440c8094c6527f567b6797e176ab4e13a477f09e6364d7590a654a0fa2d4cacdf5bafb913453f864eef7101e4e600d7e92973a00ca83d55bb56fe631e0e9b24642cb8bb0f2f0a8b9af0c067a06fe267d0d88a1ec0c1c5e54e5b47235ccc32cee8d8be8099eb4eeffbc9bce1e9fc9025f6f6bce8e5a228559d469c4e684510", 0xdc}, {&(0x7f0000000180)="acfe025ce59300dc00a1f2dba8", 0xd}], 0x4, &(0x7f0000000640)=[{0x70, 0x11e, 0x81, "0227996f8d329da2435cc88b45010ac541abd7864b33ee1d660cb28bdd7c30bad3b2ab00dc1eb742cc2331d1e7574424be68c408cd5478f112194b8149a6fe5f974e4b7ca9c4b3f5f28d0cf32b5162c05ae5860fb8c73c271abb7c1118d9"}, {0x18, 0x119, 0x80, "97c5"}], 0x88}, 0x890) 10:23:58 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x7000000}}) [ 461.692715] 9pnet: Insufficient options for proto=fd [ 461.704355] kernel msg: ebtables bug: please report to author: Total nentries is wrong 10:23:58 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0x0, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 461.878399] overlayfs: unrecognized mount option "uppečcrdir=./file0" or missing value [ 461.907586] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 461.917039] overlayfs: unrecognized mount option "uppečcrdir=./file0" or missing value [ 461.928329] 9pnet: Insufficient options for proto=fd [ 461.938349] 9pnet: Insufficient options for proto=fd 10:23:58 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x3000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:58 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x4000}}) [ 462.319076] 9pnet: Insufficient options for proto=fd 10:23:59 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000000)) openat$urandom(0xffffffffffffff9c, &(0x7f0000000280)='/dev/urandom\x00', 0x200000, 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:23:59 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0x0, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:23:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x4904}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:59 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) openat$vicodec0(0xffffffffffffff9c, &(0x7f0000000100)='/dev/video36\x00', 0x2, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000400)={0x8, {{0xa, 0x4e20, 0x81, @mcast2, 0x1}}, 0x1, 0x2, [{{0xa, 0x4e24, 0x4, @mcast1, 0x7ff}}, {{0xa, 0x4e21, 0x6, @ipv4={[], [], @remote}, 0x1}}]}, 0x190) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffff81, 0x3ff, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x3, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) getsockopt$packet_int(r0, 0x107, 0x1f, &(0x7f0000000180), &(0x7f00000001c0)=0x4) 10:23:59 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x6}}) 10:23:59 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0x0, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:23:59 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0xffffff7f00000000}}) [ 462.491911] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 462.521116] 9pnet: Insufficient options for proto=fd 10:23:59 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000000)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 462.607693] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 10:23:59 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0xffffff7f}}) [ 462.676732] 9pnet: Insufficient options for proto=fd [ 462.692510] 9pnet: Insufficient options for proto=fd 10:23:59 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x208, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x280) [ 462.818362] 9pnet: Insufficient options for proto=fd [ 462.871417] overlayfs: unrecognized mount option "workdir=" or missing value [ 462.907606] overlayfs: unrecognized mount option "workdir=" or missing value 10:23:59 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x900}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:23:59 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x4}}) 10:23:59 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x208, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x280) 10:23:59 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x5efff7f}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:23:59 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file2\x00', &(0x7f0000000180)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 463.242126] 9pnet: Insufficient options for proto=fd [ 463.268545] 9pnet: Insufficient options for proto=fd [ 463.285045] overlayfs: filesystem on './file0' not supported as upperdir 10:24:00 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd, 0x1) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f00000015c0)=[{&(0x7f0000000180)="a0956972e3fae5e1b3371e4c8e9bbd40456d67d09f6948eac4c64fc0558665624c539e41f3dabdec7243508046d6bdc6712b82d9eee2348041e3f8ad4eb24e7eb44f1cbfbb17b4426c3439718171f6cf24cb06a274108c2cd8a92324b576b87b2e82f586445fc7d9fc3bade88e9a229abca75dddcd260ee793b91a487f6d9c026f8000584754e5de001474a7979bf1b8f32621c51e3b351c332b2b5011b06c1446451dd367a169bb8cb2946d28e46857fe9d667acdfedee386f1c4d0f480c417acf8ab67c82e7fb4201d0583d2", 0x184}, {&(0x7f0000000400)="ab8a52ea7aefe0ec86955b012e2b4fb2a1fcaea7d9bd1bb1417c154b86e5fc3290610a2866e19286a8ec7a307c38bb8308883c44abbef3be83ab6e0c09940b5a14d1433014f39a531bb2633a94368ecfb00b7810e94549a05d415e2730599fe76033e0e7d93ee0429d05c599cd62ab37cfb91b38e7bee78422c0f414f48b92cab117601841ea892106c459c5286e6152b04bd6be93ea207cdca121ef6e70fd4116784bdd01232f1d91ae00764852db7adec4e369f21821d62431438335cc3491d33633e066257953a5901690dcbcc8b56ad6245d55d40919ea27381d1d02f111e961edb9385614a4f2fd984e8a20c18f", 0xf0}, {&(0x7f0000000280)}, {&(0x7f00000002c0)="a89aff7d9ce3176b016f775730c2a6c0d02edc5778b7fc3369e7426cba06720db02a35cb1b92ad37544c713b5362b25093ae9bf6cceffba499c325b148546df777ab1eb5c037a473a95c3afe2697f241a3305d3acc3b9ce019891c1c20c0080f20fba7177777", 0x66}, {&(0x7f0000000500)="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", 0x1000}, {&(0x7f0000001500)="1f187c58a86994094a70815d33d6e97eb7d868030264ecf3fae0901547bcd783837e9b1092ed4b90173ae43300cdaa71740d40aaac995087c9d6eea185f629179dabe78ce6b3e9e0823281eb0a84c729798965a70a3c971f85417ecabf77d5baa938d132b2dc45361d40b79953641dd5b90d50b8b507beef64534abf41190ca0ca875375b89c70a11412562f42bfae05db199a8c36a2150887", 0x99}, {&(0x7f0000001640)="680f2a8a63f91b772bd2d7a5df7a1a29c0269e22b6ba1caa3a2c63a104079a17b275238c21849f72d61a698c5469875d2036ca189b28682b4b19a198bd96d8de7310e439786f13ae9ecebb17f208ef0546a8bcf9ec0757bb4922b8f5350f4feb7e0929177641d79f6c97726ec2af7c9db70b244525d7a6dda87a4ddc1b597f0a4c10f75ad908eb2d21f30d2f2efe52c2f495bf919bc56c01505911fb99b28aace7b6c37e03b1db5f0acd8bc1e421d778d4802745b9a6013af6b09b0fa40eb862d138e40c6aab09f494cc9ff32ae4f3467cd1b506c454f1420452e03900d2367e001ff39b86f7fd2cc4c286d9e18627599308520493885cba428b347218fadb0b9d1bd9a847e84f6d1edb42e0419428209d9dc7e08316594fe483ebf0f7ebb108696a6bfcae", 0x125}], 0x7, 0x2000000) ioctl$sock_bt_hidp_HIDPGETCONNINFO(r1, 0x800448d3, &(0x7f0000001780)={{0x8, 0x80000000, 0x2, 0x1, 0x5, 0x5}, 0x1, 0x80, 0x2, 0x1000, 0x0, "a54def423f28942fa9a65e82d076c793ef5d259457c7a16c7f14f6aa4f510d7465c9817691ec201cd41e26b5a30234833100cfcc7d40eff42c2891d9c2f171bb54e472f923c691cbd43a49f95ea5e984aa145ccbad6771e18d63a251546c2b263753aee4724643beff05d9c4ae1905ddc07991af0f9ad8ab4e6c8dcb66aa8c14"}) 10:24:00 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x500}}) 10:24:00 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x208, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0x70, 0x70, 0xa8}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x280) 10:24:00 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) r0 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000180)={'syz', 0x0}, 0x0, 0x0, 0x0) keyctl$set_timeout(0xf, r0, 0x2) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r1) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="7570700100646972726469723d2e3a66696c656f726b6469723d2e2f66696c65310000000000000000000000000007f3b721c569d495a5b48d94f018fa47688ca04fd1e3af6303e06784029972e06cc184755771d9e30fd7f533c7cc0b7952318a6e2f5c55fc14e9f64b814b4a0f4e377f6f71038e0d93367199160450e55583bfdc96cfb8d5ad01e1cbcedf3e51941780e416bebb937f1d3b81b67c4b3a5b52d0f4c67c601eae374127acfe5a5934177e19c5a05bbab5ac81079ca9e9569d4d21e3653068f7ca5a9cb1228032ac32"]) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') 10:24:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x449}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:24:00 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x0, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:24:00 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x2}}) [ 463.487033] 9pnet: Insufficient options for proto=fd [ 463.506246] 9pnet: Insufficient options for proto=fd [ 463.547712] overlayfs: unrecognized mount option "upp" or missing value [ 463.592105] overlayfs: unrecognized mount option "upp" or missing value [ 463.620440] 9pnet: Insufficient options for proto=fd 10:24:00 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x8}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:24:00 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x0, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:24:00 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x5efff7f00000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:24:00 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x200000000000000}}) 10:24:00 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x74, &(0x7f0000000340)=""/208, &(0x7f0000000000)=0xd0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 464.242173] 9pnet: Insufficient options for proto=fd 10:24:01 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$media(&(0x7f0000000100)='/dev/media#\x00', 0x1, 0x10040) ioctl$TIOCLINUX5(r0, 0x541c, &(0x7f0000000300)={0x5, 0xf5a, 0xffffffff, 0x100, 0x95c}) write$smack_current(r0, &(0x7f0000000180)='&vboxnet1cgroup@posix_acl_accesscpuset\x00', 0x27) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) ioctl$KDGKBDIACR(r0, 0x4b4a, &(0x7f00000001c0)=""/183) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000280)=0x0) syz_open_procfs(r3, &(0x7f00000002c0)='attr/prev\x00') 10:24:01 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}], 0x1000000}}) 10:24:01 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x0, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:24:01 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dlm_plock\x00', 0x20000, 0x0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000800)={'security\x00', 0x1000, "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"}, &(0x7f0000000280)=0x1024) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:24:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x4e03000000000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:24:01 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="7472616e733d47642c728029fec866646e6f3dfb9902da091b25e7e859872bf77f28a52fea3e60d5f1295b1a32942874ca419ce32505720483c4bf02de9b65d0e471d6eac5eef30abc61aa08abe7b162ba9c968bee4d9f7b1feaf0dbf24feb6ea4c61ceb24338f5f459f81c4a0d14d2d5e", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',seclabel,fsname=uname,subj_user=trans=fd,,euid<', @ANYRESDEC=0x0, @ANYBLOB=',smackfshat=wfdno,\x00']) 10:24:01 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 464.541135] overlayfs: workdir and upperdir must reside under the same mount [ 464.549175] 9pnet: Insufficient options for proto=fd [ 464.566192] overlayfs: workdir and upperdir must reside under the same mount [ 464.718680] 9pnet: Could not find request transport: Gd 10:24:01 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x9000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:24:01 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065726469723d2e2f666908d6302c6c6f7709598ba912a465726469723d2e3a66696c65302c776f726b6469723d2e"]) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)={&(0x7f0000000000)='./file1\x00', r0}, 0x10) renameat(r1, &(0x7f0000000280)='.//ile0\x00', r1, &(0x7f0000000340)='./file0/f.le.\x00') 10:24:01 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x0}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:24:01 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:24:01 executing program 0: pipe2$9p(&(0x7f0000000100), 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x40) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 465.161907] overlayfs: unrecognized mount option "low Y‹©¤erdir=.:file0" or missing value [ 465.172306] 9pnet: Insufficient options for proto=fd [ 465.195373] overlayfs: unrecognized mount option "low Y‹©¤erdir=.:file0" or missing value 10:24:02 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:24:02 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xff, 0x0) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f0000000140)={{0x2, 0x4e20, @broadcast}, {0x307, @random="9a661c54d53f"}, 0x50, {0x2, 0x4e24, @broadcast}, 'ip6tnl0\x00'}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) ioctl$KDSIGACCEPT(r1, 0x4b4e, 0x32) ioctl$DRM_IOCTL_DROP_MASTER(r0, 0x641f) 10:24:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x0}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:24:02 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x2, &(0x7f0000000100), &(0x7f0000000180)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:24:02 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="757070657264dcd1492e2f66696c65302c6c6f770600000000000000696c65302c77696c6549"]) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 465.488380] 9pnet: Insufficient options for proto=fd [ 465.491839] overlayfs: unrecognized mount option "upperdÜŃI./file0" or missing value 10:24:02 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x1d8, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x250) [ 465.532740] overlayfs: unrecognized mount option "upperdÜŃI./file0" or missing value 10:24:02 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x400007fd, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 465.696713] kernel msg: ebtables bug: please report to author: Total nentries is wrong 10:24:02 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000000280)='tmpfs\x00', 0xffffffffffffffff, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x1f, &(0x7f00000005c0)=""/175, &(0x7f0000000680)=0xaf) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) syz_open_dev$evdev(&(0x7f0000000180)='/dev/input/event#\x00', 0x7, 0x408040) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="757370657dbdb9bbb2b5ab6f9975b27264698e63ff119a50bd0e0773890917f5172e2f66696c65300300000000000000723d2e3a66696c65302c776f726b6469723d2e2f66692c6531"]) mkdir(&(0x7f0000000000)='.//ile0\x00', 0x42) clone(0x22044000, &(0x7f0000000800)="242d2594e77629a89929b6acf92288c0a022f2a02b842be35dc82846de305243843bcf85510352f178494b21987efd412aacc5c2cc74f612af042d9aece74fb0445a061afc4afcb0b55f40e02cb4ac630ff72fd4b63ec1371e11846f676379ca068dbd3f72d423c2e16fcdccce009f01b64b73d0dd1258d8efd064397ef37daf5b8ecb2ef8121ef5530fff4500f07c6df6e2d03f85591331099ef573c61b5612de44f21293f615d5f0a5bb2e387d808527ecb5ca1d21dbe996b88ec8233201484cb7ecc8e64c38ecf8c6e44d1f8ec6018351d8139b2c535f013620e08b2398d6579b6d030f6ac2bd303dc03473fb4bbdeaead81a3e4983b590bf3e3a34ca9188a6b224d8b069fcb3aaf05d19ec02c9ceef1f747cc287ee99204f60776a8c0c23d1dc87d0ba3b07cb72ccb0d6e2abbce4d42a5cc517db97a5eb89873697b71ad3b72c63aa4f55d41c7a0b85989e9e1d73303b102d80903bd1e4a8e9b92b1db9dea318834827b7030c85f5da5b04ef6cd356af9f6171a9b3888087bddd30819644332fda21061f2f13b12c51672d3f85ba095cd703e9b4ed4e5a36d0dcff90759ec29c16c32d830562fc3fd85d05acbb7eda90050c2e11b3ce91a35a679dd2f23354820f42639875763a54c7963bad3c193e6345b8bb08e2dccb684c3188bebe20aaf002a0cdcae79e16ddbf08bdb6937e2884a1fbb7a2a533fde0efa5e083f13a1f16ca8afb4c1f68ab57d615a6c1e4eda22af90a08f3c620ab50c12e3fa2dbb1ea5bdfd30bcb4656aa643b37637938e0575cf962f06a0ee59d260eb7ce04251c6367fc2bc64ba8010b0232df193677caa867c347f2a510fd6774c39a78bddf41a156d0f8a4a939d4fa9b55e3dbb4de5a0095b8afcc529b61d4ad3bb98b5733f00e2535f165c49b2cd2cba8565c2dc3c1f1f8f1a696fd32de17dfc63e4e7defc9151077d34de664a3ad9a16fc91acf38495f170cd02efba247380ae3fc07f76c20b97cf77e151d3953e5e7029673cd4a97fc753ed54bb7064469e8d4589b95c98a70a923dcbd9fd35ebcbae4c21052bb5027b2f88fae1fcf13d0b51852413c971c31a9635f2cd7895d8b90e282361091927d5e0e8abd635b521391ff947a80931a58ef2e05640e0bfe6909ee0bd05a45f03c26e7b005f2b488cca44c75afc4f8f7bc46008ccb3273e225e5a81b219c210063b813a754a0139c14a3c67aaabbe1d7ccc4073b0ef58bbeec58daf9c428cce6116d39280934359235b12c06fe7d7af37876673ead41e0e2d85841e64483b071b6beb4dcdfc6986b559023f0d76007aed54a341fb6b19acea9d7764dd6bf02005263df76488b7494c9753421a4b8a979d193a978505fb40194ddcb32f2c52cd72abf9412195da541cfc3ba0abfd8107d859e9590d84cf22909805ba850e7466f47f0d7cf1b927586cbca8addc97a3ee51183f5d0bff43f83015695732df92a302c827c446a69c09393320abfa15945d9c37174480214c6f09e8d05ba783c14895eb47ade8381cab2832c2279e7c254e5005623c45e8fd41264cd3027ded7b77131cbf18ab71e6251e12033b05a454e226d1c67d8694b2ac90975fe3298e99614776d64867770f040baff3cc5278f4762940eade5dc6e9edbd5f927639a8c82f0c30e956ddf9b9bc353c3c522389649f6f1796b29975fe7589e8391c768440a8e1b19b96e70c698120ad37f022bdad9277d51ee2a19d5db2e4a27a2ff7f8a68b2d56c907ea2067cfee5506670b621d61f3a79d5e05bcc1ac1fc55297cd6ebf7200caff7f563f63e60157d7543775d889766b525b62555cd5f382b93a59d01b39dfc1e6414cc623b779df5429d6a8a29d3bd13f09161a3bda67a95c88e8cebf1425ef246c00f085930e962e5915041b685227281287e66e0877d67fe42cca3127ca7f8e5c1d42d93a4d77d2f715465f3e92aa52b1e52307bfde2d3a269c0ebd7bb707b97254bc4ad4e6b091a78b32c03eef3a562d894737f694aa90b1d1f6d7f73998bbea3d890f76b80226ec73893744f36c39b6090537dc1a8fbeee6ce69a6bdbf0510cfc9aafbfbfc650e3c735a2bc7521244c853fc85746ad5dd333af8b0ea94a679f75e4f6800df762ea17cfa7dd1293c9b4db082f955472746ab0466a38ccdef56a5b6f43760621055f0ecee8adc7a40cfbea6feb4d8479bcb4bf2895ddafb463b6e31a9fa96c46c5d385e468b8521a596b4747063d0455928356297614493413619ef06e57d6a24a08866ad6986e0e4932f0cf13162b1351b367896a10e760a31accae3edac41f845c7bcfb883400add9a5c613a094fb7ce04d7a7ea6107b96f9858812c40f3ffd9353c316c59b3cf4b3993a12b53bdb60c392a4c7b552a37e83f66a6f35f2857d12f2ef74527fd9cd401d33bcb35c28b04a4daee014b61b384e427f02a56ee1dcac393c1c8c13ca16ed8a1af473f571fa979726196ea324c6a8cc49544d4073a7aaf4c2725b54f9329c5655fd2b4e0a06e9c92dffeb30efceaa6ad95c464d191c597f414e5d95063918ee05ae5cc5f3f3d7be44f77ca5e633af30853f10cfbbb69df716dbb0db3ce97045441cc834be676bccb2c6f950e1c21448bae17f4930bbd9de6738a69bce793191d5f9d8d1d283a187645ddd7626e8e9f7153b6156e026789284013e17c3abb06702983315d7d5ade2d97089845264c29608019b4e8a4e0a5ad7945263247c285b3935b94ea5088c103fb459149d73b4b2a193439eaeb10213d46b5cd7c524a6f26d5ae6a36a83bfdf9601e0fa78cf8f243ac7618ac95831aeb392d93f6b3656a082eb00984284467d2503d80c8f513c294ec832eefe9c635ac32a086258979f3d3fb8bd97e97ec4ba5231f5f4e0b7e674e74d58ab7078ce125ca24f22047b2f4abe571dff38f80317d8f7fc0caa2708d298f1aa492af2305b0870cecec83b0c033d0ab37b9588f9d8efd7b64571b6d0ce84bc1da7baed08d8c73098129d8d0fd4dba446c6707766de450ac5748b152ee8860d6a3af228849e65ff2a57b6f6a790f5da13a8e2ab627b2be1ec296dff19f200fd2f0782351dfc2954f5bb29e91937167bd1e0a7b2737ce238d8f5a46a8607621eb323734580e2cda94b3a0920a2c1b3d2f5f4d3c9f78aaa8579d2e206c161e65b0728aba04b7ccb2e35f1a852655547eb6c6d07b995ac2d69a344d654bbdeb356fa3085d5d81983faaf04f142ea763c03f41e5fb22f0822787cabd0dc9e099c65bb43050c61a43ea4b1cfb220d51a219a99816bcab66cf271685a5a52cd9e5d63b5ffdbe5313f34550bb62387a113c70cf71c33c29956647713f39560f745677a4b2713408dbc4b4b3cbf780e0d36bbbffa27aea4a626d8a26177e147e7d92121e15fd2d9e6b82ca2afcbbd94032486e2c35e3ed9d6d985e295008b66272cc00699cf6f80928946ecbd1912de345e0ec921ed6efe01c0b312b5e77d4e31d42895c5029c7190eab598d4a76ed5fc5bf13af085b714cce5409b1f7222e317b80d1529e61b4c5c8b8bd8ad3d8e926dc3fa1970df0e499314ed54b288566ae87d56d329f6ab02147d407fccd7b0febfe5147c95af3911e617dddd1f3c78b6058c097f92a2cf51c5f3738f5041c077defb54731925c6c4dc07a62faf2a8f41450fe1932562d99d696a0fcbb0c380b0f350895dfbf884125266430c619b175fa0efdc09fbe5a8a71d5c806cd96c8b349e370e150234a5d7faeffe31302d676e72f484045b7a907cb702d917d475f30082a6303f112a47e5f1cfa018bf49e2b676ac26213bfe507f24ef4a44b15d3b9779543783823f58595972610d223ecff3acc90a2c70ecca77c6c8f15b3543648d130d786f5c358a035fe5e57b0d6fbc8dce82696b75e2ae4bb332d47ae2d668ca741d9210ce1c818dc7886d68020b2c98946ec11910f3141c45bc79e30fdc717f920ee938b3c1b92e8ef6b62975713247061203c79008e4ba04b3c11917185d1b77b96f0f74766cc6dc7078ed52324891d9b5466babb4c61231a735dc11578cf4969cfb4df02d2c7f4996d3a31087284c8fa6a7838e81de6c3be650e20162ddf1c5ece3d0184ba7c7bf4fd50d08ba49193e3a9cb9680731178c3994a000f24e3c78a49f2d95c73546e9b97431622ec8c0aed019f63eed1f89152614bbded2d183da4da91d4d6fc0f9d599666e3846ce32ecd0ce82aa957fe615a4cdadccaa3cdd2a587904442f8170aeaf7b62d3268b5c66342f69bf3f1f60cb7c889536cb03cfb255653cc9b4cc85153915798b7e4c8fe744242be02d9d24171e652a8124e960f6a337f3068ff115ed08df2fca7d1aa343ca94ae3b50435a09349f8ac0e4472e93075cf44d572db1af454ee08b39fb74d384de88e58fc2c9426859162ad0d4b665d3deb73aba0e69371f0be86477b26561ed602544ab3f30ec8a06908ad185d831a4134d22c793b48409b3602e8a18d38ddf5c8682e79d6dcb22cf254ed922181492bdb5ef2edc1d2f225943da9033934c5a47c4906f54aeb0e98534f4f2efbc11383e05fec30f71ef58228646e6328273b647a502f616ee4655f64fdac37b6c69eaf5d0b7507d7ac603e5fdcb2408bfd1ae6cc48ee49c487377b74fd8d6271df296733094071501207b9547ef19717a6be876912b1a23e1746f7dd6d6c715c5e42ec7a66b3886f6a6881b87595118862a00cfb8dfd0f7b7eeee5414733efa2da0cc39e0e3b563933ffeafacea8d6215b10c62d2e6fb92d0f473b031c6e4047f826595aca5671d8a41bfc06b215779791526fcffba5ec64415a1020bc4e5e754745b1623e6fdd9ce37a2b38c01bd188bfa356bb356177198785522da887ba5909cecdec10cffbe79ee44102167977b0bcd5afe696ab5410dc4550e6a9b5794ca2037a837f1bceeae35849c95bc1d3f7f52c8cbcc97cd3f3b58304a23e914e8086f67966fe0aacdc62e1b530efa23dca99706a45de7f867f9a45ab3f6e01960716460dbf28bb43b75f1f7a9297e9196d5fe1c8ca21db3802a274527641ab0ad5bb81505c400ec03f97adaddb61d94f9f296a2a1724beb1e9c9b6435d831963e32de931513d8614196675a51273b0e9b5061d035e92ff3262f1fc883e667fe4d246b16392c87a380b81a09fd4bb00373ebb3b69175da329b2498b6ea51800ab8701c5d19f37fab64b34cf4d0cc88ef893b2f08f951743a47d2f2d72d746058ebbb934729b90a73d920edb735be1483e079157b75b450cfb900d2476a3af24c4dd0dfac123913691e882cc04d72d24dccf6b7805cece320fddb384c25176731f561137605ee843b81c3451ba068adf1f875d7cbfe19578e1888e8ed40a1e82c3bf14c44bc838cb415872bfd9e8e8723bcbcdbac256c61e062fc5f772cae1c5e5db81e2c127b752d256f8259cb7e5a5d3321120fba08ba17da5a5f711ab87988f153dd9c7368c2c955e4a08162010c3a560fe14b67940864a9c51e1e9a29fd621c9df6d500c9f034f4569aa500630fe968a91ce1a76446bb94f51787d0c402c5c9581a8b5cfcbe513931bcb43e43a29890d280ec05f9c477634391a119440b831d39f758f9ed16d7dd77d1a2741801d26e9cb8061a10a49d54cd94adf8fc9218f372eeab281b2b6e4a0ab0a2b29b927bb56307cc9bcc87e9bd34392edc1258c9a23151dda443eabcff357debd826c48fcdef967f295c0605c3fa1867e638e453929552a69cfb1905f806dd090eb8495338094c4aae1738ddc1d9ec2a6839e61beddce483e41729408ea870fc1ce8cb5bcda070d9e8ba38b4688dafdc7da4933", &(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)="f9ab387ddf875b28014dc5632886a81ea5b613ab30a4f5478521a7cbbba70bd3df35833ea9bccb74808cb94380aaa73872e8d805f2b9bc2191b23ad3520ce12a5a8505aa50fdff54dfe58fcc8600acc0da8d7ccfdd4a5e29c7fd9d0db6f6595ffde5b161dcaade2c8444296e37f0a3d4219d04d06ed306588dc064ef6d9a2e122a1b425457ed79") r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') connect$inet6(r1, &(0x7f00000006c0)={0xa, 0x4e22, 0x8, @remote, 0x3}, 0x1c) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f00000002c0)=0x0) ptrace$getregset(0x4204, r2, 0x6, &(0x7f0000000440)={&(0x7f00000003c0)=""/88, 0x58}) 10:24:02 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x0}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:24:02 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x10000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:24:02 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x1d8, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x250) [ 466.123852] kernel msg: ebtables bug: please report to author: Total nentries is wrong [ 466.177909] overlayfs: unrecognized mount option "uspe}˝ą»˛µ«o™u˛rdiŽc˙šP˝s‰ ő./file0" or missing value 10:24:02 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x1d8, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x1, [{{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x250) [ 466.283199] overlayfs: unrecognized mount option "uspe}˝ą»˛µ«o™u˛rdiŽc˙šP˝s‰ ő./file0" or missing value [ 466.314193] kernel msg: ebtables bug: please report to author: Total nentries is wrong 10:24:03 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x0, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:24:03 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000180)="4e669874c56a9bd9d06210f54a334a5ffe550f9aa7f1f3b04b6a344c1339520037b76a6bbf986f3ef20370d68925ae4235267f98f6b4d912ae8e", 0x1000001d2) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:24:03 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) prctl$PR_TASK_PERF_EVENTS_DISABLE(0x1f) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)={0x6, {{0xa, 0x4e20, 0xad28, @loopback, 0x2}}, 0x0, 0x7, [{{0xa, 0x4e20, 0x7, @mcast2, 0x401}}, {{0xa, 0x4e20, 0x100, @mcast1, 0xfff}}, {{0xa, 0x4e24, 0x5f, @mcast1, 0x6}}, {{0xa, 0x4e20, 0x8, @mcast2, 0x8}}, {{0xa, 0x4e21, 0xfd6, @loopback, 0x7fff}}, {{0xa, 0x4e22, 0x1f, @mcast2, 0x800000000000}}, {{0xa, 0x4e22, 0x3, @remote, 0x4}}]}, 0x410) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) lsetxattr$security_smack_entry(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)='security.SMACK64\x00', &(0x7f0000000280)='tmpfs\x00', 0x6, 0x3) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 466.487610] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 10:24:03 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x0, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:24:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x0}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:24:03 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) setsockopt$packet_rx_ring(r0, 0x107, 0x5, &(0x7f0000000000)=@req3={0x29, 0x0, 0x315ece44, 0x6, 0x7, 0x1, 0x1564}, 0x1c) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="7570706505baa618917f7248000000002f66696c6534060000006572646d723d2e3a66696cfa302c776fbf726b643ecf38ff8f3865bf4dcc76d00c2d68cb9fa2bd4413b0bab3d7b8f1d764bf60419e4648311955b84375c99a2ccccc803f8a053504fc2ce72a9a480158f99297f49210ad40b71dac04000000fe47eadbb691193c98b3e4e34d150be196017c91b63a41e1b4acd42f0b024c9bd201f7727b0a420afbdf31bc3a5ce0956ffa012def79e132ab7010f7a0db9d2b102ce5a0e1565ea6179f8b0923c2d8097e33140e869ee69cf5ddb3974b2bdf02f73ab5bfc35fa9fb62660f2a5c40258fa5244a6aee9373978eb402f54ac416b9e32236fc887a6968312ada4569a90a5ee116386909dcb8e26295c6e08931748eac71d6cd9b101c7ffe499f290000000000000000"]) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 466.669061] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher 10:24:03 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x0, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:24:03 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x22000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 466.886915] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 466.892956] overlayfs: unrecognized mount option "uppeş¦‘rH" or missing value 10:24:03 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) recvfrom(r0, &(0x7f00000004c0)=""/238, 0xee, 0x40000002, &(0x7f00000005c0)=@tipc=@id={0x1e, 0x3, 0x2, {0x4e24, 0x3}}, 0x80) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.2file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r1, &(0x7f0000000480)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000280)={&(0x7f0000000340)={0x11c, r2, 0xf24, 0x70bd26, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x7c, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x400}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'bridge0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x400}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast2}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @mcast1}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x101}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x1}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x100000000}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xffff}, @IPVS_CMD_ATTR_DEST={0x24, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x10001}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x80000000}, @IPVS_DEST_ATTR_U_THRESH={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x8}]}]}, 0x11c}, 0x1, 0x0, 0x0, 0x844}, 0x40000) [ 466.959049] overlayfs: unrecognized mount option "uppeş¦‘rH" or missing value 10:24:03 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x900}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:24:03 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:24:03 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x0}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 467.110195] overlayfs: failed to resolve '.2file0': -2 [ 467.154080] overlayfs: failed to resolve '.2file0': -2 [ 467.193212] device bridge_slave_1 left promiscuous mode 10:24:03 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 467.198734] bridge0: port 2(bridge_slave_1) entered disabled state [ 467.255092] device bridge_slave_0 left promiscuous mode [ 467.262346] bridge0: port 1(bridge_slave_0) entered disabled state [ 467.290863] IPVS: ftp: loaded support on port[0] = 21 10:24:04 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000100)='cdg\x00', 0x4) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:24:04 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='up\b0,lowerdir=.:fidir\a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:24:04 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 467.434268] team0 (unregistering): Port device team_slave_1 removed [ 467.457578] team0 (unregistering): Port device team_slave_0 removed [ 467.512057] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 467.552116] overlayfs: unrecognized mount option "up0" or missing value 10:24:04 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x248, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2c0) 10:24:04 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x200) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000280)={r0, 0x0, 0x1000, 0x1f, &(0x7f0000000800)="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", &(0x7f0000000180)=""/31}, 0x28) r1 = open(&(0x7f0000000400)='./file0/f.le.\x00', 0x1ffffd, 0xbdd11e4bbd860cfe) fchdir(r1) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) fsetxattr$security_evm(r1, &(0x7f0000000340)='security.evm\x00', &(0x7f0000000380)=@v1={0x2, 'Z'}, 0x2, 0x1) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r2 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r2, &(0x7f0000000240)='.//ile0\x00', r2, &(0x7f00000007c0)='./file0/f.le.\x00') [ 467.565730] overlayfs: unrecognized mount option "up0" or missing value [ 467.593000] bond0 (unregistering): Releasing backup interface bond_slave_0 10:24:04 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x0}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 467.669122] x_tables: eb_tables: redirect target: used from hooks POSTROUTING, but only usable from PREROUTING/BROUTING [ 467.736041] bond0 (unregistering): Released all slaves [ 467.811912] overlayfs: workdir and upperdir must reside under the same mount [ 467.869953] overlayfs: workdir and upperdir must reside under the same mount [ 468.895542] bridge0: port 1(bridge_slave_0) entered blocking state [ 468.902142] bridge0: port 1(bridge_slave_0) entered disabled state [ 468.910658] device bridge_slave_0 entered promiscuous mode [ 468.963227] bridge0: port 2(bridge_slave_1) entered blocking state [ 468.969720] bridge0: port 2(bridge_slave_1) entered disabled state [ 468.977788] device bridge_slave_1 entered promiscuous mode [ 469.028627] IPv6: ADDRCONF(NETDEV_UP): veth0_to_bridge: link is not ready [ 469.079550] IPv6: ADDRCONF(NETDEV_UP): veth1_to_bridge: link is not ready [ 469.231192] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 469.285296] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 469.470075] IPv6: ADDRCONF(NETDEV_UP): team_slave_0: link is not ready [ 469.478117] team0: Port device team_slave_0 added [ 469.527359] IPv6: ADDRCONF(NETDEV_UP): team_slave_1: link is not ready [ 469.535373] team0: Port device team_slave_1 added [ 469.586218] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 469.618595] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 469.649402] IPv6: ADDRCONF(NETDEV_UP): bridge_slave_0: link is not ready [ 469.656901] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 469.666405] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 469.708049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 470.016576] bridge0: port 2(bridge_slave_1) entered blocking state [ 470.023020] bridge0: port 2(bridge_slave_1) entered forwarding state [ 470.029613] bridge0: port 1(bridge_slave_0) entered blocking state [ 470.036036] bridge0: port 1(bridge_slave_0) entered forwarding state [ 470.043218] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 470.872732] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 471.091443] 8021q: adding VLAN 0 to HW filter on device bond0 [ 471.189900] IPv6: ADDRCONF(NETDEV_UP): veth0: link is not ready [ 471.286285] IPv6: ADDRCONF(NETDEV_UP): veth1: link is not ready [ 471.292666] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 471.299861] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 471.395799] 8021q: adding VLAN 0 to HW filter on device team0 10:24:08 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000680)='/dev/hwrng\x00', 0x8100, 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f00000006c0)={0x0}) ioctl$DRM_IOCTL_GET_SAREA_CTX(r0, 0xc010641d, &(0x7f00000007c0)={r1, &(0x7f0000000700)=""/188}) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1001100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dsp\x00', 0x0, 0x0) ioctl$int_in(r5, 0x800000c0045004, &(0x7f00000004c0)) r6 = syz_open_dev$ndb(&(0x7f0000000180)='/dev/nbd#\x00', 0x0, 0x200) stat(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_ENTRY(r2, &(0x7f0000000400)={0x90, 0xfffffffffffffff5, 0x7, {0x2, 0x3, 0x7, 0x0, 0x9, 0x39, {0x0, 0x74a, 0x1, 0x101, 0x3ff, 0x0, 0x4, 0xfff, 0x9f53, 0x10000, 0xed, r7, r8, 0x1, 0xffffffff}}}, 0x90) ioctl$BLKRESETZONE(r6, 0x40101283, &(0x7f00000001c0)={0xff, 0x1fffffffe}) ioctl$KVM_GET_CLOCK(r5, 0x8030ae7c, &(0x7f0000000640)) r9 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x49, 0x40000) r10 = syz_genetlink_get_family_id$nbd(&(0x7f0000000540)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r9, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x5000080}, 0xc, &(0x7f00000005c0)={&(0x7f0000000580)={0x20, r10, 0x0, 0x70bd28, 0x25dfdbff, {}, [@NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0xffff}]}, 0x20}}, 0x20000000) write$FUSE_GETXATTR(r9, &(0x7f0000000140)={0x18, 0xfffffffffffffffe, 0x4, {0x6}}, 0x18) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="863310646e6f3d", @ANYRESHEX, @ANYBLOB=',seclabel,fsname=uname,subj_user=trans=fd,,euid<', @ANYRESDEC=0x0, @ANYBLOB=',smackfshat=wfdno,\x00']) 10:24:08 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x248, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2c0) 10:24:08 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="75707065726469723d2e2ff13047e93f765cea88796a7acfb1b466696c65302c6c6f776c65302c776f706b6469723d2e2f66696c6531"]) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000280)='.//ile0\x00', r0, &(0x7f0000000180)='./file0/f.le.\x00') 10:24:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x0}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:24:08 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x40000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:24:08 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setxattr$trusted_overlay_nlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='trusted.overlay.nlink\x00', &(0x7f0000000280)={'U-', 0x1}, 0x28, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe2(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$KDGETKEYCODE(r0, 0x4b4c, &(0x7f0000000600)={0x401, 0x5}) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$packet(r0, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f00000006c0)=0x14) write(r3, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) ioctl$TUNSETVNETBE(r1, 0x400454de, &(0x7f0000000680)) ioctl$SG_GET_RESERVED_SIZE(r2, 0x2272, &(0x7f0000000580)) vmsplice(r3, &(0x7f0000000180)=[{&(0x7f00000001c0)="df6a67b675afc748751a7c98a4e5ca34504eafa409345952071d166ca3bfcd8829443eb6d7a817bfdc58009e1090a7dc40b0437b69273914af36956ffd3f2c010d9940632437c4fc474797b3b390c2617ddc39763009f010622430df21587a0024db6597c46eba161af1eb4be5fde790112b8a1b808500000000000000000000000000000000000000", 0xfffffffffffffe46}], 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000700)={@in6={{0xa, 0x4e20, 0xdf5, @empty, 0x5}}, 0x0, 0x1ff, 0x0, "8c73e961382fe72e9236be288a0b8f42d86f4d78a789bc287b82498383b80f4089b5ee819c255391fef4645f14ff94332e042bf90c5f87989947793fc733136ab3bf21d9af24c88e296bb6f545c3ae8b"}, 0xd8) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f00000002c0)=0x0) ioctl$TCSETAW(r1, 0x5407, &(0x7f0000000640)={0x3, 0x4, 0x8, 0x6, 0x200000000000, 0x313, 0x80, 0x9, 0x7, 0xfff}) get_robust_list(r4, &(0x7f00000004c0)=&(0x7f0000000480)={&(0x7f0000000300), 0x0, &(0x7f0000000440)={&(0x7f0000000400)}}, &(0x7f0000000500)=0x18) [ 471.976570] 9pnet: Insufficient options for proto=fd [ 472.040201] x_tables: eb_tables: redirect target: used from hooks POSTROUTING, but only usable from PREROUTING/BROUTING [ 472.075828] overlayfs: unrecognized mount option "lowle0" or missing value 10:24:08 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x0}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:24:08 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 472.092581] overlayfs: unrecognized mount option "lowle0" or missing value 10:24:08 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x248, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2c0) 10:24:08 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) statfs(&(0x7f0000000000)='./file1\x00', &(0x7f0000000180)=""/50) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:24:08 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sequencer2\x00', 0x2200, 0x0) ioctl$UI_SET_KEYBIT(r0, 0x40045565, 0xfb) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) r3 = dup3(r2, r1, 0x80000) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x1f, 0x9, 0xfffffffffffff76f, 0x9, 0x800, 0xfffffffffffffff8, 0x2, {0x0, @in={{0x2, 0x4e23, @empty}}, 0x8, 0x80000001, 0x0, 0x1b6, 0x5}}, &(0x7f0000000080)=0xb0) setsockopt$inet_sctp6_SCTP_AUTH_DELETE_KEY(r3, 0x84, 0x19, &(0x7f00000002c0)={r4, 0x4}, 0x8) [ 472.243541] x_tables: eb_tables: redirect target: used from hooks POSTROUTING, but only usable from PREROUTING/BROUTING [ 472.254438] 9pnet: Insufficient options for proto=fd 10:24:08 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 472.338387] overlayfs: filesystem on './file0' not supported as upperdir [ 472.389437] 9pnet: Insufficient options for proto=fd 10:24:09 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r0, 0x50, &(0x7f0000000340)}, 0x10) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') chdir(&(0x7f0000000180)='.//ile0\x00') [ 472.446527] kernel msg: ebtables bug: please report to author: bad policy [ 472.458339] 9pnet: Insufficient options for proto=fd 10:24:09 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:24:09 executing program 0: pipe2$9p(&(0x7f0000000000), 0x2) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:24:09 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0xfffffffffffffffd) r2 = creat(&(0x7f0000000340)='./file0/file0\x00', 0x10) ioctl$sock_FIOGETOWN(r2, 0x8903, &(0x7f00000003c0)) poll(&(0x7f00000001c0)=[{r1, 0x1000}, {r0, 0x4000}], 0x2, 0x101) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="7472616e733d66aa000000646e6f3d", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',seclabel,fsname=uname,subj_user=trans=fd,,euid<', @ANYRESDEC=0x0, @ANYBLOB=',smackfshat=wfdno,\x00']) r3 = socket(0x15, 0x7, 0x3) connect$nfc_llcp(r3, &(0x7f00000002c0)={0x27, 0x0, 0x1, 0x0, 0x17aacbe9, 0x2, "76ad9c87b7c06598fcbcbb7633f72b98cd533b6fb83f3cf1d753e1a8982e37967a93fd072ee98ad2cd0051f808e7f8cf20dcd1e209cb97ca46fde068ff7a8b", 0x13}, 0x60) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) getpeername$tipc(r4, &(0x7f0000000140)=@id, &(0x7f0000000180)=0x10) [ 472.644264] 9pnet: Insufficient options for proto=fd [ 472.673743] kernel msg: ebtables bug: please report to author: bad policy [ 472.772702] 9pnet: Could not find request transport: fŞ 10:24:09 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:24:09 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x800000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:24:09 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x0}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:24:09 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000000)=0x9, 0x4) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e3a66696c65302c77ef726b6469723d2e2f31"]) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:24:09 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x6, 0x0, 0x2000000000000, 0x0, 0x0, 0x0, 0x1817}, 0x0, &(0x7f0000000100)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="a9b591d8e68b9090be604715aa2bd70091202a4d0e205850dd8c0f54252e21df2df8fba6428fde96e424f97b31", 0x2d}], 0x1, 0xc) 10:24:09 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/mixer\x00', 0x800, 0x0) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x72, &(0x7f0000000140)={0x0, 0x81, 0x20}, &(0x7f0000000180)=0xc) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000001c0)={r2, 0x9}, &(0x7f00000002c0)=0x8) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000300)={0x0}, &(0x7f0000000340)=0xc) wait4(r3, &(0x7f0000000380), 0x41000000, &(0x7f00000003c0)) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 472.932202] kernel msg: ebtables bug: please report to author: bad policy [ 472.958700] overlayfs: unrecognized mount option "wďrkdir=./1" or missing value 10:24:09 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x248, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2c0) [ 472.985383] 9pnet: Insufficient options for proto=fd [ 473.018709] 9pnet: Insufficient options for proto=fd 10:24:09 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mkdir(&(0x7f0000000080)='./file0\x00', 0x1da) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',seclabel,fsname=uname,subj_user=trans=fd,,euid<', @ANYRESDEC=0x0, @ANYBLOB="2c736d61636b66736861743d7766646e6f6381e2f9a3f517faa039524d2c8ad3ee31e269c844a7a03ef208166adf97c8856521054502c8d0581f3d486932e69a105cda27d88a3f6b85c8c1d7fa9158178046a7a70d02606084897bbed0a082cbd8499fd30a91c057db891d693f2081bd705eb28d639aa65c6d977643a7ec669bdd04fec31495e1a63216981a6b210c5003f7b738ea66fbc32eabade9a511774f96ac0646b7305a4efbb34e9408e24e5a78a071436682b1d7dabbdc9ff84f178fbca24df61acabbbb343e8e24acc672"]) r0 = syz_open_dev$vbi(&(0x7f0000000140)='/dev/vbi#\x00', 0x0, 0x2) getsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000180), &(0x7f00000001c0)=0x8) [ 473.044779] overlayfs: unrecognized mount option "wďrkdir=./1" or missing value [ 473.052218] x_tables: eb_tables: redirect target: used from hooks POSTROUTING, but only usable from PREROUTING/BROUTING 10:24:09 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x248, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2c0) 10:24:09 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:24:09 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c7365636c6162656c2c66736e616d653d756e616d652c7375626a5f757365723d7472616e733d66642c2c657569643c0ba0d8c20aa532b2ca9c15a9fb533817abd473b9ace888911349f8d8078c5c92608013659a709a05f2aca11bcb98100345e3ec3e9a98ee9457b3f506ba9d5a76f4d7e493017363b1618f2b36001157bc377efaefabf98ebb1ff552cde8b0b5621c6cd35b8ac83ed3583d4511038a890be4d63c9ce918455b6f4141bcdda1a1ecdf908feabe02d5f2cbb94255c1bc521af17eb0acc47c95572adb1bd8cf", @ANYRESDEC=0x0, @ANYBLOB=',smackfshat=wfdno,\x00']) [ 473.178716] 9pnet: Insufficient options for proto=fd [ 473.223096] x_tables: eb_tables: redirect target: used from hooks POSTROUTING, but only usable from PREROUTING/BROUTING 10:24:09 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x248, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2c0) 10:24:10 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1a000, 0x9) syz_open_dev$mice(&(0x7f0000000280)='/dev/input/mice\x00', 0x0, 0x2000) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000600)={0x0, r0, 0x0, 0x10, &(0x7f00000005c0)='/dev/input/mice\x00', 0xffffffffffffffff}, 0x30) get_robust_list(r1, &(0x7f0000000700)=&(0x7f00000006c0)={&(0x7f0000000680)={&(0x7f0000000640)}}, &(0x7f0000000740)=0x18) ioctl$VIDIOC_S_DV_TIMINGS(r0, 0xc0845657, &(0x7f00000004c0)={0x0, @bt={0x4, 0x1, 0x0, 0x2, 0x2, 0x6, 0x10001, 0x200, 0x1ff, 0x9aa, 0x0, 0x7, 0x9, 0x8, 0x4, 0x23}}) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000580)='9p\x00', 0x2000000, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYRES64=r3, @ANYRESHEX, @ANYRESHEX=r2, @ANYRESDEC=0x0, @ANYBLOB="2c7b6d61626b6673dd68617c3d7766646b62e7463eb71a9288bc468a150800"]) syz_mount_image$hfsplus(&(0x7f0000000080)='hfsplus\x00', &(0x7f0000000140)='./file0\x00', 0x6, 0x4, &(0x7f00000003c0)=[{&(0x7f0000000180)="46ff5ddd193074cf286206b6303c4337361269cce73f694c8c734b684b7317b23a7213d12a8e50e59b86ea64d2721085a20c10e89d9848e4e251eeb569995d2e78fa20eac31d24b388f0ab1129d9046d553782a3d8742857eefe7c14b87cbd1c328c3d6c52bb34335815ef2f54a92bac8fda4be6", 0x74, 0x6}, {&(0x7f00000002c0)="3426611034b2a2423eccec", 0xb, 0x9}, {&(0x7f0000000300)="d72baae3ec5c3bd34218aa9590dd9b9a45bf74ffe505d962a272b3eeec8c294afcbfabf4defe276101aac1596697465385d0", 0x32, 0x8}, {&(0x7f0000000340)="4ada679f4e82a6ef4c9c59ba070cd0be6154f26f6ebec5c76e008d36c21b59abd4bce8c5548a1be59d2f41e047cbdf41ee323e061e3ac2e34dfce5ae45ff0ffe27bb594f074b3e5c43248dafab64c16ce94a0579e53c3d706291ab5b1f9ecbe2aceea4c88793f0f490", 0x69, 0x2}], 0x211000, &(0x7f0000000440)={[{@barrier='barrier'}, {@force='force'}, {@nodecompose='nodecompose'}, {@force='force'}], [{@fscontext={'fscontext', 0x3d, 'user_u'}}, {@dont_appraise='dont_appraise'}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}]}) [ 473.370148] 9pnet: Insufficient options for proto=fd [ 473.447292] x_tables: eb_tables: redirect target: used from hooks POSTROUTING, but only usable from PREROUTING/BROUTING [ 473.474141] 9pnet: Insufficient options for proto=fd 10:24:10 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x1000000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:24:10 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) name_to_handle_at(r0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000180)={0x32, 0x2, "17e1ec7030d9739ecf2a0c2051e71fc164af037ede72f9523dcbc23f8b4432718cd42ae19ad9bb2a249d"}, &(0x7f0000000280), 0x1000) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x9) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:24:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x0}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:24:10 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) llistxattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)=""/244, 0xf4) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans\b\x00d,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',seclabel,fsname=uname,subj_user=trans=fd,,euid<', @ANYRESDEC=0x0, @ANYBLOB=',smackfshat=wfdno,\x00']) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x80800) recvfrom$unix(r0, &(0x7f0000000180)=""/102, 0x66, 0x40000000, &(0x7f00000003c0)=@abs={0x1, 0x0, 0x4e22}, 0x6e) 10:24:10 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:24:10 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x4}, 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:24:10 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000080)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) setsockopt$RDS_RECVERR(r1, 0x114, 0x5, &(0x7f0000000140), 0x4) fstat(r0, &(0x7f0000000200)) mount$9p_fd(0x0, &(0x7f00000001c0)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x800, &(0x7f0000000380)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}}) [ 473.913583] kernel msg: ebtables bug: please report to author: bad policy 10:24:10 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:24:10 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000180)='./file0/f.le.\x00', &(0x7f0000000000)='./file0/f.le./file0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696ca6ebcc92027765726469723d2e3a66696c65302c776f726b6469723d2e2f66696c6531"]) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 474.033009] kernel msg: ebtables bug: please report to author: bad policy 10:24:10 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00'}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 474.075017] 9pnet: Insufficient options for proto=fd [ 474.109815] 9pnet: Insufficient options for proto=fd [ 474.110626] overlayfs: missing 'lowerdir' 10:24:10 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x0}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:24:10 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) r0 = syz_open_dev$adsp(&(0x7f0000000080)='/dev/adsp#\x00', 0x8, 0x0) ioctl$EVIOCSKEYCODE(r0, 0x40084504, &(0x7f0000000140)=[0x5, 0xff]) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) setxattr$trusted_overlay_upper(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='trusted.overlay.upper\x00', &(0x7f00000002c0)={0x0, 0xfb, 0x110, 0x6, 0x800, "334b55fe27a3c0155566e4adf91113f5", "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"}, 0x110, 0x1) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 474.172640] overlayfs: missing 'lowerdir' [ 474.173007] kernel msg: ebtables bug: please report to author: bad policy [ 474.313332] 9pnet: Insufficient options for proto=fd [ 474.364954] 9pnet: Insufficient options for proto=fd 10:24:11 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0/f.le.\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:24:11 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x248, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2c0) 10:24:11 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x1000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:24:11 executing program 0: pipe2$9p(&(0x7f0000000080), 0xfffffffffffffffb) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="74be656e733d66642c7266646e6f3d61b66d3552dd60e0ef8c6eac80eb23f4a15e1179e5fa8f7b782a5e6a06ce28d539bc5ff4e95c5cb7f1747387afaa7caa2f9d561910e2db82f299e8b4cb582611eec88fc03bf752f01d111e40fbbedfd6027a1f489551411797755eb8801e7e3efba59840e9e2a07182ac7bbb1656818600fdb063c5380c932976cb147ce3bcffb3329bc5f4c35ddd16546c0647de1a62a835a9b726fa4254547e9206c891a50de2f9ee82f1ced6f08a6a04165f87a2384e2ee4631c75f2835ea11e492f22e79af22edf38", @ANYRESHEX, @ANYBLOB="2c85f876000000", @ANYRESHEX, @ANYBLOB=',seclabel,fsname=uname,subj_user=trans=fd,,euid<', @ANYRESDEC=0x0, @ANYBLOB="2c736d61636a66878c9846b65bfd4daff31b736861743d7766646e6f2c00"]) 10:24:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x0}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:24:11 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000100)='/dev/radio#\x00', 0x0, 0x2) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000180), &(0x7f00000001c0)=0x4) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:24:11 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x8) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 474.824403] x_tables: eb_tables: redirect target: used from hooks POSTROUTING, but only usable from PREROUTING/BROUTING 10:24:11 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_X86_SET_MCE(r0, 0x4040ae9e, &(0x7f0000000000)={0x200000000000000, 0x5000, 0x1, 0x2, 0x9}) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000180)='/dev/snapshot\x00', 0x201, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:24:11 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x248, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2c0) [ 474.993194] 9pnet: Insufficient options for proto=fd 10:24:11 executing program 0: r0 = socket$inet6_dccp(0xa, 0x6, 0x0) sendmmsg(r0, &(0x7f0000000840)=[{{0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000140)="e2b5ee3961d12c2884bb11f59b52770bd31affd772f3e4906950be6e7bcd1aeee879135d9dadf9468b29e70d8b3b16db7782f8c5297e6c2401cfc89f8444da46d1f70c81222da216d7e30343d69be65cbfac61abe26ff611e85f07561bcf42fa26c96c8013639c44c13ad940700e7e662afe1c3aac22", 0x76}], 0x1, &(0x7f00000002c0)=[{0x98, 0x101, 0x0, "296e8cbe085f475d2af8abc6a521adf3b71996faae7df42a1afbb7ad632fb79ee707ec55873b82dbd111a754a40a136598dfd89168feaf7830d37438d33c35e7a63603408527852052e12717a0912f7a63841c66c8f0e603f3761350a217e28bb6beb9bb16f4da6ffd33d6686e6308e39b1a2c46707b15b9f2b7053cad38c9216b"}, {0x38, 0x84, 0x20, "755f4095b0ec4f5869ad88b5eb4d5423a307ce84af1f074d9a06d424d1b9a9f137afd5ea"}, {0x38, 0x10f, 0x7, "c2c75550bf763d3b4db516b2db5ccc154e775fe1d043e9059916660829a4da95a5"}], 0x108}, 0x1}, {{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000400)="a291d482fbf779e0bce02158e8f93dc1074a8f63ae7a2c6d7350865bd32c21962835c9df0e0f30f3190625d0031b077473d3b76e6f19c03b86e11800e4d42ab53aa93cd4001c76d6f6f980f8b67f7c4b0d075a0019cdb63f958dedb4d71a8c544c7f5431ff31d1249b9875417bd0adce55010b411f0514c2dc94558c587ad9886d10cf01659babbc07c81124e00b3c4cc2df85807cdf2dc5ea6031dfd42684305dd003b8f241e6e9a0caaebba4c9fc07fb1d004f3b6ad5f95cc41044d9812bfecd9a72c11688d8eceb177f8a1d46a07d28e430c6d44d5e8afb92e49641", 0xdd}, {&(0x7f0000000500)="645336bc3fa0da684c32621cd1a7d300a8259a2f40f11fed4197be7c4ad7c63eebc33a9976e71c99dc36ae747e3580ff47f25042fec91268c935f37ef695f3844d30329defe99008e5f5484c8452984698f7fd686353ea77c51012a6f231be1e4c56d7fb440bff1dfa3242c4e253ca3c9e9ab192efcf5f70fdbf65010b191bc10d48e19b71284b1d6994a92860fabb1173afe435c49c31c766901a9eb0078fb52d9c5f3539cacbbae48a880da6ef748805623aeafc1d480fecbe67f92ccc61c48744ba57922334d1cffec5cabfadb7ed2f0d49338c6679ba26d5b154f2a70a822f803e53306381768b8c3f74c9f6e8f4ef", 0xf1}, {&(0x7f0000000600)="3829d87a04cea23648d702b67203542efaaab5cced047580b16e3b7e6d790d297445dd88a11653cd78bb59c1de0fc712d75a15954d812d6f69992f30ec737826e7cb0ac0a0abba5d9386821a051b1721fca8bb4a179e20b7ea089d15422765545fb73ee0c7", 0x65}], 0x3}, 0x200}, {{&(0x7f0000000680)=@nl=@unspec, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000700)="08fa183f0998c648f1316ca0d2141ccc973f845f51316dce721dad8a68b01b511e184efa49db220c9dac8f169d95bf6df0ef7d548291e3463d8ef344f5904ace8b611dbab77c02", 0x47}, {&(0x7f0000000780)="cf4ffa06519bfc8b6ce2", 0xa}], 0x2, &(0x7f0000000800)}, 0x40}], 0x3, 0x40000) pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x1, 0x2) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000800)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f0000000ac0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000a80)={&(0x7f0000000a40)={0x1c, r2, 0x100, 0x70bd2c, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x48000) clone(0x3000200, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="7472254963ca5fbd616e733d66642c01046d843e48655d8a15529c172c25a0765f843bc15d5845265d0ae01897eea37f5504bfb40300e4e6df4316f382428523c495f883d00e2870a02c1fe34aa6369e994f7032ff6a5a2e7d524fd2f89775c355dfdf5e037cad5372595ec607f09498fccb5e358eafbfb7f6d72035d8a43303abff36e2eb6e5a32b7dcfb3461acf8fa026879e3a5f43a1f8b122978042c6c3a1070bc250403d6c9f464068544f00647838a838a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',seclabel,fsname=uname,subj_user=trans=fd,,euid<', @ANYRESDEC=0x0, @ANYBLOB=',smackfshat=wfdno,\x00']) accept$alg(r1, 0x0, 0x0) setsockopt$sock_linger(r0, 0x1, 0xd, &(0x7f0000000200)={0x1, 0xffffffffffffffc0}, 0x8) [ 475.027383] x_tables: eb_tables: redirect target: used from hooks POSTROUTING, but only usable from PREROUTING/BROUTING [ 475.028266] 9pnet: Insufficient options for proto=fd 10:24:11 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x248, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2c0) 10:24:11 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x0}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:24:11 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) [ 475.200154] x_tables: eb_tables: redirect target: used from hooks POSTROUTING, but only usable from PREROUTING/BROUTING [ 475.234223] overlayfs: filesystem on './file0' not supported as upperdir 10:24:11 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') setsockopt$inet_dccp_buf(r0, 0x21, 0x0, &(0x7f00000003c0)="1fa9c7740124473ad7fe101ce0681bdcff5b9d92647d7cb7545bf39a743d7e3cfee707a090a17a72704de29829176d2c968e5b2d40e453bdf5eb2e423bec04ca43499f7911941302abf702d69c7e3595e99b0478aa4d742f33a9e41dd0825ccb55ae3a1e5541b60287", 0x69) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f0000000340)={0x7, 0x5, 0x62}) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 475.335185] kernel msg: ebtables bug: please report to author: bad policy 10:24:12 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x400000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:24:12 executing program 0: r0 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x0, 0x2) bind$vsock_dgram(r0, &(0x7f0000000140)={0x28, 0x0, 0x0, @host}, 0x10) pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) 10:24:12 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:24:12 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x0}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:24:12 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r1, 0xc08c5335, &(0x7f0000000340)={0x4000000000000000, 0x5, 0x8001, 'queue0\x00', 0x800}) 10:24:12 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) fchmodat(r0, &(0x7f00000002c0)='./file0\x00', 0x20) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) init_module(&(0x7f0000000100)='vmnet1\x00', 0x7, &(0x7f0000000240)='selfGPL/userbdev\x00') perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x2d, &(0x7f0000000180)={0x2, {{0x2, 0x4e22, @remote}}}, 0x88) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) setsockopt$inet_sctp6_SCTP_NODELAY(r2, 0x84, 0x3, &(0x7f0000000280)=0xe838, 0x4) 10:24:12 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240)='/dev/snapshot\x00', 0x40000, 0x0) ioctl$BLKGETSIZE(r0, 0x1260, &(0x7f0000000280)) pipe2$9p(&(0x7f0000000000), 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000140)='/dev/mixer\x00', 0x10000, 0x0) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000000180)={0xa, [0xffffffffffff4840, 0x5, 0x7f, 0x8, 0x3067, 0x7, 0x0, 0x400, 0x1000, 0x3]}) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r2 = memfd_create(&(0x7f0000000080)='9p\x00', 0x4) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r2, 0x6, 0x15, &(0x7f0000000200)=0x2, 0x4) clone(0x2000000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="7472616ef7733d66642c7266646e6f8f66fd23defe98d290fdd88988b069c36db8873abbc4", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c736665636c6162656c2c66736e616d653d756e616d652c7375626a5f757365723d7472616e192038cefc5f19733d666475eede1f3633f702a972725e7d0c9c0ed89e443dfa56947740b1c333e7e81771fcb9939952c94c6cd7e83ad6ad3738ea01000080000000005e55fa715de73f1eba89cd8021ee6be498c36320bff21adbb566915f8ebb81351016bc680c11b675c2633ddf8806b3c0f62f759b0673ffcf902c125dc7ee7ab0241588fc3f55c788c86812178d4f23745e570d58fd508fceeef9639153e4e1091bf0f867f16a31c96516007b2e977b8bd58c5b2ebf1730c1337c2e8e48656dc4519e677dd2b8fd9904d26b806d3224730506c452409f9d221c6e80c5d7ae750db2194f1510745e8e65", @ANYRESDEC=0x0, @ANYBLOB=',smackfshat=wfdno,\x00']) [ 475.786461] kernel msg: ebtables bug: please report to author: bad policy [ 475.799153] 9pnet: Insufficient options for proto=fd 10:24:12 executing program 3: r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00'}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:24:12 executing program 1: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000180)=0xc) migrate_pages(r0, 0x5, &(0x7f0000000280)=0x4, &(0x7f0000000340)=0x3f) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r2) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="757070657264a869723d2e2f66696c65302c6c6f7765726469723d2e3a66696c65302c776f726b64695696723d2e2f66696c65"]) r3 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CLIENT(r2, 0xc0286405, &(0x7f00000003c0)={0x200, 0x100, r0, 0x0, r1, 0x0, 0x10000000000, 0x3}) umount2(&(0x7f0000000380)='.//ile0\x00', 0x1) ioctl$TCSBRK(r3, 0x5409, 0xf26) setxattr$security_evm(&(0x7f0000000400)='./file0/f.le.\x00', &(0x7f0000000440)='security.evm\x00', &(0x7f0000000480)=@v1={0x2, "e95b72d2"}, 0x5, 0x2) renameat(r3, &(0x7f0000000240)='.//ile0\x00', r3, &(0x7f00000007c0)='./file0/f.le.\x00') [ 475.831356] overlayfs: filesystem on './file0' not supported as upperdir [ 475.944857] kernel msg: ebtables bug: please report to author: bad policy [ 476.009765] overlayfs: unrecognized mount option "upperd¨ir=./file0" or missing value 10:24:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x5efff7f00000000}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) [ 476.063001] overlayfs: unrecognized mount option "upperd¨ir=./file0" or missing value 10:24:12 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000000)='.//ile0\x00', 0x80000004) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') ioctl$FIDEDUPERANGE(r0, 0xc0189436, &(0x7f0000000480)=ANY=[@ANYBLOB="0400000000000000ea0b0000000000000200000000000000", @ANYRES32=r0, @ANYBLOB="000000008e000000000000000000000000000000000060f0685ca3d172af5e3a9d14d852c0bb036446bebbd07ffa5364e059d71ca677734abfe8ea43c97f4a0706ddf11bc57229913df4e6b8444161a60f06ab2070e7231ac88abb6a43f40579b4a22bbcd6aefa7270aa952abaa129799fefe44ae6e3c18f4a5dbd071ceee331b90a88f7b656123209318b1f0d62c26bbce1cf6043f7875a6d18e35bc551e1243527b49759972fcb2c12aa48315d0a9de0267298d2bb0624fd83da603dbe25680d5d8f0eebf48fba4c5dfcd00e400700000000000000000000000000000000", @ANYRES32=r0, @ANYBLOB="00000000040000000000000000000000000000000000000000000000"]) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f77657205000000000000000100012c770bfd0000000000002f66696c6531"]) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x2) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:24:12 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) fchmod(r0, 0x20) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) [ 476.350464] overlayfs: unrecognized mount option "lower" or missing value [ 476.437024] 9pnet: Insufficient options for proto=fd 10:24:13 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0x300000000000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:24:13 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x0}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:24:13 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x1) 10:24:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x7fffef05}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:24:13 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ioctl$BLKSECDISCARD(r0, 0x127d, &(0x7f0000000000)) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') 10:24:13 executing program 4: mkdir(&(0x7f0000000100)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(r0, &(0x7f00000003c0)="3f4ccc64bb75b7dd3b85f0ffd235b978111ebbfa87eb4f068a144585a5a053f4fb42bdc36ee63d664ed52f2b1547ecb5d2108ba93f0ea3dccf6b568e8475b26b2699dd2db0005629aed81d1c6b87e297f6beb100166ce01facee4dd985c6c1f0faf50ce436eca88765155c0a1af61e884dd288e7b886d299baf3ff019c9f266cd6670c1e7ee845e5a917b97f0299bd77427732d3c2ce6331d29cdeeca4171230e6705de3808a298aa96ec1c6ea0effaa3c87a37ebe8da7bf588aa60eeeb123ef95d15ae21a0f9782c970a1af6b03d52b59dba6fca22e9064972415cc7d11", 0x2d4) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 476.721190] 9pnet: Insufficient options for proto=fd 10:24:13 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000080)='/dev/snapshot\x00', 0x101000, 0x0) ioctl$DRM_IOCTL_AUTH_MAGIC(r0, 0x40046411, &(0x7f0000000140)=0x400) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',seclabel,fsname=uname,subj_user=trans=fd,,euid<', @ANYRESDEC=0x0, @ANYBLOB="2c736d61636bff01000000000000646e6f2c00"]) [ 476.754490] 9pnet: Insufficient options for proto=fd 10:24:13 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) execveat(r0, &(0x7f00000006c0)='.//ile0\x00', &(0x7f0000000880)=[&(0x7f0000000700)='tmpfs\x00', &(0x7f0000000740)=':.+cgroup@\xfe\x00', &(0x7f0000000780)='^{', &(0x7f0000000800)='\x00', &(0x7f0000000840)='.em1^\x00'], &(0x7f0000000a80)=[&(0x7f00000008c0)=')\x11-mime_type-^posix_acl_accessvmnet0ppp1\\vboxnet1\x00', &(0x7f0000000900)='\x00', &(0x7f0000000940)='&\x00', &(0x7f0000000980)=':.+cgroup@\xfe\x00', &(0x7f00000009c0)='[`\\[vmnet0:*:lo-security\x00', &(0x7f0000000a00)='}eth1-(\x00', &(0x7f0000000a40)='-/\x00'], 0x1100) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) execve(&(0x7f0000000000)='./file1\x00', &(0x7f0000000540)=[&(0x7f0000000180)='{mime_type\x00', &(0x7f0000000280)='tmpfs\x00', &(0x7f0000000340)='overlay\x00', &(0x7f0000000380)=':.+cgroup@\xfe\x00', &(0x7f00000003c0)='trusted\x00', &(0x7f0000000400)='overlay\x00', &(0x7f0000000440)='tmpfs\x00', &(0x7f0000000480)='tmpfs\x00', &(0x7f00000004c0)='tmpfs\x00', &(0x7f0000000500)='\x00'], &(0x7f0000000680)=[&(0x7f00000005c0)='\x00', &(0x7f0000000600)='$cgroup\x00', &(0x7f0000000640)='#mime_type%vboxnet0ppp0\x00']) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000b80)={0xfffffffffffffff8, 0x7, 0x7, 'queue1\x00', 0x10001}) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000b40)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 476.951363] 9pnet: Insufficient options for proto=fd 10:24:13 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c73655305000000000000736e616d653d756e616d652c7375626a5f757365723d7472616e733d66642c2c657569643c", @ANYRESDEC=0x0, @ANYBLOB=',smackfshat=wfdno,\x00']) 10:24:13 executing program 1: mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r0, 0x4004af61, &(0x7f0000000180)) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') syz_open_dev$sndseq(&(0x7f0000000000)='/dev/snd/seq\x00', 0x0, 0x100) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x100000001) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') [ 476.972003] 9pnet: Insufficient options for proto=fd 10:24:13 executing program 3 (fault-call:1 fault-nth:0): r0 = socket(0xa, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f0000000200)=@nat={'nat\x00?\x00', 0x19, 0x2, 0x278, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=[{0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00?\x00', 0x0, 0xffffffffffffffff}, {0x0, '\x00', 0x0, 0xfffffffffffffffe}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x5, 0x0, 0x0, 'veth0_to_team\x00', 'dummy0\x00', 'dummy0\x00', 'syzkaller1\x00', @broadcast, [], @broadcast, [], 0x70, 0x70, 0xa0}}, @common=@redirect={'redirect\x00', 0x8, {{0xffffffffffffffff}}}}, {{{0xb, 0x0, 0x0, 'syzkaller1\x00', 'gretap0\x00', 'vlan0\x00', 'dummy0\x00', @link_local, [], @remote, [], 0xe0, 0xe0, 0x118, [@rateest={'rateest\x00', 0x48, {{'\x00', 'erspan0\x00', 0x2a, 0x3}}}]}}, @arpreply={'arpreply\x00', 0x10, {{@link_local}}}}]}]}, 0x2f0) 10:24:13 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r1 = syz_open_dev$swradio(&(0x7f0000000080)='/dev/swradio#\x00', 0x1, 0x2) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x1e, &(0x7f0000000140), &(0x7f0000000180)=0x4) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) fstat(r0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = getegid() setxattr$system_posix_acl(&(0x7f00000001c0)='./file0\x00', &(0x7f00000002c0)='system.posix_acl_access\x00', &(0x7f0000000380)={{}, {0x1, 0x1}, [{0x2, 0x6, r2}], {0x4, 0x2}, [{0x8, 0x2, r3}], {0x10, 0x4}, {0x20, 0x2}}, 0x34, 0x2) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_inet_tcp_SIOCINQ(r1, 0x541b, &(0x7f0000000400)) ioctl$VIDIOC_SUBSCRIBE_EVENT(r1, 0x4020565a, &(0x7f00000003c0)={0x8001007, 0x6, 0x3}) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) ioctl$VIDIOC_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000440)={0x0, @bt={0xffff, 0xc6f, 0x1, 0x2, 0x5, 0x80, 0x0, 0xe7, 0x5, 0x5000, 0x5, 0x101, 0x41a, 0x2, 0x0, 0x31}}) [ 477.116654] 9pnet: Insufficient options for proto=fd [ 477.143511] FAULT_INJECTION: forcing a failure. [ 477.143511] name failslab, interval 1, probability 0, space 0, times 0 [ 477.177820] CPU: 0 PID: 19266 Comm: syz-executor3 Not tainted 4.20.0-rc7+ #161 [ 477.185241] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.194605] Call Trace: [ 477.197220] dump_stack+0x1d3/0x2c6 [ 477.200876] ? dump_stack_print_info.cold.1+0x20/0x20 [ 477.206119] should_fail.cold.4+0xa/0x17 [ 477.210229] ? fault_create_debugfs_attr+0x1f0/0x1f0 [ 477.211200] 9pnet: Insufficient options for proto=fd [ 477.215351] ? release_sock+0x1ec/0x2c0 [ 477.215385] ? release_sock+0x1ec/0x2c0 [ 477.215427] ? lock_acquire+0x1ed/0x520 [ 477.215449] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.215468] ? check_preemption_disabled+0x48/0x280 [ 477.215502] ? find_held_lock+0x36/0x1c0 [ 477.227904] 9pnet: Insufficient options for proto=fd [ 477.228580] ? ___might_sleep+0x1ed/0x300 [ 477.228600] ? arch_local_save_flags+0x40/0x40 [ 477.228637] __should_failslab+0x124/0x180 [ 477.256445] should_failslab+0x9/0x14 [ 477.256461] kmem_cache_alloc_node_trace+0x270/0x740 [ 477.256481] ? __might_fault+0x12b/0x1e0 [ 477.256562] __get_vm_area_node+0x130/0x3a0 [ 477.256584] __vmalloc_node_range+0xc4/0x750 [ 477.265420] ? do_replace+0x23b/0x4c0 [ 477.265446] ? do_replace+0x23b/0x4c0 [ 477.265463] vmalloc+0x6f/0x80 [ 477.265476] ? do_replace+0x23b/0x4c0 [ 477.265490] do_replace+0x23b/0x4c0 [ 477.265507] ? compat_target_to_user+0x340/0x340 [ 477.265538] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.265559] ? ns_capable_common+0x13f/0x170 [ 477.272774] overlayfs: workdir and upperdir must reside under the same mount [ 477.274452] do_ebt_set_ctl+0xe7/0x110 [ 477.287277] nf_setsockopt+0x7d/0xd0 [ 477.298496] ip_setsockopt+0xd8/0xf0 [ 477.298541] udp_setsockopt+0x62/0xa0 [ 477.298585] ipv6_setsockopt+0x149/0x170 [ 477.347064] udpv6_setsockopt+0x62/0xa0 [ 477.351082] sock_common_setsockopt+0x9a/0xe0 [ 477.355615] __sys_setsockopt+0x1ba/0x3c0 [ 477.359775] ? kernel_accept+0x310/0x310 [ 477.363859] ? lockdep_hardirqs_on+0x421/0x5c0 [ 477.368501] ? trace_hardirqs_on+0xbd/0x310 [ 477.372831] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.378184] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 477.383626] __x64_sys_setsockopt+0xbe/0x150 [ 477.388031] do_syscall_64+0x1b9/0x820 [ 477.391907] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 477.397263] ? syscall_return_slowpath+0x5e0/0x5e0 [ 477.402178] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 477.407034] ? trace_hardirqs_on_caller+0x310/0x310 [ 477.412065] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 477.417082] ? prepare_exit_to_usermode+0x291/0x3b0 [ 477.422090] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 477.426927] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.432114] RIP: 0033:0x457669 [ 477.435320] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 477.454212] RSP: 002b:00007f0196789c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 477.461937] RAX: ffffffffffffffda RBX: 00007f0196789c90 RCX: 0000000000457669 [ 477.469200] RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000003 [ 477.476452] RBP: 000000000072bf00 R08: 00000000000002f0 R09: 0000000000000000 [ 477.483722] R10: 0000000020000200 R11: 0000000000000246 R12: 00007f019678a6d4 [ 477.490989] R13: 00000000004c462f R14: 00000000004d7848 R15: 0000000000000004 [ 477.502349] syz-executor3: vmalloc: allocation failure: 256 bytes, mode:0x6000c0(GFP_KERNEL), nodemask=(null) [ 477.513052] syz-executor3 cpuset=syz3 mems_allowed=0 [ 477.518492] CPU: 0 PID: 19266 Comm: syz-executor3 Not tainted 4.20.0-rc7+ #161 [ 477.518505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 477.535206] Call Trace: [ 477.537804] dump_stack+0x1d3/0x2c6 [ 477.541448] ? dump_stack_print_info.cold.1+0x20/0x20 [ 477.546655] ? rcu_lockdep_current_cpu_online+0x1a4/0x210 [ 477.552212] warn_alloc.cold.118+0xb7/0x1bd [ 477.556554] ? zone_watermark_ok_safe+0x3f0/0x3f0 [ 477.561407] ? __get_vm_area_node+0x130/0x3a0 [ 477.565917] ? rcu_read_lock_sched_held+0x108/0x120 [ 477.570951] ? __might_fault+0x12b/0x1e0 [ 477.575058] ? __get_vm_area_node+0x2e5/0x3a0 [ 477.579571] __vmalloc_node_range+0x472/0x750 [ 477.584109] ? do_replace+0x23b/0x4c0 [ 477.587924] vmalloc+0x6f/0x80 [ 477.591136] ? do_replace+0x23b/0x4c0 [ 477.594951] do_replace+0x23b/0x4c0 [ 477.598627] ? compat_target_to_user+0x340/0x340 [ 477.603434] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 477.609002] ? ns_capable_common+0x13f/0x170 [ 477.613450] do_ebt_set_ctl+0xe7/0x110 [ 477.617357] nf_setsockopt+0x7d/0xd0 [ 477.621089] ip_setsockopt+0xd8/0xf0 [ 477.624836] udp_setsockopt+0x62/0xa0 [ 477.628652] ipv6_setsockopt+0x149/0x170 [ 477.632749] udpv6_setsockopt+0x62/0xa0 [ 477.636743] sock_common_setsockopt+0x9a/0xe0 [ 477.641231] __sys_setsockopt+0x1ba/0x3c0 [ 477.645367] ? kernel_accept+0x310/0x310 [ 477.649415] ? lockdep_hardirqs_on+0x421/0x5c0 [ 477.653998] ? trace_hardirqs_on+0xbd/0x310 [ 477.658310] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.663663] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 477.669102] __x64_sys_setsockopt+0xbe/0x150 [ 477.673502] do_syscall_64+0x1b9/0x820 [ 477.677390] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 477.682775] ? syscall_return_slowpath+0x5e0/0x5e0 [ 477.687713] ? trace_hardirqs_off_thunk+0x1a/0x1c 10:24:14 executing program 5: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000340)={0xffffffffffffffff}) write(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0)={0x0, 0xffffffff00000000}, &(0x7f0000000100), &(0x7f0000000140)={0x1b7}, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 10:24:14 executing program 2: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000001c0)={0x26, 'hash\x00', 0x0, 0x0, 'digest_null-generic\x00'}, 0x58) r1 = accept$alg(r0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001280)=[{{&(0x7f0000000ec0)=@nl=@proc, 0x34e, &(0x7f0000001180)=[{&(0x7f0000001080)=""/251, 0xfb}], 0x11, &(0x7f00000011c0)=""/157, 0x9d}, 0x0}], 0x1500, 0x0, &(0x7f0000001380)={0x77359400}) getsockopt$inet_sctp6_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) 10:24:14 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000580)={0x9, @win={{0x7c, 0xfffffffffffffff8, 0xfffffffffffffff7}, 0x7d7ed4b3c79c1a0c, 0xfffffffffffffffc, &(0x7f0000000500)={{0x8001, 0xffff, 0xaaef, 0x2}, &(0x7f00000004c0)={{0x6, 0x7ff, 0xffffffff, 0x5}, &(0x7f0000000480)={{0x9, 0x200, 0x20, 0x7}}}}, 0xa7b, &(0x7f0000000540)="9043daab58", 0x7}}) pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) r1 = accept4(0xffffffffffffffff, &(0x7f0000000180)=@pptp={0x18, 0x2, {0x0, @dev}}, &(0x7f00000002c0)=0x80, 0x800) getsockopt$bt_BT_CHANNEL_POLICY(r1, 0x112, 0xa, &(0x7f0000000300), &(0x7f0000000340)=0x4) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) r2 = syz_open_dev$dmmidi(&(0x7f0000000080)='/dev/dmmidi#\x00', 0x948, 0x240000) ioctl$TCSETA(r2, 0x5406, &(0x7f0000000140)={0x4, 0x6452, 0x400, 0x80000001, 0x2, 0x8a, 0x1, 0x4, 0xfff, 0x1}) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000380)={0x0, 0xfffffffffffffff7}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp6_SCTP_ASSOCINFO(r1, 0x84, 0x1, &(0x7f0000000400)={r3, 0x401, 0xc737, 0x0, 0x800, 0x4}, &(0x7f0000000440)=0x14) 10:24:14 executing program 1: mkdir(&(0x7f0000000280)='./file0/f.le.\x00', 0x0) mount(0x0, &(0x7f0000027000)='./file0\x00', &(0x7f0000018ffa)='tmpfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) fchdir(r0) mkdir(&(0x7f0000000200)='./file1\x00', 0x0) symlink(&(0x7f0000000040)='./file0/f.le.\x00', &(0x7f0000000140)='.//ile0\x00') mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000300)='./file0\x00', &(0x7f0000000100)='overlay\x00', 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB='upperdir=./file0,lowerdir=.:file0,workdir=./file1']) symlink(&(0x7f0000000000)='./file0/f.le.\x00', &(0x7f0000000180)='.//ile0\x00') ioctl$BLKTRACESTART(r0, 0x1274, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000240)='.//ile0\x00', r1, &(0x7f00000007c0)='./file0/f.le.\x00') setxattr$trusted_overlay_opaque(&(0x7f0000000340)='./file1\x00', &(0x7f0000000380)='trusted.overlay.opaque\x00', &(0x7f00000003c0)='y\x00', 0x2, 0x2) 10:24:14 executing program 4: mkdir(&(0x7f00000003c0)='./file0\x00', 0x0) open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r0 = socket$inet_tcp(0x2, 0x1, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x10000014c) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1b7}, 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r0, 0x0, 0x41, &(0x7f0000000300)={'filter\x00', 0x2, [{}, {}]}, 0x48) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000200)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000001c0)={0xffffffffffffffff}, 0x0, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_MCAST(r2, &(0x7f0000000240)={0x16, 0x98, 0xfa00, {&(0x7f0000000100), 0x1, r3, 0x0, 0x1, @in={0x2, 0x4e20, @empty}}}, 0xa0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 477.692583] ? trace_hardirqs_on_caller+0x310/0x310 [ 477.697606] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 477.702628] ? prepare_exit_to_usermode+0x291/0x3b0 [ 477.707667] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 477.712532] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 477.717732] RIP: 0033:0x457669 [ 477.720953] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 477.739881] RSP: 002b:00007f0196789c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 477.747596] RAX: ffffffffffffffda RBX: 00007f0196789c90 RCX: 0000000000457669 [ 477.747606] RDX: 0000000000000080 RSI: 0000000000000000 RDI: 0000000000000003 [ 477.747615] RBP: 000000000072bf00 R08: 00000000000002f0 R09: 0000000000000000 [ 477.747626] R10: 0000000020000200 R11: 0000000000000246 R12: 00007f019678a6d4 [ 477.747635] R13: 00000000004c462f R14: 00000000004d7848 R15: 0000000000000004 [ 477.813954] Mem-Info: [ 477.816547] active_anon:150086 inactive_anon:191 isolated_anon:0 [ 477.816547] active_file:7830 inactive_file:38539 isolated_file:0 [ 477.816547] unevictable:0 dirty:515 writeback:0 unstable:0 [ 477.816547] slab_reclaimable:12338 slab_unreclaimable:106430 [ 477.816547] mapped:55220 shmem:3316 pagetables:1624 bounce:0 [ 477.816547] free:1213519 free_pcp:811 free_cma:0 10:24:14 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x800000ff, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/autofs\x00', 0x800, 0x0) ioctl$KVM_S390_UCAS_MAP(r0, 0x4018ae50, &(0x7f0000000140)={0x5, 0x10001, 0x2}) [ 477.861999] 9pnet: Insufficient options for proto=fd [ 477.870675] 9pnet: Insufficient options for proto=fd [ 477.910705] Node 0 active_anon:602532kB inactive_anon:764kB active_file:31320kB inactive_file:154156kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:220880kB dirty:2060kB writeback:0kB shmem:13264kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 538624kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 478.035207] overlayfs: filesystem on './file0' not supported as upperdir [ 478.055411] Node 0 DMA free:15908kB min:164kB low:204kB high:244kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 478.090732] 9pnet: Insufficient options for proto=fd [ 478.106284] WARNING: CPU: 0 PID: 19290 at fs/overlayfs/dir.c:263 ovl_instantiate+0x369/0x400 [ 478.115079] Kernel panic - not syncing: panic_on_warn set ... [ 478.120999] CPU: 0 PID: 19290 Comm: syz-executor1 Not tainted 4.20.0-rc7+ #161 [ 478.128381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 478.137740] Call Trace: [ 478.140368] dump_stack+0x1d3/0x2c6 [ 478.144015] ? dump_stack_print_info.cold.1+0x20/0x20 [ 478.149230] panic+0x2ad/0x55c [ 478.151723] lowmem_reserve[]: 0 2818 6321 6321 [ 478.152459] ? add_taint.cold.5+0x16/0x16 [ 478.152492] ? __warn.cold.8+0x5/0x45 [ 478.152513] ? ovl_instantiate+0x369/0x400 [ 478.152529] __warn.cold.8+0x20/0x45 10:24:14 executing program 0: pipe2$9p(&(0x7f0000000000), 0x0) mknod$loop(&(0x7f0000000200)='./file0\x00', 0x100, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) clone(0x1000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c7365636c6162a3bf80b6fca020f82e73415fcf5561e1025ba3b07d6d652c7375626a5f757365723d7472616e000066642c2c657569643c00afebb8530a0008000000000000", @ANYRESDEC=0x0, @ANYBLOB=',smackfshat=wfdno,\x00']) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vsock\x00', 0x500, 0x0) setsockopt$inet6_dccp_buf(r0, 0x21, 0x0, &(0x7f00000002c0)="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", 0xffffffffffffff9f) [ 478.170560] Node 0 DMA32 free:2887356kB min:30052kB low:37564kB high:45076kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2888756kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:1400kB local_pcp:1332kB free_cma:0kB [ 478.173011] ? rcu_softirq_qs+0x20/0x20 [ 478.173030] ? ovl_instantiate+0x369/0x400 [ 478.173047] report_bug+0x254/0x2d0 [ 478.173069] do_error_trap+0x11b/0x200 [ 478.173089] do_invalid_op+0x36/0x40 [ 478.173104] ? ovl_instantiate+0x369/0x400 [ 478.173123] invalid_op+0x14/0x20 [ 478.173142] RIP: 0010:ovl_instantiate+0x369/0x400 [ 478.223531] kobject: 'loop0' (0000000022c22345): kobject_uevent_env [ 478.224653] Code: c3 89 c6 e8 59 44 f1 fe 85 db 0f 85 9e 00 00 00 e8 3c 43 f1 fe 4c 89 e7 45 31 f6 e8 e1 f6 46 ff e9 ec fe ff ff e8 27 43 f1 fe <0f> 0b e9 e0 fe ff ff e8 1b 43 f1 fe 0f 0b e9 63 ff ff ff e8 6f 4b [ 478.228109] kobject: 'loop0' (0000000022c22345): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 478.232918] RSP: 0018:ffff88817cf279a8 EFLAGS: 00010212 [ 478.232931] RAX: 0000000000040000 RBX: ffff88817cf27a40 RCX: ffffc90007de6000 [ 478.232940] RDX: 00000000000229c2 RSI: ffffffff828d74b9 RDI: 0000000000000007 [ 478.232949] RBP: ffff88817cf27a68 R08: ffff88817d0b0180 R09: ffffed102f9e4ee8 [ 478.232957] R10: ffffed102f9e4ee8 R11: 0000000000000003 R12: ffff888173c4a580 [ 478.233007] R13: ffff88817cf279e0 R14: ffffffffffffff8c R15: 0000000000000000 [ 478.233069] ? ovl_instantiate+0x369/0x400 [ 478.233109] ? ovl_instantiate+0x369/0x400 [ 478.233131] ? ovl_set_opaque_xerr+0x80/0x80 [ 478.233164] ovl_create_or_link+0xad6/0x1560 [ 478.317356] lowmem_reserve[]: 0 0 3503 3503 [ 478.318115] ? ovl_unlink+0x20/0x20 [ 478.318133] ? ovl_create_object+0x22f/0x3a0 10:24:15 executing program 0: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mkdir(&(0x7f0000000100)='./file1\x00', 0x0) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000500)='/dev/rfkill\x00', 0x900, 0x0) write$FUSE_STATFS(r2, &(0x7f0000000540)={0x60, 0xfffffffffffffff5, 0x7, {{0x40, 0xffffffffffffff7f, 0xd35b, 0x235, 0x2, 0x5, 0x7fffffff, 0x6}}}, 0x60) r3 = geteuid() lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000140)='9p\x00', 0x80a010, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB="2cfa6bf6937766", @ANYRESHEX=r1, @ANYBLOB=',dfltuid=', @ANYRESHEX=r3, @ANYBLOB=',noextend,msize=0x0000000000000008,cachetag=fsname,access=any,uid<', @ANYRESDEC=r4, @ANYBLOB=',appraise_type=imasig,obj_type=,\x00']) clone(0x6000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='9p\x00', 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno'}, 0x2c, {'wfdno'}, 0x2c, {[], [{@seclabel='seclabel'}, {@fsname={'fsname', 0x3d, 'uname'}}, {@subj_user={'subj_user', 0x3d, 'trans=fd,'}}, {@euid_lt={'euid<'}}, {@smackfshat={'smackfshat', 0x3d, 'wfdno'}}]}}) getsockopt$inet_sctp6_SCTP_RECVRCVINFO(r2, 0x84, 0x20, &(0x7f00000005c0), &(0x7f0000000600)=0x4) r5 = openat$sequencer2(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sequencer2\x00', 0x80000, 0x0) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000640)='/dev/vga_arbiter\x00', 0x100, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r5, 0x8250aea6, &(0x7f0000000440)=""/170) [ 478.332260] 9pnet: Insufficient options for proto=fd [ 478.334856] ? lock_downgrade+0x900/0x900 [ 478.334879] ? kasan_check_read+0x11/0x20 [ 478.334894] ? do_raw_spin_unlock+0xa7/0x330 [ 478.334909] ? do_raw_spin_trylock+0x270/0x270 [ 478.334924] ? ovl_fill_inode+0x32a/0x6f0 [ 478.334945] ? debug_lockdep_rcu_enabled+0x77/0x90 [ 478.334981] ovl_create_object+0x2e9/0x3a0 [ 478.335004] ? ovl_create_or_link+0x1560/0x1560 [ 478.340735] Node 0 Normal free:1930160kB min:37364kB low:46704kB high:56044kB active_anon:619312kB inactive_anon:764kB active_file:31320kB inactive_file:154156kB unevictable:0kB writepending:580kB present:4718592kB managed:3587816kB mlocked:0kB kernel_stack:8480kB pagetables:6940kB bounce:0kB free_pcp:1576kB local_pcp:532kB free_cma:0kB [ 478.344543] ? security_inode_permission+0xd2/0x100 [ 478.344568] ovl_symlink+0x24/0x30 [ 478.344585] vfs_symlink+0x37a/0x5d0 [ 478.344605] do_symlinkat+0x242/0x2d0 [ 478.344627] ? __ia32_sys_unlink+0x50/0x50 [ 478.344647] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.361340] lowmem_reserve[]: 0 0 0 0 [ 478.361882] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 478.361911] __x64_sys_symlink+0x59/0x80 [ 478.380804] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 478.409809] do_syscall_64+0x1b9/0x820 [ 478.409828] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 478.409847] ? syscall_return_slowpath+0x5e0/0x5e0 [ 478.409863] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 478.409879] ? trace_hardirqs_on_caller+0x310/0x310 [ 478.409897] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 478.409914] ? prepare_exit_to_usermode+0x291/0x3b0 [ 478.409937] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 478.409977] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 478.418650] kobject: 'loop0' (0000000022c22345): kobject_uevent_env [ 478.422223] RIP: 0033:0x457669 [ 478.430957] kobject: 'loop0' (0000000022c22345): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 478.435640] Code: fd b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 cb b3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 478.435664] RSP: 002b:00007fd581f9ac78 EFLAGS: 00000246 ORIG_RAX: 0000000000000058 [ 478.435693] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 0000000000457669 [ 478.435702] RDX: 0000000000000000 RSI: 0000000020000140 RDI: 0000000020000040 [ 478.435710] RBP: 000000000072bf00 R08: 0000000000000000 R09: 0000000000000000 [ 478.435719] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd581f9b6d4 [ 478.435727] R13: 00000000004c5364 R14: 00000000004d9810 R15: 00000000ffffffff [ 478.436900] Kernel Offset: disabled [ 478.592970] Rebooting in 86400 seconds..