c, 0x5, 0xfff}]}) pipe(&(0x7f00000006c0)) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000700)) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f00000000c0)=0x3ef, 0x4) [ 1409.296631][ T7230] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1409.325970][ T7226] 9pnet: Could not find request transport: xen 17:07:05 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0xe00, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:05 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0x800000}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x4c00, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:05 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0x8bffffff}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x8}, [{}], {}, [{}]}, 0x34, 0x0) [ 1409.336814][ T7237] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7237 comm=syz-executor.3 17:07:05 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0x1000000}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0x8cffffff}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x1020, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:05 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x8}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000200)={'gre0\x00', 0x0, 0x7, 0x7800, 0xdc, 0xfff, {{0xf, 0x4, 0x3, 0x3, 0x3c, 0x66, 0x0, 0x9, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp={0x44, 0x28, 0xbb, 0x0, 0x2, [0x7f, 0x6, 0x1, 0x5, 0x1f, 0x6, 0x1, 0x20, 0x4]}]}}}}}) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0xb10, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x840) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000600)=ANY=[@ANYBLOB="8663d97676cef93418000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) (async) futimesat(r2, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={{0x77359400}, {0x77359400}}) (async) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'ipvlan0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d0000000000000000000000000000000000000000000000000000000000000000000023a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009bd6"]}) (async) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000080)={0x200}, 0x4) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) (async) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000540)={0xa, &(0x7f0000000580)=[{0xc569, 0x8, 0x73, 0x1}, {0x7fff, 0x8, 0x4}, {0x5, 0x7, 0x3, 0x4}, {0x401, 0x1, 0x4}, {0x7f, 0x1, 0x1f, 0x101}, {0x9ab, 0x7, 0x0, 0xb145}, {0x0, 0x4, 0x7f, 0x6}, {0x8, 0x86, 0x4, 0xd7}, {0x3, 0x9, 0x69, 0x3}, {0x2, 0xcc, 0x5, 0xfff}]}) (async) pipe(&(0x7f00000006c0)) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000700)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) (async) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f00000000c0)=0x3ef, 0x4) [ 1409.378040][ T7248] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1409.387937][ T7245] 9pnet: Could not find request transport: xen 17:07:05 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0x2000000}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x1100, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:05 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x6000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:05 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x8}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x1200, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:05 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0x94130000}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0x4000000}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x6800, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:05 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000200)={'gre0\x00', 0x0, 0x7, 0x7800, 0xdc, 0xfff, {{0xf, 0x4, 0x3, 0x3, 0x3c, 0x66, 0x0, 0x9, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp={0x44, 0x28, 0xbb, 0x0, 0x2, [0x7f, 0x6, 0x1, 0x5, 0x1f, 0x6, 0x1, 0x20, 0x4]}]}}}}}) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0xb10, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x840) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000600)=ANY=[@ANYBLOB="8663d97676cef93418000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) futimesat(r2, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={{0x77359400}, {0x77359400}}) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'ipvlan0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d0000000000000000000000000000000000000000000000000000000000000000000023a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009bd6"]}) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000080)={0x200}, 0x4) pipe(&(0x7f0000000000)={0xffffffffffffffff}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000540)={0xa, &(0x7f0000000580)=[{0xc569, 0x8, 0x73, 0x1}, {0x7fff, 0x8, 0x4}, {0x5, 0x7, 0x3, 0x4}, {0x401, 0x1, 0x4}, {0x7f, 0x1, 0x1f, 0x101}, {0x9ab, 0x7, 0x0, 0xb145}, {0x0, 0x4, 0x7f, 0x6}, {0x8, 0x86, 0x4, 0xd7}, {0x3, 0x9, 0x69, 0x3}, {0x2, 0xcc, 0x5, 0xfff}]}) pipe(&(0x7f00000006c0)) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r4) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000700)) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f00000000c0)=0x3ef, 0x4) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000100)={'sit0\x00', &(0x7f0000000200)={'gre0\x00', 0x0, 0x7, 0x7800, 0xdc, 0xfff, {{0xf, 0x4, 0x3, 0x3, 0x3c, 0x66, 0x0, 0x9, 0x4, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x1, 0x0}, {[@timestamp={0x44, 0x28, 0xbb, 0x0, 0x2, [0x7f, 0x6, 0x1, 0x5, 0x1f, 0x6, 0x1, 0x20, 0x4]}]}}}}}) (async) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, 0x0, 0xb10, 0x70bd2d, 0x25dfdbfc, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r1}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x840) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000600)=ANY=[@ANYBLOB="8663d97676cef93418000000", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) (async) futimesat(r2, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={{0x77359400}, {0x77359400}}) (async) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000000)={'ipvlan0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d0000000000000000000000000000000000000000000000000000000000000000000023a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009bd6"]}) (async) setsockopt$inet6_icmp_ICMP_FILTER(0xffffffffffffffff, 0x1, 0x1, &(0x7f0000000080)={0x200}, 0x4) (async) pipe(&(0x7f0000000000)) (async) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000540)={0xa, &(0x7f0000000580)=[{0xc569, 0x8, 0x73, 0x1}, {0x7fff, 0x8, 0x4}, {0x5, 0x7, 0x3, 0x4}, {0x401, 0x1, 0x4}, {0x7f, 0x1, 0x1f, 0x101}, {0x9ab, 0x7, 0x0, 0xb145}, {0x0, 0x4, 0x7f, 0x6}, {0x8, 0x86, 0x4, 0xd7}, {0x3, 0x9, 0x69, 0x3}, {0x2, 0xcc, 0x5, 0xfff}]}) (async) pipe(&(0x7f00000006c0)) (async) pipe(&(0x7f0000000000)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r4) (async) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f0000000700)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) (async) setsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f00000000c0)=0x3ef, 0x4) (async) [ 1409.439924][ T7260] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7260 comm=syz-executor.3 17:07:05 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0x6000000}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x8}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x2010, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:05 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xe4ffffff}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x6c00, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:05 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x8}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0x8000000}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x2200, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:05 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xf6ffffff}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x7400, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) [ 1409.529636][ T7285] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7285 comm=syz-executor.3 17:07:05 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x8}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000280)={'batadv_slave_1\x00', 0x0}) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='fd/3\x00') ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000001c0)={'ip_vti0\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="74756e6c300000000000caa210a1596c", @ANYRES32=r2, @ANYBLOB="7800002000000020000007b541da008400680000812f90780a010102ac1414bb94040000832707ffffffffffffffffac1e000100000000ac1e0001ac141436ffffffff0a010100ac1414bb440c9741ac14143d00000005831365e0000002ac141408e00000026401010001890fdf0a010100ac1e0001640101010713b3640101007f0000010a010100ac1414bb000000"]}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r6) ioctl$PPPIOCCONNECT(r6, 0x4004743a, &(0x7f0000000d80)=0x3) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x8, &(0x7f0000000080)=@raw=[@btf_id={0x18, 0xc, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @ldst={0x2, 0x1, 0x3, 0x8, 0x2, 0x80, 0xd}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x80000000, 0x99, &(0x7f0000000100)=""/153, 0x41100, 0x1e, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000c80)={0x5, 0x1, 0x10001, 0x8d}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000cc0)=[r5, r3]}, 0x80) recvmsg$can_raw(r3, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000440)=""/126, 0x7e}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/163, 0xa3}, {&(0x7f0000000580)=""/58, 0x3a}, {&(0x7f00000005c0)=""/140, 0x8c}, {&(0x7f0000000680)=""/255, 0xff}], 0x6, &(0x7f0000000800)=""/172, 0xac}, 0x10000) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="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"]}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="080000000000897e2e2f66696c000000"]) llistxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=""/123, 0x7b) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='|']) ioctl$PPPIOCGNPMODE(r7, 0xc008744c, &(0x7f0000000300)={0x80fd, 0x3}) 17:07:05 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xc000000}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xfbffffff}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x8}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x2500, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:05 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x7a00, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:05 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xd000000}, [{}], {}, [{}]}, 0x34, 0x0) [ 1409.597280][ T7305] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=0 sclass=netlink_xfrm_socket pid=7305 comm=syz-executor.3 17:07:05 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x8}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xfeffffff}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x4800, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:05 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0xedc0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:05 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000280)={'batadv_slave_1\x00', 0x0}) (async) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='fd/3\x00') ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000001c0)={'ip_vti0\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="74756e6c300000000000caa210a1596c", @ANYRES32=r2, @ANYBLOB="7800002000000020000007b541da008400680000812f90780a010102ac1414bb94040000832707ffffffffffffffffac1e000100000000ac1e0001ac141436ffffffff0a010100ac1414bb440c9741ac14143d00000005831365e0000002ac141408e00000026401010001890fdf0a010100ac1e0001640101010713b3640101007f0000010a010100ac1414bb000000"]}) (async, rerun: 32) pipe(&(0x7f0000000000)={0xffffffffffffffff}) (async, rerun: 32) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r6) (async) ioctl$PPPIOCCONNECT(r6, 0x4004743a, &(0x7f0000000d80)=0x3) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r5) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x8, &(0x7f0000000080)=@raw=[@btf_id={0x18, 0xc, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @ldst={0x2, 0x1, 0x3, 0x8, 0x2, 0x80, 0xd}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x80000000, 0x99, &(0x7f0000000100)=""/153, 0x41100, 0x1e, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000c80)={0x5, 0x1, 0x10001, 0x8d}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000cc0)=[r5, r3]}, 0x80) recvmsg$can_raw(r3, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000440)=""/126, 0x7e}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/163, 0xa3}, {&(0x7f0000000580)=""/58, 0x3a}, {&(0x7f00000005c0)=""/140, 0x8c}, {&(0x7f0000000680)=""/255, 0xff}], 0x6, &(0x7f0000000800)=""/172, 0xac}, 0x10000) (async, rerun: 32) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="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"]}) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="080000000000897e2e2f66696c000000"]) (async) llistxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=""/123, 0x7b) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='|']) (async) ioctl$PPPIOCGNPMODE(r7, 0xc008744c, &(0x7f0000000300)={0x80fd, 0x3}) 17:07:05 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x1000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:05 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x8}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xff000000}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0x20000000}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x4c00, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:05 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x8}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000280)={'batadv_slave_1\x00', 0x0}) (async, rerun: 32) r3 = syz_open_procfs(0x0, &(0x7f0000000400)='fd/3\x00') (rerun: 32) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000001c0)={'ip_vti0\x00', &(0x7f0000000bc0)=ANY=[@ANYBLOB="74756e6c300000000000caa210a1596c", @ANYRES32=r2, @ANYBLOB="7800002000000020000007b541da008400680000812f90780a010102ac1414bb94040000832707ffffffffffffffffac1e000100000000ac1e0001ac141436ffffffff0a010100ac1414bb440c9741ac14143d00000005831365e0000002ac141408e00000026401010001890fdf0a010100ac1e0001640101010713b3640101007f0000010a010100ac1414bb000000"]}) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r6) (async) ioctl$PPPIOCCONNECT(r6, 0x4004743a, &(0x7f0000000d80)=0x3) (async, rerun: 32) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r5) (rerun: 32) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x8, &(0x7f0000000080)=@raw=[@btf_id={0x18, 0xc, 0x3, 0x0, 0x3}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0x3, 0x0, 0x0, 0x0, 0x9}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @ldst={0x2, 0x1, 0x3, 0x8, 0x2, 0x80, 0xd}, @btf_id={0x18, 0x5, 0x3, 0x0, 0x1}], &(0x7f00000000c0)='GPL\x00', 0x80000000, 0x99, &(0x7f0000000100)=""/153, 0x41100, 0x1e, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000200)={0x8, 0x2}, 0x8, 0x10, &(0x7f0000000c80)={0x5, 0x1, 0x10001, 0x8d}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000cc0)=[r5, r3]}, 0x80) (async) recvmsg$can_raw(r3, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000440)=""/126, 0x7e}, {&(0x7f0000001340)=""/4096, 0x1000}, {&(0x7f00000004c0)=""/163, 0xa3}, {&(0x7f0000000580)=""/58, 0x3a}, {&(0x7f00000005c0)=""/140, 0x8c}, {&(0x7f0000000680)=""/255, 0xff}], 0x6, &(0x7f0000000800)=""/172, 0xac}, 0x10000) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000900)=ANY=[@ANYBLOB="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"]}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f00000002c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r0, @ANYBLOB="080000000000897e2e2f66696c000000"]) llistxattr(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)=""/123, 0x7b) (async) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001300)=ANY=[@ANYBLOB='|']) ioctl$PPPIOCGNPMODE(r7, 0xc008744c, &(0x7f0000000300)={0x80fd, 0x3}) 17:07:05 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0x24000000}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xff010000}, [{}], {}, [{}]}, 0x34, 0x0) [ 1409.719845][ T7358] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1409.729381][ T7346] 9pnet: Could not find request transport: xen 17:07:05 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x8}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x2000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:05 executing program 3: setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000440)=0x7, 0x4) syz_mount_image$msdos(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x9, 0x2, &(0x7f0000000380)=[{&(0x7f0000000300)="a9c6ec070c4ac15df7c0ba7a402cba718edfac5446e9f8", 0x17, 0x2b9}, {&(0x7f0000000340)="85012b2d5e4aefa9f51386e2683a3b3186ce63952e0d47eb66188375db1f349aece93a97d8af699b71f79872e6810aef854e311562dbd0", 0x37, 0x5}], 0x2008000, &(0x7f00000003c0)={[{@nodots}, {@dots}, {@fat=@fmask={'fmask', 0x3d, 0x4}}, {@fat=@nfs}, {@nodots}, {}, {@dots}, {@dots}], [{@audit}, {@appraise_type}]}) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:05 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0x3f000000}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x5a6e, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:05 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xffffff8b}, [{}], {}, [{}]}, 0x34, 0x0) [ 1409.778578][ T7368] 9pnet: Could not find request transport: xen [ 1409.806617][ T7378] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:05 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xffffff8c}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x3000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:05 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {0x8}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0x61130000}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x6000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:05 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xffffffe4}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {0x8}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0x81000000}, [{}], {}, [{}]}, 0x34, 0x0) [ 1409.825480][ T7380] loop3: detected capacity change from 0 to 2 [ 1409.828595][ T1437] I/O error, dev loop3, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1409.840741][ T1437] Buffer I/O error on dev loop3, logical block 0, async page read [ 1409.868199][ T7391] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:05 executing program 3: setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000440)=0x7, 0x4) syz_mount_image$msdos(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x9, 0x2, &(0x7f0000000380)=[{&(0x7f0000000300)="a9c6ec070c4ac15df7c0ba7a402cba718edfac5446e9f8", 0x17, 0x2b9}, {&(0x7f0000000340)="85012b2d5e4aefa9f51386e2683a3b3186ce63952e0d47eb66188375db1f349aece93a97d8af699b71f79872e6810aef854e311562dbd0", 0x37, 0x5}], 0x2008000, &(0x7f00000003c0)={[{@nodots}, {@dots}, {@fat=@fmask={'fmask', 0x3d, 0x4}}, {@fat=@nfs}, {@nodots}, {}, {@dots}, {@dots}], [{@audit}, {@appraise_type}]}) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000440)=0x7, 0x4) (async) syz_mount_image$msdos(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x9, 0x2, &(0x7f0000000380)=[{&(0x7f0000000300)="a9c6ec070c4ac15df7c0ba7a402cba718edfac5446e9f8", 0x17, 0x2b9}, {&(0x7f0000000340)="85012b2d5e4aefa9f51386e2683a3b3186ce63952e0d47eb66188375db1f349aece93a97d8af699b71f79872e6810aef854e311562dbd0", 0x37, 0x5}], 0x2008000, &(0x7f00000003c0)={[{@nodots}, {@dots}, {@fat=@fmask={'fmask', 0x3d, 0x4}}, {@fat=@nfs}, {@nodots}, {}, {@dots}, {@dots}], [{@audit}, {@appraise_type}]}) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) 17:07:05 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x6800, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:05 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x4000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:05 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xfffffff6}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {0x8}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:05 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0x81020000}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x6c00, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:06 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0x8bffffff}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0x8cffffff}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xfffffffb}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:06 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x6e5a, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) [ 1409.941604][ T7407] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1409.968362][ T7413] loop3: detected capacity change from 0 to 2 [ 1410.012150][ T7425] loop3: detected capacity change from 0 to 2 17:07:06 executing program 3: setsockopt$TIPC_IMPORTANCE(0xffffffffffffffff, 0x10f, 0x7f, &(0x7f0000000440)=0x7, 0x4) (async) syz_mount_image$msdos(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x9, 0x2, &(0x7f0000000380)=[{&(0x7f0000000300)="a9c6ec070c4ac15df7c0ba7a402cba718edfac5446e9f8", 0x17, 0x2b9}, {&(0x7f0000000340)="85012b2d5e4aefa9f51386e2683a3b3186ce63952e0d47eb66188375db1f349aece93a97d8af699b71f79872e6810aef854e311562dbd0", 0x37, 0x5}], 0x2008000, &(0x7f00000003c0)={[{@nodots}, {@dots}, {@fat=@fmask={'fmask', 0x3d, 0x4}}, {@fat=@nfs}, {@nodots}, {}, {@dots}, {@dots}], [{@audit}, {@appraise_type}]}) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:06 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x5000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:06 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:06 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xe4ffffff}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xfffffffe}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x7400, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:06 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xf6ffffff}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:06 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x3}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x7a00, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:06 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x4}], {}, [{}]}, 0x34, 0x0) [ 1410.118721][ T7439] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:06 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x6000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r2, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x75}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:06 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xfbffffff}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x8}, [], {}, [{}]}, 0x2c, 0x0) 17:07:06 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0xedc0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:06 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x8}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x7000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r2, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x75}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) [ 1410.167954][ T7452] loop3: detected capacity change from 0 to 2 [ 1410.203072][ T7454] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:06 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x20000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:06 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x1000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:06 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xfeffffff}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x8}}, 0x24, 0x0) 17:07:06 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0xa}], {}, [{}]}, 0x34, 0x0) [ 1410.254775][ T7464] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) r2 = syz_genetlink_get_family_id$batadv(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x24, r2, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5, 0x2f, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x75}]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:06 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x8}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xff000000}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0xc}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x2000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:06 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x8000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) recvmsg$can_raw(r1, &(0x7f0000000480)={&(0x7f0000000280)=@ax25={{0x3, @bcast}, [@default, @default, @bcast, @bcast, @remote, @null, @bcast, @rose]}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000300)=""/50, 0x32}, {&(0x7f0000000340)=""/112, 0x70}], 0x2, &(0x7f0000000400)=""/111, 0x6f}, 0x40002000) 17:07:06 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x8}], {}, [{}]}, 0x34, 0x0) [ 1410.366019][ T7478] 9pnet: Could not find request transport: xen 17:07:06 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xff010000}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) (async) recvmsg$can_raw(r1, &(0x7f0000000480)={&(0x7f0000000280)=@ax25={{0x3, @bcast}, [@default, @default, @bcast, @bcast, @remote, @null, @bcast, @rose]}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000300)=""/50, 0x32}, {&(0x7f0000000340)=""/112, 0x70}], 0x2, &(0x7f0000000400)=""/111, 0x6f}, 0x40002000) 17:07:06 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0xd}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x8}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xffffff8b}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x10}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x9000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) [ 1410.431872][ T7494] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) recvmsg$can_raw(r1, &(0x7f0000000480)={&(0x7f0000000280)=@ax25={{0x3, @bcast}, [@default, @default, @bcast, @bcast, @remote, @null, @bcast, @rose]}, 0x80, &(0x7f00000003c0)=[{&(0x7f0000000300)=""/50, 0x32}, {&(0x7f0000000340)=""/112, 0x70}], 0x2, &(0x7f0000000400)=""/111, 0x6f}, 0x40002000) 17:07:06 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x3000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:06 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x8}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0xc8}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xffffff8c}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) write$rfkill(0xffffffffffffffff, &(0x7f0000000280)={0xd1b, 0x6, 0x0, 0x0, 0x1}, 0x8) [ 1410.490411][ T7496] 9pnet: Could not find request transport: xen [ 1410.516169][ T7509] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:06 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x8}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0xa000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:06 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xffffffe4}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x8}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) write$rfkill(0xffffffffffffffff, &(0x7f0000000280)={0xd1b, 0x6, 0x0, 0x0, 0x1}, 0x8) 17:07:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) write$rfkill(0xffffffffffffffff, &(0x7f0000000280)={0xd1b, 0x6, 0x0, 0x0, 0x1}, 0x8) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) write$rfkill(0xffffffffffffffff, &(0x7f0000000280)={0xd1b, 0x6, 0x0, 0x0, 0x1}, 0x8) (async) 17:07:06 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x4000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:06 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xfffffff6}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x2}], {}, [{}]}, 0x34, 0x0) [ 1410.613848][ T7532] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1410.624793][ T7522] 9pnet: Could not find request transport: xen 17:07:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYRESHEX=r0]}) 17:07:06 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x8}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x4}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0xb000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:06 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xfffffffb}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYRESHEX=r0]}) 17:07:06 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x8}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x6}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {0x1, 0x0, 0xfffffffe}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x5000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYRESHEX=r0]}) [ 1410.705533][ T7559] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1410.709156][ T7550] 9pnet: Could not find request transport: xen 17:07:06 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x3}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x8]}}) 17:07:06 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x8}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0xc000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:06 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x8}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x8}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x6000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:06 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x4}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0xc}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x8]}}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x8]}}) (async) 17:07:06 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x8}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x8]}}) [ 1410.792678][ T7571] 9pnet: Could not find request transport: xen [ 1410.800869][ T7582] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:06 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x8}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0xd}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x8}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0xd000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:06 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x24}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0xa}], {}, [{}]}, 0x34, 0x0) 17:07:06 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x7000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:06 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x281}], {}, [{}]}, 0x34, 0x0) [ 1410.868622][ T7592] 9pnet: Could not find request transport: xen [ 1410.888132][ T7605] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:07 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0xe000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0xc}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{0x8}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x600}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0xd}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x8000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:07 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{0x8}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x10000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) [ 1410.961950][ T7617] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1410.984957][ T7614] 9pnet: Could not find request transport: xen 17:07:07 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{0x8}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0xc00}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000100"/520]}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x0, 0x20, 0x8070bd28, 0x25dfd3fa, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x15}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x200500d8}, 0x20004880) utimes(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000880)={{0x0, 0xea60}}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r2) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x9, 0x3, 0x368, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x298, 0xffffffff, 0xffffffff, 0x298, 0xffffffff, 0x3, &(0x7f0000000440), {[{{@ipv6={@private0, @empty, [0xff000000, 0xffffff, 0xffffff00, 0xffffff00], [0x0, 0xff, 0x0, 0xff], 'virt_wifi0\x00', 'veth1_to_bond\x00', {}, {0xff}, 0x1d, 0xb3, 0x2, 0x42}, 0x0, 0xf8, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}, {0x2}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 'veth0_virt_wifi\x00', {0x100}}}}, {{@uncond, 0x0, 0xf8, 0x158, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x1}}, @common=@hl={{0x28}, {0x1}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@remote, [0x0, 0xff, 0xffffff00, 0xffffff00], 0x4e23, 0x4e22, 0x4e20, 0x4e20, 0xf1, 0x1000, 0x40, 0x401, 0xfffffffe}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x10}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0xd00}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000100"/520]}) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x0, 0x20, 0x8070bd28, 0x25dfd3fa, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x15}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x200500d8}, 0x20004880) utimes(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000880)={{0x0, 0xea60}}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r2) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x9, 0x3, 0x368, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x298, 0xffffffff, 0xffffffff, 0x298, 0xffffffff, 0x3, &(0x7f0000000440), {[{{@ipv6={@private0, @empty, [0xff000000, 0xffffff, 0xffffff00, 0xffffff00], [0x0, 0xff, 0x0, 0xff], 'virt_wifi0\x00', 'veth1_to_bond\x00', {}, {0xff}, 0x1d, 0xb3, 0x2, 0x42}, 0x0, 0xf8, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}, {0x2}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 'veth0_virt_wifi\x00', {0x100}}}}, {{@uncond, 0x0, 0xf8, 0x158, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x1}}, @common=@hl={{0x28}, {0x1}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@remote, [0x0, 0xff, 0xffffff00, 0xffffff00], 0x4e23, 0x4e22, 0x4e20, 0x4e20, 0xf1, 0x1000, 0x40, 0x401, 0xfffffffe}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000100"/520]}) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) (async) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x0, 0x20, 0x8070bd28, 0x25dfd3fa, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x15}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x200500d8}, 0x20004880) (async) utimes(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000880)={{0x0, 0xea60}}) (async) pipe(&(0x7f0000000000)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r2) (async) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x9, 0x3, 0x368, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x298, 0xffffffff, 0xffffffff, 0x298, 0xffffffff, 0x3, &(0x7f0000000440), {[{{@ipv6={@private0, @empty, [0xff000000, 0xffffff, 0xffffff00, 0xffffff00], [0x0, 0xff, 0x0, 0xff], 'virt_wifi0\x00', 'veth1_to_bond\x00', {}, {0xff}, 0x1d, 0xb3, 0x2, 0x42}, 0x0, 0xf8, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}, {0x2}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 'veth0_virt_wifi\x00', {0x100}}}}, {{@uncond, 0x0, 0xf8, 0x158, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x1}}, @common=@hl={{0x28}, {0x1}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@remote, [0x0, 0xff, 0xffffff00, 0xffffff00], 0x4e23, 0x4e22, 0x4e20, 0x4e20, 0xf1, 0x1000, 0x40, 0x401, 0xfffffffe}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) (async) 17:07:07 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:07 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x9000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:07 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x11000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0xc8}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000100"/520]}) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x4}}, './file0\x00'}) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x34, 0x0, 0x20, 0x8070bd28, 0x25dfd3fa, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x15}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x9}]}, 0x34}, 0x1, 0x0, 0x0, 0x200500d8}, 0x20004880) (async) utimes(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000880)={{0x0, 0xea60}}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r2) (async) setsockopt$IP6T_SO_SET_REPLACE(r2, 0x29, 0x40, &(0x7f0000000480)=@raw={'raw\x00', 0x9, 0x3, 0x368, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x298, 0xffffffff, 0xffffffff, 0x298, 0xffffffff, 0x3, &(0x7f0000000440), {[{{@ipv6={@private0, @empty, [0xff000000, 0xffffff, 0xffffff00, 0xffffff00], [0x0, 0xff, 0x0, 0xff], 'virt_wifi0\x00', 'veth1_to_bond\x00', {}, {0xff}, 0x1d, 0xb3, 0x2, 0x42}, 0x0, 0xf8, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}}, @inet=@rpfilter={{0x28}, {0x2}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 'veth0_virt_wifi\x00', {0x100}}}}, {{@uncond, 0x0, 0xf8, 0x158, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x1}}, @common=@hl={{0x28}, {0x1}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@remote, [0x0, 0xff, 0xffffff00, 0xffffff00], 0x4e23, 0x4e22, 0x4e20, 0x4e20, 0xf1, 0x1000, 0x40, 0x401, 0xfffffffe}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x1394}], {}, [{}]}, 0x34, 0x0) [ 1411.066319][ T7635] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1411.085740][ T7632] 9pnet: Could not find request transport: xen 17:07:07 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0xa000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:07 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:07 executing program 3: ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000fa8800000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000000000000000000000000000000000a70e0000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002c949072878ac7428fb1f6c1ce1e27e32930aecb7a22c0506a1d53332462bf8702d38aa8dca90b79a6e0652b1fc32c2fc62aed60e4ced7d19ceb06c0c778dd5b05a729dbbdf135ddc152c747e5bb69c2b787f0305f6"]}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) ioctl$PPPIOCGNPMODE(r2, 0xc008744c, &(0x7f0000000040)={0x281, 0x3}) 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x2000}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x2}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:07 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x12000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) [ 1411.156244][ T7661] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1411.164625][ T7656] 9pnet: Could not find request transport: xen 17:07:07 executing program 3: ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000fa8800000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000000000000000000000000000000000a70e0000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002c949072878ac7428fb1f6c1ce1e27e32930aecb7a22c0506a1d53332462bf8702d38aa8dca90b79a6e0652b1fc32c2fc62aed60e4ced7d19ceb06c0c778dd5b05a729dbbdf135ddc152c747e5bb69c2b787f0305f6"]}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) ioctl$PPPIOCGNPMODE(r2, 0xc008744c, &(0x7f0000000040)={0x281, 0x3}) ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000fa8800000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000000000000000000000000000000000a70e0000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002c949072878ac7428fb1f6c1ce1e27e32930aecb7a22c0506a1d53332462bf8702d38aa8dca90b79a6e0652b1fc32c2fc62aed60e4ced7d19ceb06c0c778dd5b05a729dbbdf135ddc152c747e5bb69c2b787f0305f6"]}) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) (async) ioctl$PPPIOCGNPMODE(r2, 0xc008744c, &(0x7f0000000040)={0x281, 0x3}) (async) 17:07:07 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x2400}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0xb000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:07 executing program 3: ioctl$PPPIOCSCOMPRESS(0xffffffffffffffff, 0x4010744d) (async) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000fa8800000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001f0000000000000000000000000000000000000000000000a70e0000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff03000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000005000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002c949072878ac7428fb1f6c1ce1e27e32930aecb7a22c0506a1d53332462bf8702d38aa8dca90b79a6e0652b1fc32c2fc62aed60e4ced7d19ceb06c0c778dd5b05a729dbbdf135ddc152c747e5bb69c2b787f0305f6"]}) (async, rerun: 64) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (rerun: 64) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {r1}}, './file0\x00'}) ioctl$PPPIOCGNPMODE(r2, 0xc008744c, &(0x7f0000000040)={0x281, 0x3}) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x3f00}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x4}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) [ 1411.234304][ T7684] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1411.242729][ T7671] 9pnet: Could not find request transport: xen 17:07:07 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x20100000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x4000}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x6}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x25000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:07 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) 17:07:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}) 17:07:07 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0xc000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x8100}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x8}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x8}]}, 0x2c, 0x0) 17:07:07 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x8}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x8102}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6]}}) [ 1411.326083][ T7698] 9pnet: Could not find request transport: xen [ 1411.357556][ T7720] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0xc}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) connect$pptp(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x2, {0x2, @rand_addr=0x64010102}}, 0x1e) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'team0\x00'}) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000040)={{0x9, 0x4}, 0x100, './file0\x00'}) 17:07:07 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x3a000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x9413}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x8}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0xd000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) [ 1411.406697][ T7728] 9pnet: Could not find request transport: xen 17:07:07 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x8}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) connect$pptp(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x2, {0x2, @rand_addr=0x64010102}}, 0x1e) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) (async) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'team0\x00'}) (async) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000040)={{0x9, 0x4}, 0x100, './file0\x00'}) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0xff00}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0xd}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x24}], {}, [{}]}, 0x34, 0x0) [ 1411.458604][ T7743] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) connect$pptp(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x2, {0x2, @rand_addr=0x64010102}}, 0x1e) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'team0\x00'}) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000040)={{0x9, 0x4}, 0x100, './file0\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) connect$pptp(0xffffffffffffffff, &(0x7f0000000280)={0x18, 0x2, {0x2, @rand_addr=0x64010102}}, 0x1e) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) (async) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000000)={'team0\x00'}) (async) ioctl$AUTOFS_IOC_EXPIRE(r0, 0x810c9365, &(0x7f0000000040)={{0x9, 0x4}, 0x100, './file0\x00'}) (async) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0xff01}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x8}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x48000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x281}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0xe000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x2}, [{}]}, 0x34, 0x0) [ 1411.501215][ T7747] 9pnet: Could not find request transport: xen 17:07:07 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x8}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x3}, [{}]}, 0x34, 0x0) 17:07:07 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) setxattr$security_evm(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@md5={0x1, "3fc87f78e6c29744aec835ccfe68f007"}, 0x11, 0x3) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) syz_genetlink_get_family_id$batadv(&(0x7f0000000280), r2) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="4b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e7ffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2a8f9feb1f8e105071395d0c81af4d89ddfcae1980eb86bfd284757448e419d8825df068c4ed9a597b7f922ea09815cc23c6b60997d8b4b8eb0819169ab6fed2042082463c922c6fb4795e5220751c223e90ff7f35277d94245e57e6164a9"]}) 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x600}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x8}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) (async) setxattr$security_evm(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@md5={0x1, "3fc87f78e6c29744aec835ccfe68f007"}, 0x11, 0x3) (async) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) syz_genetlink_get_family_id$batadv(&(0x7f0000000280), r2) (async) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="4b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e7ffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2a8f9feb1f8e105071395d0c81af4d89ddfcae1980eb86bfd284757448e419d8825df068c4ed9a597b7f922ea09815cc23c6b60997d8b4b8eb0819169ab6fed2042082463c922c6fb4795e5220751c223e90ff7f35277d94245e57e6164a9"]}) 17:07:07 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x4c000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0xc00}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x5}, [{}]}, 0x34, 0x0) 17:07:07 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x10000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) [ 1411.553320][ T7777] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1411.588131][ T7776] 9pnet: Could not find request transport: xen 17:07:07 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x8}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x6e) (async) setxattr$security_evm(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@md5={0x1, "3fc87f78e6c29744aec835ccfe68f007"}, 0x11, 0x3) (async) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r1, {0x4}}, './file0\x00'}) syz_genetlink_get_family_id$batadv(&(0x7f0000000280), r2) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000300)=ANY=[@ANYBLOB="4b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e7ffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2a8f9feb1f8e105071395d0c81af4d89ddfcae1980eb86bfd284757448e419d8825df068c4ed9a597b7f922ea09815cc23c6b60997d8b4b8eb0819169ab6fed2042082463c922c6fb4795e5220751c223e90ff7f35277d94245e57e6164a9"]}) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x8}, [{}]}, 0x34, 0x0) 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0xd00}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x8}], {}, [{}]}, 0x34, 0x0) [ 1411.631419][ T7798] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0xa}, [{}]}, 0x34, 0x0) 17:07:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffff00"/520]}) 17:07:07 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x60000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x1361}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0xc}, [{}]}, 0x34, 0x0) 17:07:07 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x11000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:07 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x8}], {}, [{}]}, 0x34, 0x0) [ 1411.683905][ T7803] 9pnet: Could not find request transport: xen 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x2000}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffff00"/520]}) 17:07:07 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x8}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x2400}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0xd}, [{}]}, 0x34, 0x0) 17:07:07 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x68000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffff00"/520]}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e9ffffff00"/520]}) (async) [ 1411.735604][ T7827] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x3f00}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x8}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x10}, [{}]}, 0x34, 0x0) 17:07:07 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x12000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_xfrm(r2, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000340)=@flushsa={0x13c, 0x1c, 0x0, 0x70bd2b, 0x25dfdbff, {0x3c}, [@replay_val={0x10, 0xa, {0x70bd28, 0x70bd2b, 0x8}}, @address_filter={0x28, 0x1a, {@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @in6=@local, 0x2, 0x4, 0x51}}, @algo_auth={0xed, 0x1, {{'blake2s-256\x00'}, 0x528, "efae1a08feaf9a78b359d10e9bd0583e033c9123ca2cda879cdbc92d3846ba4c19f452f27e48272c1935d831e138d81a6a06f52a7956135e754ce145a4e271321e8faf4927cd89bcad2572ff342dfbf6c2b54aa12f245802ca243dadd718d5f773d54bc8aadc19b2cfeb4b488e91fd825b51a8eed5858021ab8947783953592419f627c500dcfeda543aa2165124d37fa1b80246fb130418bc2f6d611e77038db986355433"}}]}, 0x13c}, 0x1, 0x0, 0x0, 0x841}, 0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000280)={'batadv_slave_0\x00'}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x4000}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x8}], {}, [{}]}, 0x34, 0x0) [ 1411.797977][ T7832] 9pnet: Could not find request transport: xen [ 1411.801926][ T7845] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0xc8}, [{}]}, 0x34, 0x0) 17:07:07 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x6c000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$nl_xfrm(r2, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000340)=@flushsa={0x13c, 0x1c, 0x0, 0x70bd2b, 0x25dfdbff, {0x3c}, [@replay_val={0x10, 0xa, {0x70bd28, 0x70bd2b, 0x8}}, @address_filter={0x28, 0x1a, {@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @in6=@local, 0x2, 0x4, 0x51}}, @algo_auth={0xed, 0x1, {{'blake2s-256\x00'}, 0x528, "efae1a08feaf9a78b359d10e9bd0583e033c9123ca2cda879cdbc92d3846ba4c19f452f27e48272c1935d831e138d81a6a06f52a7956135e754ce145a4e271321e8faf4927cd89bcad2572ff342dfbf6c2b54aa12f245802ca243dadd718d5f773d54bc8aadc19b2cfeb4b488e91fd825b51a8eed5858021ab8947783953592419f627c500dcfeda543aa2165124d37fa1b80246fb130418bc2f6d611e77038db986355433"}}]}, 0x13c}, 0x1, 0x0, 0x0, 0x841}, 0x14) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000280)={'batadv_slave_0\x00'}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) (async) pipe(&(0x7f00000002c0)) (async) sendmsg$nl_xfrm(r2, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000340)=@flushsa={0x13c, 0x1c, 0x0, 0x70bd2b, 0x25dfdbff, {0x3c}, [@replay_val={0x10, 0xa, {0x70bd28, 0x70bd2b, 0x8}}, @address_filter={0x28, 0x1a, {@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @in6=@local, 0x2, 0x4, 0x51}}, @algo_auth={0xed, 0x1, {{'blake2s-256\x00'}, 0x528, "efae1a08feaf9a78b359d10e9bd0583e033c9123ca2cda879cdbc92d3846ba4c19f452f27e48272c1935d831e138d81a6a06f52a7956135e754ce145a4e271321e8faf4927cd89bcad2572ff342dfbf6c2b54aa12f245802ca243dadd718d5f773d54bc8aadc19b2cfeb4b488e91fd825b51a8eed5858021ab8947783953592419f627c500dcfeda543aa2165124d37fa1b80246fb130418bc2f6d611e77038db986355433"}}]}, 0x13c}, 0x1, 0x0, 0x0, 0x841}, 0x14) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000280)={'batadv_slave_0\x00'}) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x56c}, [{}]}, 0x34, 0x0) 17:07:07 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{0x2, 0x8}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x6113}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x20100000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:07 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:07 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) (async, rerun: 64) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) sendmsg$nl_xfrm(r2, &(0x7f00000004c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000480)={&(0x7f0000000340)=@flushsa={0x13c, 0x1c, 0x0, 0x70bd2b, 0x25dfdbff, {0x3c}, [@replay_val={0x10, 0xa, {0x70bd28, 0x70bd2b, 0x8}}, @address_filter={0x28, 0x1a, {@in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, @in6=@local, 0x2, 0x4, 0x51}}, @algo_auth={0xed, 0x1, {{'blake2s-256\x00'}, 0x528, "efae1a08feaf9a78b359d10e9bd0583e033c9123ca2cda879cdbc92d3846ba4c19f452f27e48272c1935d831e138d81a6a06f52a7956135e754ce145a4e271321e8faf4927cd89bcad2572ff342dfbf6c2b54aa12f245802ca243dadd718d5f773d54bc8aadc19b2cfeb4b488e91fd825b51a8eed5858021ab8947783953592419f627c500dcfeda543aa2165124d37fa1b80246fb130418bc2f6d611e77038db986355433"}}]}, 0x13c}, 0x1, 0x0, 0x0, 0x841}, 0x14) (async, rerun: 64) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000280)={'batadv_slave_0\x00'}) (async, rerun: 64) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) [ 1411.871514][ T7854] 9pnet: Could not find request transport: xen [ 1411.880645][ T7866] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:08 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x74000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x8100}], {}, [{}]}, 0x34, 0x0) 17:07:08 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x22000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:08 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{0x2, 0x8}], {}, [{}]}, 0x34, 0x0) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x8102}], {}, [{}]}, 0x34, 0x0) 17:07:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r1, {r0}}, './file0\x00'}) pipe2$watch_queue(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f0000000480)=0x3) bind$unix(r2, &(0x7f0000000380)=@abs={0x0, 0x0, 0x4e20}, 0x6e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0xfff, 0x1, 0x9ad, 0x839, 0x1, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4, 0xb}, 0x48) clock_gettime(0x5, &(0x7f0000000400)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r4, {r1}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}) 17:07:08 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x2}, [{}]}, 0x34, 0x0) 17:07:08 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{0x2, 0x8}], {}, [{}]}, 0x34, 0x0) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0xff00}], {}, [{}]}, 0x34, 0x0) [ 1411.964371][ T7894] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r1, {r0}}, './file0\x00'}) pipe2$watch_queue(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f0000000480)=0x3) bind$unix(r2, &(0x7f0000000380)=@abs={0x0, 0x0, 0x4e20}, 0x6e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0xfff, 0x1, 0x9ad, 0x839, 0x1, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4, 0xb}, 0x48) clock_gettime(0x5, &(0x7f0000000400)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r4, {r1}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r1, {r0}}, './file0\x00'}) (async) pipe2$watch_queue(&(0x7f0000000440), 0x80) (async) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f0000000480)=0x3) (async) bind$unix(r2, &(0x7f0000000380)=@abs={0x0, 0x0, 0x4e20}, 0x6e) (async) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0xfff, 0x1, 0x9ad, 0x839, 0x1, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4, 0xb}, 0x48) (async) clock_gettime(0x5, &(0x7f0000000400)) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r4, {r1}}, './file0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) (async) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}) (async) 17:07:08 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x7a000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:08 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x4}, [{}]}, 0x34, 0x0) 17:07:08 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:08 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x25000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:08 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x6}, [{}]}, 0x34, 0x0) 17:07:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r1, {r0}}, './file0\x00'}) pipe2$watch_queue(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f0000000480)=0x3) bind$unix(r2, &(0x7f0000000380)=@abs={0x0, 0x0, 0x4e20}, 0x6e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0xfff, 0x1, 0x9ad, 0x839, 0x1, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4, 0xb}, 0x48) clock_gettime(0x5, &(0x7f0000000400)) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r4, {r1}}, './file0\x00'}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000280)={{0x1, 0x1, 0x18, r1, {r0}}, './file0\x00'}) (async) pipe2$watch_queue(&(0x7f0000000440), 0x80) (async) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f0000000480)=0x3) (async) bind$unix(r2, &(0x7f0000000380)=@abs={0x0, 0x0, 0x4e20}, 0x6e) (async) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0xfff, 0x1, 0x9ad, 0x839, 0x1, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4, 0xb}, 0x48) (async) clock_gettime(0x5, &(0x7f0000000400)) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r2, 0xc0189378, &(0x7f0000000340)={{0x1, 0x1, 0x18, r4, {r1}}, './file0\x00'}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) (async) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x7fff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x3000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9]}}) (async) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0xff01}], {}, [{}]}, 0x34, 0x0) 17:07:08 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) [ 1412.013239][ T7898] 9pnet: Could not find request transport: xen [ 1412.044973][ T7913] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:08 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x8cffffff, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:08 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x8}, [{}]}, 0x34, 0x0) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x2}, [{}]}, 0x34, 0x0) 17:07:08 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x48000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) [ 1412.092150][ T7928] 9pnet: Could not find request transport: xen 17:07:08 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:08 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0xc}, [{}]}, 0x34, 0x0) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x3}, [{}]}, 0x34, 0x0) 17:07:08 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0xc0ed0000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:08 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0xd}, [{}]}, 0x34, 0x0) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x8}, [{}]}, 0x34, 0x0) 17:07:08 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) 17:07:08 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x4c000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0xa}, [{}]}, 0x34, 0x0) 17:07:08 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) 17:07:08 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0xf6ffffff, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:08 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x24}, [{}]}, 0x34, 0x0) [ 1412.178435][ T7966] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1412.200180][ T7957] 9pnet: Could not find request transport: xen 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0xc}, [{}]}, 0x34, 0x0) 17:07:08 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0xffffff8c, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:08 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x281}, [{}]}, 0x34, 0x0) 17:07:08 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x5a6e0000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:08 executing program 3: sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x5c}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8015}, 0xc800) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x0, 0x200, 0x70bd29, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000001) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000540), 0x8000, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, &(0x7f0000000580)={{0x2, 0x4}, 0x100, './file0\x00'}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000200)={'batadv0\x00', 0x0}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="0b54d0a0f02d2a74ccc2f9f58dffdd08a201a3885658bb18552fe797a251b588ca5153212faead2ce4da8875c8370e75105e31f9dbeb5e09373d659f9b79ef41371ead4ddeeecc6f6d7ad2ef742568e88a895de537fb656fbd9f4268a4266e3bde41eb3cc86a26a993f16226b256be7663734cdbbb1b4588f2e56af8af050cb56dd025258a550b6250140e6981a8942355ae08d321fff10d4134058e4b7b017dddcfc98c2e4773b9f5399537e8061df19cfc3121e60377fcdae174fb8b5738a8b1d4ee7f0dbbe3e02c1070c345bc9fc65c4dbe99faff", @ANYBLOB="c0891487bc4bd6e6a123b98bcc0d44edf835af900ca693db7dedaa5a8c2bf579cd0de50c140e57598216b72c6baa1be798a068e61940f3f06003220c418a33ea1a58ca6987ab5b3ecd0c682a355bf29adf4236d136bb9c49d0666b5fceac4eaa723abc9d411f32e50ebe30e6a606de2ecec97c326544c5d54807350671adbb24f7d71b3dc9226726aa500d22bcdc90ee1911d33096a94891e752f23540cce5d3b310b4c10a4b6cfade6a2c7c45207a9cbcdb4aa0a04a99418639ba6ac2c3", @ANYRES16=r2, @ANYRES8=r3, @ANYBLOB="600bd013457a93e4f40cca685b847a5fedf179a98aa12ec2dd3e807dee7f109196c50101ec35b96e06464921a77fd1fde8d5aa066e0e36c27339ef2d7fdc67be359b5767275e3573fff4753a9e09fa86847e01d9581776ff763fcbfa8064e76ed6ad313a88c372a871551c34c9c7f7ab755929618c2166d6a11d0486f1ea1390b57b891e2dd0c45bc31225a3fd44661c416b9e8daf7cebc27b5e", @ANYRESDEC=r0, @ANYBLOB="2fd57132b30a44646bae7e4763faaf3015862ee03c7242058bd9604945fb71cac38e6cc7886eda551e1b18bc1607d39377a60c200649e6d0db29b62464fd61347cc8b4a9ba6c2cbf6d987db779d98909c2921f9d8807da4248dfecf87d20ce6b6fdd15265eadc4ac04f543727ce7"]}) [ 1412.268643][ T7974] 9pnet: Could not find request transport: xen 17:07:08 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) 17:07:08 executing program 3: sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x5c}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8015}, 0xc800) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x0, 0x200, 0x70bd29, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000001) (async) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000540), 0x8000, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, &(0x7f0000000580)={{0x2, 0x4}, 0x100, './file0\x00'}) (async) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000200)={'batadv0\x00', 0x0}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="0b54d0a0f02d2a74ccc2f9f58dffdd08a201a3885658bb18552fe797a251b588ca5153212faead2ce4da8875c8370e75105e31f9dbeb5e09373d659f9b79ef41371ead4ddeeecc6f6d7ad2ef742568e88a895de537fb656fbd9f4268a4266e3bde41eb3cc86a26a993f16226b256be7663734cdbbb1b4588f2e56af8af050cb56dd025258a550b6250140e6981a8942355ae08d321fff10d4134058e4b7b017dddcfc98c2e4773b9f5399537e8061df19cfc3121e60377fcdae174fb8b5738a8b1d4ee7f0dbbe3e02c1070c345bc9fc65c4dbe99faff", @ANYBLOB="c0891487bc4bd6e6a123b98bcc0d44edf835af900ca693db7dedaa5a8c2bf579cd0de50c140e57598216b72c6baa1be798a068e61940f3f06003220c418a33ea1a58ca6987ab5b3ecd0c682a355bf29adf4236d136bb9c49d0666b5fceac4eaa723abc9d411f32e50ebe30e6a606de2ecec97c326544c5d54807350671adbb24f7d71b3dc9226726aa500d22bcdc90ee1911d33096a94891e752f23540cce5d3b310b4c10a4b6cfade6a2c7c45207a9cbcdb4aa0a04a99418639ba6ac2c3", @ANYRES16=r2, @ANYRES8=r3, @ANYBLOB="600bd013457a93e4f40cca685b847a5fedf179a98aa12ec2dd3e807dee7f109196c50101ec35b96e06464921a77fd1fde8d5aa066e0e36c27339ef2d7fdc67be359b5767275e3573fff4753a9e09fa86847e01d9581776ff763fcbfa8064e76ed6ad313a88c372a871551c34c9c7f7ab755929618c2166d6a11d0486f1ea1390b57b891e2dd0c45bc31225a3fd44661c416b9e8daf7cebc27b5e", @ANYRESDEC=r0, @ANYBLOB="2fd57132b30a44646bae7e4763faaf3015862ee03c7242058bd9604945fb71cac38e6cc7886eda551e1b18bc1607d39377a60c200649e6d0db29b62464fd61347cc8b4a9ba6c2cbf6d987db779d98909c2921f9d8807da4248dfecf87d20ce6b6fdd15265eadc4ac04f543727ce7"]}) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0xd}, [{}]}, 0x34, 0x0) 17:07:08 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x600}, [{}]}, 0x34, 0x0) 17:07:08 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0xfffffff6, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:08 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x60000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:08 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x10}, [{}]}, 0x34, 0x0) [ 1412.302876][ T24] audit: type=1400 audit(1662311228.353:468): avc: denied { ioctl } for pid=7986 comm="syz-executor.3" path="/dev/mISDNtimer" dev="devtmpfs" ino=224 ioctlcmd=0x9365 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 17:07:08 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x8000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:08 executing program 3: sendmsg$BATADV_CMD_TP_METER(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x3c, 0x0, 0x1, 0x70bd2c, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x5c}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x8015}, 0xc800) sendmsg$BATADV_CMD_GET_NEIGHBORS(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x10, 0x0, 0x200, 0x70bd29, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000001) (async) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) r1 = openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000540), 0x8000, 0x0) ioctl$AUTOFS_IOC_EXPIRE(r1, 0x810c9365, &(0x7f0000000580)={{0x2, 0x4}, 0x100, './file0\x00'}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000200)={'batadv0\x00', 0x0}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="0b54d0a0f02d2a74ccc2f9f58dffdd08a201a3885658bb18552fe797a251b588ca5153212faead2ce4da8875c8370e75105e31f9dbeb5e09373d659f9b79ef41371ead4ddeeecc6f6d7ad2ef742568e88a895de537fb656fbd9f4268a4266e3bde41eb3cc86a26a993f16226b256be7663734cdbbb1b4588f2e56af8af050cb56dd025258a550b6250140e6981a8942355ae08d321fff10d4134058e4b7b017dddcfc98c2e4773b9f5399537e8061df19cfc3121e60377fcdae174fb8b5738a8b1d4ee7f0dbbe3e02c1070c345bc9fc65c4dbe99faff", @ANYBLOB="c0891487bc4bd6e6a123b98bcc0d44edf835af900ca693db7dedaa5a8c2bf579cd0de50c140e57598216b72c6baa1be798a068e61940f3f06003220c418a33ea1a58ca6987ab5b3ecd0c682a355bf29adf4236d136bb9c49d0666b5fceac4eaa723abc9d411f32e50ebe30e6a606de2ecec97c326544c5d54807350671adbb24f7d71b3dc9226726aa500d22bcdc90ee1911d33096a94891e752f23540cce5d3b310b4c10a4b6cfade6a2c7c45207a9cbcdb4aa0a04a99418639ba6ac2c3", @ANYRES16=r2, @ANYRES8=r3, @ANYBLOB="600bd013457a93e4f40cca685b847a5fedf179a98aa12ec2dd3e807dee7f109196c50101ec35b96e06464921a77fd1fde8d5aa066e0e36c27339ef2d7fdc67be359b5767275e3573fff4753a9e09fa86847e01d9581776ff763fcbfa8064e76ed6ad313a88c372a871551c34c9c7f7ab755929618c2166d6a11d0486f1ea1390b57b891e2dd0c45bc31225a3fd44661c416b9e8daf7cebc27b5e", @ANYRESDEC=r0, @ANYBLOB="2fd57132b30a44646bae7e4763faaf3015862ee03c7242058bd9604945fb71cac38e6cc7886eda551e1b18bc1607d39377a60c200649e6d0db29b62464fd61347cc8b4a9ba6c2cbf6d987db779d98909c2921f9d8807da4248dfecf87d20ce6b6fdd15265eadc4ac04f543727ce7"]}) 17:07:08 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0xc00}, [{}]}, 0x34, 0x0) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0xc8}, [{}]}, 0x34, 0x0) 17:07:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000280)=@name, &(0x7f00000002c0)=0x10, 0x80800) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r1) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) sendmsg$BATADV_CMD_GET_NEIGHBORS(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10002000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x54, r2, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="9c9b26cb69e2"}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="83994b83395b"}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x20040080}, 0x4080001) 17:07:08 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x68000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:08 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:08 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0xd00}, [{}]}, 0x34, 0x0) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:08 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0xedc000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) [ 1412.404349][ T8006] 9pnet: Could not find request transport: xen 17:07:08 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) r1 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000280)=@name, &(0x7f00000002c0)=0x10, 0x80800) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r1) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) (async) sendmsg$BATADV_CMD_GET_NEIGHBORS(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10002000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x54, r2, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="9c9b26cb69e2"}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="83994b83395b"}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x20040080}, 0x4080001) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x2}, [{}]}, 0x34, 0x0) 17:07:08 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x1394}, [{}]}, 0x34, 0x0) 17:07:08 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x100000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:08 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x6c000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:08 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x2, 0x8}]}, 0x2c, 0x0) 17:07:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async, rerun: 32) r1 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000280)=@name, &(0x7f00000002c0)=0x10, 0x80800) (rerun: 32) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000380), r1) (async) getsockopt$TIPC_DEST_DROPPABLE(r1, 0x10f, 0x81, &(0x7f0000000300), &(0x7f0000000340)=0x4) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) (async) sendmsg$BATADV_CMD_GET_NEIGHBORS(r3, &(0x7f00000004c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x10002000}, 0xc, &(0x7f0000000480)={&(0x7f0000000400)={0x54, r2, 0x10, 0x70bd2b, 0x25dfdbfd, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x5}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="9c9b26cb69e2"}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="83994b83395b"}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}]}, 0x54}, 0x1, 0x0, 0x0, 0x20040080}, 0x4080001) [ 1412.468734][ T8025] 9pnet: Could not find request transport: xen 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x4}, [{}]}, 0x34, 0x0) 17:07:08 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x2000}, [{}]}, 0x34, 0x0) 17:07:08 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x200000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='K\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'/520]}) ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, &(0x7f00000002c0)={0x6, &(0x7f0000000280)=[{0x6, 0x1, 0x6, 0x1f}, {0x2af, 0x30, 0x47, 0x10001}, {0x0, 0xaf, 0x0, 0x5}, {0x6, 0xc, 0x9, 0x6}, {0x8, 0x1, 0x0, 0x8}, {0x8000, 0x40, 0x7, 0x9}]}) 17:07:08 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x3}], {}, [{}]}, 0x34, 0x0) 17:07:08 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x2400}, [{}]}, 0x34, 0x0) 17:07:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='K\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'/520]}) ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, &(0x7f00000002c0)={0x6, &(0x7f0000000280)=[{0x6, 0x1, 0x6, 0x1f}, {0x2af, 0x30, 0x47, 0x10001}, {0x0, 0xaf, 0x0, 0x5}, {0x6, 0xc, 0x9, 0x6}, {0x8, 0x1, 0x0, 0x8}, {0x8000, 0x40, 0x7, 0x9}]}) 17:07:08 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x74000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:08 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x300000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x6}, [{}]}, 0x34, 0x0) 17:07:08 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x10}], {}, [{}]}, 0x34, 0x0) [ 1412.545372][ T8045] 9pnet: Could not find request transport: xen 17:07:08 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x3f00}, [{}]}, 0x34, 0x0) 17:07:08 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x400000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x8}, [{}]}, 0x34, 0x0) 17:07:08 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x10}], {}, [{}]}, 0x34, 0x0) 17:07:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='K\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00'/520]}) (async) ioctl$PPPIOCSACTIVE(0xffffffffffffffff, 0x40107446, &(0x7f00000002c0)={0x6, &(0x7f0000000280)=[{0x6, 0x1, 0x6, 0x1f}, {0x2af, 0x30, 0x47, 0x10001}, {0x0, 0xaf, 0x0, 0x5}, {0x6, 0xc, 0x9, 0x6}, {0x8, 0x1, 0x0, 0x8}, {0x8000, 0x40, 0x7, 0x9}]}) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0xc}, [{}]}, 0x34, 0x0) 17:07:08 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x7a000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}) 17:07:08 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x10}], {}, [{}]}, 0x34, 0x0) 17:07:08 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x500000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:08 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x4000}, [{}]}, 0x34, 0x0) 17:07:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}) (async) [ 1412.632337][ T8070] 9pnet: Could not find request transport: xen 17:07:08 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x600000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0xd}, [{}]}, 0x34, 0x0) 17:07:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000]}}) 17:07:08 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x8cffffff, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:08 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x10}], {}, [{}]}, 0x34, 0x0) 17:07:08 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x8100}, [{}]}, 0x34, 0x0) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x24}, [{}]}, 0x34, 0x0) 17:07:08 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x700000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) futimesat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={{0x0, 0xea60}, {0x77359400}}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffd, 0x9, 0x3, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20000]}}) [ 1412.714675][ T8091] 9pnet: Could not find request transport: xen 17:07:08 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0xc0ed0000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:08 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x8102}, [{}]}, 0x34, 0x0) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x281}, [{}]}, 0x34, 0x0) 17:07:08 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x10}], {}, [{}]}, 0x34, 0x0) 17:07:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) futimesat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={{0x0, 0xea60}, {0x77359400}}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffd, 0x9, 0x3, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20000]}}) 17:07:08 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x10}], {}, [{}]}, 0x34, 0x0) 17:07:08 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x800000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:08 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x9413}, [{}]}, 0x34, 0x0) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x600}, [{}]}, 0x34, 0x0) 17:07:08 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x900000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:08 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) futimesat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={{0x0, 0xea60}, {0x77359400}}) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffffffd, 0x9, 0x3, 0x0, 0x0, 0xfffffff7, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20000]}}) 17:07:08 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x10}], {}, [{}]}, 0x34, 0x0) 17:07:08 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0xf6ffffff, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:08 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0xff00}, [{}]}, 0x34, 0x0) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0xc00}, [{}]}, 0x34, 0x0) 17:07:08 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0xa00000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:08 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x50000829) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005f5e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008b9f4d8fff0b5baf00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000049e422c6fee35047b3afcf51a08628ea2cff5fa16a2f4431b85a52a54f2dfc6826a7b14b2334d78b950a634452efddbab085ee515f13e64eb6f4023a36d03fc468f4a4ff5f58c6347a7e267a6d164138ed70e9f9522953e55bc2c627f8628d8db8d661f95e76f37349821b13b24df2dafda7a5a986d5e7b39ebd759fc156645e815b7301ab014ea3ca6167c760c2249108502ceef47c810ec0671e"]}) 17:07:08 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x10}], {}, [{}]}, 0x34, 0x0) [ 1412.835652][ T8127] 9pnet: Could not find request transport: xen 17:07:08 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0xff01}, [{}]}, 0x34, 0x0) 17:07:08 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0xffffff8c, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:08 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0xd00}, [{}]}, 0x34, 0x0) 17:07:08 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x50000829) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005f5e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008b9f4d8fff0b5baf00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000049e422c6fee35047b3afcf51a08628ea2cff5fa16a2f4431b85a52a54f2dfc6826a7b14b2334d78b950a634452efddbab085ee515f13e64eb6f4023a36d03fc468f4a4ff5f58c6347a7e267a6d164138ed70e9f9522953e55bc2c627f8628d8db8d661f95e76f37349821b13b24df2dafda7a5a986d5e7b39ebd759fc156645e815b7301ab014ea3ca6167c760c2249108502ceef47c810ec0671e"]}) 17:07:08 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0xb00000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:08 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x10}], {}, [{}]}, 0x34, 0x0) 17:07:08 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0xfffffff6, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x50000829) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005f5e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008b9f4d8fff0b5baf00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000049e422c6fee35047b3afcf51a08628ea2cff5fa16a2f4431b85a52a54f2dfc6826a7b14b2334d78b950a634452efddbab085ee515f13e64eb6f4023a36d03fc468f4a4ff5f58c6347a7e267a6d164138ed70e9f9522953e55bc2c627f8628d8db8d661f95e76f37349821b13b24df2dafda7a5a986d5e7b39ebd759fc156645e815b7301ab014ea3ca6167c760c2249108502ceef47c810ec0671e"]}) pipe(&(0x7f0000000000)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) (async) inotify_add_watch(r0, &(0x7f0000000000)='./file0\x00', 0x50000829) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005f5e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008b9f4d8fff0b5baf00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000049e422c6fee35047b3afcf51a08628ea2cff5fa16a2f4431b85a52a54f2dfc6826a7b14b2334d78b950a634452efddbab085ee515f13e64eb6f4023a36d03fc468f4a4ff5f58c6347a7e267a6d164138ed70e9f9522953e55bc2c627f8628d8db8d661f95e76f37349821b13b24df2dafda7a5a986d5e7b39ebd759fc156645e815b7301ab014ea3ca6167c760c2249108502ceef47c810ec0671e"]}) (async) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0xc00000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x1361}, [{}]}, 0x34, 0x0) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x10}], {}, [{}]}, 0x34, 0x0) 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x8000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2}, [{}]}, 0x34, 0x0) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0xd00000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x4}, [{}]}, 0x34, 0x0) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x10}], {}, [{}]}, 0x34, 0x0) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x2000}, [{}]}, 0x34, 0x0) 17:07:09 executing program 3: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000280)={0xe, {0x0, 0x3f, 0x6, 0x6a, "213ffc74f3227a23080dd7e838a2dbd7f0bde87d121b2f5a1dde5851ac79611a36d66c5fbe00190002356970776c3c8c4d4860428ef3add8dc39f139dd9edc1e151ae258ff4ac00cba6866b5a8b51348ab6cb527ca737d2cb195dedecd8cef8ad705cb36bc5f4dad9a85"}}, 0x76) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6(0xa, 0x5, 0x8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x1000]}}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000300)) 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0xedc000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0xe00000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x2400}, [{}]}, 0x34, 0x0) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x6}, [{}]}, 0x34, 0x0) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x10}], {}, [{}]}, 0x34, 0x0) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x3f00}, [{}]}, 0x34, 0x0) 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x2000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{0x10}], {}, [{}]}, 0x34, 0x0) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x1000000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x100000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{0x10}], {}, [{}]}, 0x34, 0x0) 17:07:09 executing program 3: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000280)={0xe, {0x0, 0x3f, 0x6, 0x6a, "213ffc74f3227a23080dd7e838a2dbd7f0bde87d121b2f5a1dde5851ac79611a36d66c5fbe00190002356970776c3c8c4d4860428ef3add8dc39f139dd9edc1e151ae258ff4ac00cba6866b5a8b51348ab6cb527ca737d2cb195dedecd8cef8ad705cb36bc5f4dad9a85"}}, 0x76) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6(0xa, 0x5, 0x8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x1000]}}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000300)) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000280)={0xe, {0x0, 0x3f, 0x6, 0x6a, "213ffc74f3227a23080dd7e838a2dbd7f0bde87d121b2f5a1dde5851ac79611a36d66c5fbe00190002356970776c3c8c4d4860428ef3add8dc39f139dd9edc1e151ae258ff4ac00cba6866b5a8b51348ab6cb527ca737d2cb195dedecd8cef8ad705cb36bc5f4dad9a85"}}, 0x76) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) socket$inet6(0xa, 0x5, 0x8) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x1000]}}) (async) pipe(&(0x7f0000000000)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) (async) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000300)) (async) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x8}, [{}]}, 0x34, 0x0) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x1100000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x4000}, [{}]}, 0x34, 0x0) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x6113}, [{}]}, 0x34, 0x0) 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x200000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xc}, [{}]}, 0x34, 0x0) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{0x10}], {}, [{}]}, 0x34, 0x0) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x1200000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:09 executing program 3: write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000280)={0xe, {0x0, 0x3f, 0x6, 0x6a, "213ffc74f3227a23080dd7e838a2dbd7f0bde87d121b2f5a1dde5851ac79611a36d66c5fbe00190002356970776c3c8c4d4860428ef3add8dc39f139dd9edc1e151ae258ff4ac00cba6866b5a8b51348ab6cb527ca737d2cb195dedecd8cef8ad705cb36bc5f4dad9a85"}}, 0x76) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6(0xa, 0x5, 0x8) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x1000]}}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000300)) write$UHID_SET_REPORT_REPLY(0xffffffffffffffff, &(0x7f0000000280)={0xe, {0x0, 0x3f, 0x6, 0x6a, "213ffc74f3227a23080dd7e838a2dbd7f0bde87d121b2f5a1dde5851ac79611a36d66c5fbe00190002356970776c3c8c4d4860428ef3add8dc39f139dd9edc1e151ae258ff4ac00cba6866b5a8b51348ab6cb527ca737d2cb195dedecd8cef8ad705cb36bc5f4dad9a85"}}, 0x76) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) socket$inet6(0xa, 0x5, 0x8) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x1000]}}) (async) pipe(&(0x7f0000000000)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) (async) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r1, 0x5386, &(0x7f0000000300)) (async) 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x300000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x8100}, [{}]}, 0x34, 0x0) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xd}, [{}]}, 0x34, 0x0) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x2010000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x8102}, [{}]}, 0x34, 0x0) 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x400000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x24}, [{}]}, 0x34, 0x0) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x2500000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0xff00}, [{}]}, 0x34, 0x0) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x281}, [{}]}, 0x34, 0x0) 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x500000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x3a00000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0xff01}, [{}]}, 0x34, 0x0) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x4800000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x600000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x600}, [{}]}, 0x34, 0x0) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x4c00000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x700000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) getsockname$unix(r0, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) r1 = gettid() getpid() syz_open_procfs(r1, &(0x7f0000000280)='oom_score_adj\x00') socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000200)) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100), r0) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r5, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040002}, 0x20000044) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000240)={'syz_tun\x00', &(0x7f0000000080)=ANY=[]}) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2}, [{}]}, 0x34, 0x0) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xc00}, [{}]}, 0x34, 0x0) 17:07:09 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) (async, rerun: 64) getsockname$unix(r0, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) (rerun: 64) r1 = gettid() getpid() (async) syz_open_procfs(r1, &(0x7f0000000280)='oom_score_adj\x00') socket$nl_xfrm(0x10, 0x3, 0x6) (async) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000200)) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) (async) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100), r0) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r5, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040002}, 0x20000044) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000200)) (async) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000240)={'syz_tun\x00', &(0x7f0000000080)=ANY=[]}) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x6000000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x800000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x6800000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:09 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) (async, rerun: 64) getsockname$unix(r0, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x6e) (async, rerun: 64) r1 = gettid() getpid() (async, rerun: 32) syz_open_procfs(r1, &(0x7f0000000280)='oom_score_adj\x00') (async, rerun: 32) socket$nl_xfrm(0x10, 0x3, 0x6) (async) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000200)) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) ioctl$SCSI_IOCTL_DOORLOCK(r3, 0x5380) (async) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000100), r0) sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r5, 0x200, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}]}, 0x24}, 0x1, 0x0, 0x0, 0x4040002}, 0x20000044) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r4, 0x8933, &(0x7f0000000200)) (async) ioctl$sock_SIOCETHTOOL(r4, 0x8946, &(0x7f0000000240)={'syz_tun\x00', &(0x7f0000000080)=ANY=[]}) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x4}, [{}]}, 0x34, 0x0) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xd00}, [{}]}, 0x34, 0x0) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x10}]}, 0x2c, 0x0) 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x900000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) inotify_add_watch(r1, &(0x7f0000000280)='./file0\x00', 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x6c00000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x6}, [{}]}, 0x34, 0x0) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x4}], {}, [{}]}, 0x34, 0x0) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x1394}, [{}]}, 0x34, 0x0) 17:07:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) (async) inotify_add_watch(r1, &(0x7f0000000280)='./file0\x00', 0x1) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0xa00000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x8}, [{}]}, 0x34, 0x0) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x4}], {}, [{}]}, 0x34, 0x0) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x7400000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000}, [{}]}, 0x34, 0x0) 17:07:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) (async) inotify_add_watch(r1, &(0x7f0000000280)='./file0\x00', 0x1) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0xb00000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2400}, [{}]}, 0x34, 0x0) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x7a00000000000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x4}], {}, [{}]}, 0x34, 0x0) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xc}, [{}]}, 0x34, 0x0) 17:07:09 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet_udplite(0x2, 0x2, 0x88) pipe2$watch_queue(&(0x7f00000000c0), 0x80) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x3f00}, [{}]}, 0x34, 0x0) 17:07:09 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x4}], {}, [{}]}, 0x34, 0x0) 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0xc00000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xd}, [{}]}, 0x34, 0x0) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x8cffffff00000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:09 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) pipe2$watch_queue(&(0x7f00000000c0), 0x80) (async) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0xf6ffffff00000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0xd00000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x4}], {}, [{}]}, 0x34, 0x0) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x4000}, [{}]}, 0x34, 0x0) 17:07:09 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) pipe2$watch_queue(&(0x7f00000000c0), 0x80) (async) getsockopt$TIPC_SRC_DROPPABLE(0xffffffffffffffff, 0x10f, 0x80, &(0x7f0000000000), &(0x7f0000000040)=0x4) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x24}, [{}]}, 0x34, 0x0) 17:07:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}}) 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0xe00000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x4}], {}, [{}]}, 0x34, 0x0) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x8100}, [{}]}, 0x34, 0x0) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x281}, [{}]}, 0x34, 0x0) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0xffffffff00000000, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x4}], {}, [{}]}, 0x34, 0x0) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x8102}, [{}]}, 0x34, 0x0) 17:07:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}}) 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x1000000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x600}, [{}]}, 0x34, 0x0) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0xa, 'staff_u'}}]}}) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x9413}, [{}]}, 0x34, 0x0) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x4}], {}, [{}]}, 0x34, 0x0) 17:07:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1]}}) 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x1100000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000500)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f00000002c0)=@newsa={0x1b4, 0x10, 0x24, 0x70bd26, 0x25dfdbfb, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, @in6=@local, 0x4e23, 0x0, 0x4e24, 0x3, 0xa, 0x1e0, 0xa0, 0x88, 0x0, 0xffffffffffffffff}, {@in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x4d5, 0xff}, @in6=@private0, {0x2c8, 0x9, 0x2, 0x8, 0x0, 0x9, 0x8001, 0x5}, {0xffffffff, 0x5, 0x100, 0x100000001}, {0x9, 0xffff0001, 0x8a}, 0x70bd25, 0x3505, 0x2, 0x4, 0x5}, [@tmpl={0xc4, 0x5, [{{@in=@rand_addr=0x64010101, 0x4d5, 0xff}, 0x2, @in6=@mcast2, 0x3500, 0x2, 0x1, 0x7, 0x0, 0x9, 0x7}, {{@in=@loopback, 0x4d5, 0x33}, 0x2, @in=@loopback, 0x3507, 0x3, 0x0, 0x6, 0x2, 0x800}, {{@in6=@loopback, 0x4d6, 0x33}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x5, 0x80000001, 0x3, 0x400}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x4}, 0x804) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xc00}, [{}]}, 0x34, 0x0) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x4}], {}, [{}]}, 0x34, 0x0) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xff00}, [{}]}, 0x34, 0x0) 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x1200000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000500)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f00000002c0)=@newsa={0x1b4, 0x10, 0x24, 0x70bd26, 0x25dfdbfb, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, @in6=@local, 0x4e23, 0x0, 0x4e24, 0x3, 0xa, 0x1e0, 0xa0, 0x88, 0x0, 0xffffffffffffffff}, {@in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x4d5, 0xff}, @in6=@private0, {0x2c8, 0x9, 0x2, 0x8, 0x0, 0x9, 0x8001, 0x5}, {0xffffffff, 0x5, 0x100, 0x100000001}, {0x9, 0xffff0001, 0x8a}, 0x70bd25, 0x3505, 0x2, 0x4, 0x5}, [@tmpl={0xc4, 0x5, [{{@in=@rand_addr=0x64010101, 0x4d5, 0xff}, 0x2, @in6=@mcast2, 0x3500, 0x2, 0x1, 0x7, 0x0, 0x9, 0x7}, {{@in=@loopback, 0x4d5, 0x33}, 0x2, @in=@loopback, 0x3507, 0x3, 0x0, 0x6, 0x2, 0x800}, {{@in6=@loopback, 0x4d6, 0x33}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x5, 0x80000001, 0x3, 0x400}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x4}, 0x804) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000500)) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f00000002c0)=@newsa={0x1b4, 0x10, 0x24, 0x70bd26, 0x25dfdbfb, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, @in6=@local, 0x4e23, 0x0, 0x4e24, 0x3, 0xa, 0x1e0, 0xa0, 0x88, 0x0, 0xffffffffffffffff}, {@in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x4d5, 0xff}, @in6=@private0, {0x2c8, 0x9, 0x2, 0x8, 0x0, 0x9, 0x8001, 0x5}, {0xffffffff, 0x5, 0x100, 0x100000001}, {0x9, 0xffff0001, 0x8a}, 0x70bd25, 0x3505, 0x2, 0x4, 0x5}, [@tmpl={0xc4, 0x5, [{{@in=@rand_addr=0x64010101, 0x4d5, 0xff}, 0x2, @in6=@mcast2, 0x3500, 0x2, 0x1, 0x7, 0x0, 0x9, 0x7}, {{@in=@loopback, 0x4d5, 0x33}, 0x2, @in=@loopback, 0x3507, 0x3, 0x0, 0x6, 0x2, 0x800}, {{@in6=@loopback, 0x4d6, 0x33}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x5, 0x80000001, 0x3, 0x400}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x4}, 0x804) (async) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x22, 'staff_u'}}]}}) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xd00}, [{}]}, 0x34, 0x0) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xff01}, [{}]}, 0x34, 0x0) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x4}], {}, [{}]}, 0x34, 0x0) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x4}], {}, [{}]}, 0x34, 0x0) [ 1413.811715][ T8438] 9pnet: Could not find request transport: xen 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x2010000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x1361}, [{}]}, 0x34, 0x0) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x40000}, [{}]}, 0x34, 0x0) 17:07:09 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$SG_GET_ACCESS_COUNT(0xffffffffffffffff, 0x2289, &(0x7f0000000500)) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) sendmsg$nl_xfrm(r0, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000480)={&(0x7f00000002c0)=@newsa={0x1b4, 0x10, 0x24, 0x70bd26, 0x25dfdbfb, {{@in=@dev={0xac, 0x14, 0x14, 0x2e}, @in6=@local, 0x4e23, 0x0, 0x4e24, 0x3, 0xa, 0x1e0, 0xa0, 0x88, 0x0, 0xffffffffffffffff}, {@in6=@ipv4={'\x00', '\xff\xff', @multicast1}, 0x4d5, 0xff}, @in6=@private0, {0x2c8, 0x9, 0x2, 0x8, 0x0, 0x9, 0x8001, 0x5}, {0xffffffff, 0x5, 0x100, 0x100000001}, {0x9, 0xffff0001, 0x8a}, 0x70bd25, 0x3505, 0x2, 0x4, 0x5}, [@tmpl={0xc4, 0x5, [{{@in=@rand_addr=0x64010101, 0x4d5, 0xff}, 0x2, @in6=@mcast2, 0x3500, 0x2, 0x1, 0x7, 0x0, 0x9, 0x7}, {{@in=@loopback, 0x4d5, 0x33}, 0x2, @in=@loopback, 0x3507, 0x3, 0x0, 0x6, 0x2, 0x800}, {{@in6=@loopback, 0x4d6, 0x33}, 0xa, @in6=@remote, 0x3506, 0x0, 0x1, 0x5, 0x80000001, 0x3, 0x400}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x4}, 0x804) 17:07:09 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x25, 'staff_u'}}]}}) 17:07:09 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000240)={'dvmrp1\x00', &(0x7f0000000280)=ANY=[@ANYRES8=r0]}) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000000)) 17:07:09 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x4}], {}, [{}]}, 0x34, 0x0) 17:07:09 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x2200000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:09 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x400000}, [{}]}, 0x34, 0x0) 17:07:09 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000}, [{}]}, 0x34, 0x0) [ 1413.884426][ T8459] 9pnet: Could not find request transport: xen 17:07:10 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x2500000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2400}, [{}]}, 0x34, 0x0) 17:07:10 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000200)) (async, rerun: 32) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000240)={'dvmrp1\x00', &(0x7f0000000280)=ANY=[@ANYRES8=r0]}) (async, rerun: 32) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000000)) 17:07:10 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x800000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x2c, 'staff_u'}}]}}) 17:07:10 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{0x4}], {}, [{}]}, 0x34, 0x0) 17:07:10 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x4800000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) [ 1413.950332][ T8484] 9pnet: Could not find request transport: xen 17:07:10 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x1000000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{0x4}], {}, [{}]}, 0x34, 0x0) 17:07:10 executing program 3: socket$nl_xfrm(0x10, 0x3, 0x6) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000200)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000240)={'dvmrp1\x00', &(0x7f0000000280)=ANY=[@ANYRES8=r0]}) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000000)) socket$nl_xfrm(0x10, 0x3, 0x6) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000200)) (async) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000240)={'dvmrp1\x00', &(0x7f0000000280)=ANY=[@ANYRES8=r0]}) (async) ioctl$PPPIOCGUNIT(0xffffffffffffffff, 0x80047456, &(0x7f0000000000)) (async) 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x3f00}, [{}]}, 0x34, 0x0) 17:07:10 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x4c00000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:10 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{0x4}], {}, [{}]}, 0x34, 0x0) 17:07:10 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x4000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}, 0x22}]}}) 17:07:10 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x5a6e000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:10 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) r1 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000280)=@id, &(0x7f00000002c0)=0x10, 0x80800) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1, {0x9}}, './file0\x00'}) 17:07:10 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x4000000}, [{}]}, 0x34, 0x0) [ 1414.039689][ T8509] 9pnet: Could not find request transport: xen 17:07:10 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) r1 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000280)=@id, &(0x7f00000002c0)=0x10, 0x80800) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1, {0x9}}, './file0\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) accept4$tipc(0xffffffffffffffff, &(0x7f0000000280)=@id, &(0x7f00000002c0)=0x10, 0x80800) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1, {0x9}}, './file0\x00'}) (async) 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x6113}, [{}]}, 0x34, 0x0) 17:07:10 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x6000000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:10 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:10 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:10 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x6000000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x8100}, [{}]}, 0x34, 0x0) 17:07:10 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x6800000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:10 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async, rerun: 32) r1 = accept4$tipc(0xffffffffffffffff, &(0x7f0000000280)=@id, &(0x7f00000002c0)=0x10, 0x80800) (rerun: 32) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000300)={{0x1, 0x1, 0x18, r1, {0x9}}, './file0\x00'}) [ 1414.118303][ T8544] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:10 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:10 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x6c00000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x8102}, [{}]}, 0x34, 0x0) 17:07:10 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x8000000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) 17:07:10 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0x2}}) [ 1414.177333][ T8564] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xff00}, [{}]}, 0x34, 0x0) 17:07:10 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x7400000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xff01}, [{}]}, 0x34, 0x0) 17:07:10 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xc000000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x7a00000000000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:10 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) 17:07:10 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xd000000}, [{}]}, 0x34, 0x0) [ 1414.255009][ T8579] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:10 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0x3}}) 17:07:10 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x20000000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x40000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) 17:07:10 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x8cffffff00000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x400000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{0x4}]}, 0x2c, 0x0) 17:07:10 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0x4}}) 17:07:10 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0xf6ffffff00000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x800000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}, 0x22}]}}) 17:07:10 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x24000000}, [{}]}, 0x34, 0x0) [ 1414.344861][ T8595] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:10 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0xffffffff00000000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x1000000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x3f000000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0x5}}) 17:07:10 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x22, 'trans=xen,'}}]}}) [ 1414.416277][ T8614] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1414.433513][ T8604] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:10 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}, 0x22}]}}) 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x81000000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0x6}}) 17:07:10 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x81020000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x4000000}, [{}]}, 0x34, 0x0) [ 1414.477632][ T8626] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1414.499915][ T8622] 9pnet: Could not find request transport: xen [ 1414.506912][ T8628] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:10 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x2c, 'trans=xen,'}}]}}) 17:07:10 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}, 0x22}]}}) 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x6000000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x8bffffff}, [{}]}, 0x34, 0x0) [ 1414.549570][ T8634] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:10 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0x7}}) 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x8000000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x8cffffff}, [{}]}, 0x34, 0x0) 17:07:10 executing program 4: mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}, 0x22}]}}) [ 1414.593310][ T8643] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1414.602266][ T8638] 9pnet: Could not find request transport: xen [ 1414.629047][ T8650] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:10 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0x8}}) 17:07:10 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, '\nrans=xen,'}}]}}) 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xc000000}, [{}]}, 0x34, 0x0) [ 1414.657974][ T8638] 9pnet: Could not find request transport: xen 17:07:10 executing program 4: mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}, 0x22}]}}) 17:07:10 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x94130000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xd000000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 4: mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}, 0x22}]}}) 17:07:10 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, '\"rans=xen,'}}]}}) [ 1414.720777][ T8663] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1414.744196][ T8658] 9pnet: Could not find request transport: xen 17:07:10 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0x9}}) 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x20000000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xe4ffffff}, [{}]}, 0x34, 0x0) 17:07:10 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}, 0x22}]}}) 17:07:10 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xf6ffffff}, [{}]}, 0x34, 0x0) 17:07:10 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}, 0x22}]}}) 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x24000000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0xa}}) 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x3f000000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xfbffffff}, [{}]}, 0x34, 0x0) [ 1414.808589][ T8676] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1414.840772][ T8673] 9pnet: Could not find request transport: xen 17:07:10 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, '%rans=xen,'}}]}}) 17:07:10 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}, 0x22}]}}) 17:07:10 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xfeffffff}, [{}]}, 0x34, 0x0) 17:07:10 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x61130000}, [{}]}, 0x34, 0x0) 17:07:10 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}, 0x22}]}}) [ 1414.882523][ T8690] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:11 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0xb}}) 17:07:11 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x81000000}, [{}]}, 0x34, 0x0) 17:07:11 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, ',rans=xen,'}}]}}) 17:07:11 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}, 0x22}]}}) 17:07:11 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xff000000}, [{}]}, 0x34, 0x0) 17:07:11 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x81020000}, [{}]}, 0x34, 0x0) [ 1414.941153][ T8696] 9pnet: Could not find request transport: xen [ 1414.966517][ T8708] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:11 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0xc}}) 17:07:11 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xff010000}, [{}]}, 0x34, 0x0) 17:07:11 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, 0x0, &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}, 0x22}]}}) 17:07:11 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x8bffffff}, [{}]}, 0x34, 0x0) 17:07:11 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 't\nans=xen,'}}]}}) [ 1415.057725][ T8720] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1415.075753][ T8710] 9pnet: Could not find request transport: xen 17:07:11 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xffffff8b}, [{}]}, 0x34, 0x0) 17:07:11 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0xd}}) 17:07:11 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x8cffffff}, [{}]}, 0x34, 0x0) 17:07:11 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}, 0x22}]}}) 17:07:11 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xffffff8c}, [{}]}, 0x34, 0x0) 17:07:11 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xe4ffffff}, [{}]}, 0x34, 0x0) 17:07:11 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 't\"ans=xen,'}}]}}) 17:07:11 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}, 0x22}]}}) [ 1415.140430][ T8731] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1415.156339][ T8727] 9pnet: Could not find request transport: xen 17:07:11 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0xe}}) 17:07:11 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xffffffe4}, [{}]}, 0x34, 0x0) 17:07:11 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xf6ffffff}, [{}]}, 0x34, 0x0) 17:07:11 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}, 0x22}]}}) 17:07:11 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xfffffff6}, [{}]}, 0x34, 0x0) 17:07:11 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 't%ans=xen,'}}]}}) 17:07:11 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xfbffffff}, [{}]}, 0x34, 0x0) 17:07:11 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, 0x0) [ 1415.240099][ T8744] 9pnet: Could not find request transport: xen [ 1415.254050][ T8750] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:11 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0x10}}) 17:07:11 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xfffffffb}, [{}]}, 0x34, 0x0) 17:07:11 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, 0x0) 17:07:11 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xfeffffff}, [{}]}, 0x34, 0x0) 17:07:11 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 't,ans=xen,'}}]}}) 17:07:11 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xfffffffe}, [{}]}, 0x34, 0x0) 17:07:11 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, 0x0) [ 1415.327253][ T8765] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1415.345011][ T8759] 9pnet: Could not find request transport: xen 17:07:11 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xff000000}, [{}]}, 0x34, 0x0) 17:07:11 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0x11}}) 17:07:11 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)) 17:07:11 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x2}]}, 0x34, 0x0) 17:07:11 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xff010000}, [{}]}, 0x34, 0x0) 17:07:11 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tr\nns=xen,'}}]}}) 17:07:11 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xffffff8b}, [{}]}, 0x34, 0x0) 17:07:11 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x3}]}, 0x34, 0x0) [ 1415.417133][ T8783] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1415.434286][ T8776] 9pnet: Could not find request transport: xen 17:07:11 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0x12}}) 17:07:11 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x4}]}, 0x34, 0x0) [ 1415.485681][ T8786] 9pnet: Could not find request transport: xen 17:07:11 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xffffff8c}, [{}]}, 0x34, 0x0) 17:07:11 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)) [ 1415.530770][ T8798] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1415.552765][ T8795] 9pnet: Could not find request transport: xen 17:07:11 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x5}]}, 0x34, 0x0) 17:07:11 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xffffffe4}, [{}]}, 0x34, 0x0) 17:07:11 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tr\"ns=xen,'}}]}}) 17:07:11 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0x25}}) [ 1415.595469][ T8803] 9pnet: Could not find request transport: xen 17:07:11 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)) 17:07:11 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xfffffff6}, [{}]}, 0x34, 0x0) 17:07:11 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x6}]}, 0x34, 0x0) [ 1415.648751][ T8811] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:11 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0x3a}}) 17:07:11 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x7}]}, 0x34, 0x0) 17:07:11 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tr%ns=xen,'}}]}}) [ 1415.696844][ T8812] 9pnet: Could not find request transport: xen 17:07:11 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xfffffffb}, [{}]}, 0x34, 0x0) 17:07:11 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xfffffffe}, [{}]}, 0x34, 0x0) 17:07:11 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0x48}}) 17:07:11 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0xc}]}, 0x34, 0x0) 17:07:11 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x2}]}, 0x34, 0x0) [ 1415.750114][ T8826] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1415.772288][ T8816] 9pnet: Could not find request transport: xen 17:07:11 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x2}]}, 0x34, 0x0) 17:07:11 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0xd}]}, 0x34, 0x0) [ 1415.832428][ T8835] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1415.845992][ T8827] 9pnet: Could not find request transport: xen 17:07:11 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x2}]}, 0x34, 0x0) 17:07:11 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tr,ns=xen,'}}]}}) 17:07:11 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0x4c}}) 17:07:12 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x2}]}, 0x34, 0x0) 17:07:12 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x10}]}, 0x34, 0x0) 17:07:12 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x3}]}, 0x34, 0x0) 17:07:12 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tra\ns=xen,'}}]}}) 17:07:12 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x568}]}, 0x34, 0x0) [ 1415.950631][ T8847] 9pnet: Could not find request transport: xen 17:07:12 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x4}]}, 0x34, 0x0) 17:07:12 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x2}]}, 0x34, 0x0) 17:07:12 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x2c00}]}, 0x34, 0x0) 17:07:12 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x2}]}, 0x34, 0x0) 17:07:12 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x5}]}, 0x34, 0x0) 17:07:12 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tra\"s=xen,'}}]}}) [ 1416.015931][ T8858] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1416.044694][ T8856] 9pnet: Could not find request transport: xen 17:07:12 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0x60}}) 17:07:12 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x6a1f}]}, 0x34, 0x0) 17:07:12 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x2}]}, 0x34, 0x0) 17:07:12 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x2}]}, 0x34, 0x0) 17:07:12 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x6}]}, 0x34, 0x0) 17:07:12 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:12 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x7}]}, 0x34, 0x0) 17:07:12 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x2}]}, 0x34, 0x0) 17:07:12 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x2}]}, 0x34, 0x0) [ 1416.114036][ T8875] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:12 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x2}]}, 0x34, 0x0) 17:07:12 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tra%s=xen,'}}]}}) 17:07:12 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0xc}]}, 0x34, 0x0) 17:07:12 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0x68}}) [ 1416.179352][ T8873] 9pnet: Could not find request transport: xen 17:07:12 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x4}]}, 0x34, 0x0) 17:07:12 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0xd}]}, 0x34, 0x0) 17:07:12 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x2}]}, 0x34, 0x0) 17:07:12 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x6}]}, 0x34, 0x0) 17:07:12 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x2}]}, 0x34, 0x0) [ 1416.229839][ T8895] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:12 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x10}]}, 0x34, 0x0) 17:07:12 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0x6c}}) 17:07:12 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tra,s=xen,'}}]}}) 17:07:12 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x8}]}, 0x34, 0x0) [ 1416.287239][ T8896] 9pnet: Could not find request transport: xen 17:07:12 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x501f}]}, 0x34, 0x0) 17:07:12 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x2}]}, 0x34, 0x0) 17:07:12 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0xc}]}, 0x34, 0x0) 17:07:12 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x6600}]}, 0x34, 0x0) 17:07:12 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x2}]}, 0x34, 0x0) [ 1416.333154][ T8912] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:12 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0xd}]}, 0x34, 0x0) 17:07:12 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0x74}}) 17:07:12 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tran\n=xen,'}}]}}) [ 1416.380853][ T8917] 9pnet: Could not find request transport: xen [ 1416.420170][ T8931] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:12 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x2}]}, 0x34, 0x0) 17:07:12 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x24}]}, 0x34, 0x0) 17:07:12 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:12 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tran\"=xen,'}}]}}) 17:07:12 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0x7a}}) 17:07:12 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x2}]}, 0x34, 0x0) 17:07:12 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x2}]}, 0x34, 0x0) 17:07:12 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x281}]}, 0x34, 0x0) [ 1416.462395][ T8933] 9pnet: Could not find request transport: xen 17:07:12 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:12 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x4}]}, 0x34, 0x0) 17:07:12 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x600}]}, 0x34, 0x0) 17:07:12 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tran#=xen,'}}]}}) 17:07:12 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:12 executing program 0: socket$inet_sctp(0x2, 0x5, 0x84) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000780)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5d8, 0xf8, 0x0, 0xf8, 0x330, 0x218, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000000), {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @private0, [0xff, 0xffffffff, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffff00], 'bridge_slave_0\x00', 'team_slave_0\x00', {}, {0xff}, 0x3b, 0x0, 0x2, 0x52}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x9}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0xfffffffc, 0x9}}}, {{@uncond, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@ah={{0x30}, {[0x4d6, 0x4d5], 0x6, 0x81, 0x3}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@remote, @ipv6=@remote, 0x3c, 0x13, 0x3}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x4}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@private0={0xfc, 0x0, '\x00', 0x1}, @ipv4=@multicast2, 0x35, 0x15, 0x4}}}, {{@uncond, 0x0, 0xd0, 0x108, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x7}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x3, 0x6, 0x4}, {0x2, 0x5, 0x2}, {0x1, 0x4}, 0x8001, 0x10001}}}, {{@ipv6={@private1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xffffff00, 0xffffffff, 0xff], [0xffffff00, 0xff000000, 0xffffff00, 0xff], 'sit0\x00', 'macvtap0\x00', {}, {}, 0x3c, 0x4, 0x3, 0x10}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x638) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:12 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x6}]}, 0x34, 0x0) 17:07:12 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0xc00}]}, 0x34, 0x0) [ 1416.513654][ T8951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1416.534703][ T8949] 9pnet: Could not find request transport: xen 17:07:12 executing program 0: socket$inet_sctp(0x2, 0x5, 0x84) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) (async) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000780)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5d8, 0xf8, 0x0, 0xf8, 0x330, 0x218, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000000), {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @private0, [0xff, 0xffffffff, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffff00], 'bridge_slave_0\x00', 'team_slave_0\x00', {}, {0xff}, 0x3b, 0x0, 0x2, 0x52}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x9}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0xfffffffc, 0x9}}}, {{@uncond, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@ah={{0x30}, {[0x4d6, 0x4d5], 0x6, 0x81, 0x3}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@remote, @ipv6=@remote, 0x3c, 0x13, 0x3}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x4}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@private0={0xfc, 0x0, '\x00', 0x1}, @ipv4=@multicast2, 0x35, 0x15, 0x4}}}, {{@uncond, 0x0, 0xd0, 0x108, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x7}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x3, 0x6, 0x4}, {0x2, 0x5, 0x2}, {0x1, 0x4}, 0x8001, 0x10001}}}, {{@ipv6={@private1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xffffff00, 0xffffffff, 0xff], [0xffffff00, 0xff000000, 0xffffff00, 0xff], 'sit0\x00', 'macvtap0\x00', {}, {}, 0x3c, 0x4, 0x3, 0x10}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x638) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:12 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x8}]}, 0x34, 0x0) [ 1416.596215][ T8964] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1416.608636][ T8959] 9pnet: Could not find request transport: xen 17:07:12 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tran%=xen,'}}]}}) 17:07:12 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:12 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{0x2}]}, 0x2c, 0x0) [ 1416.652214][ T8974] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:12 executing program 0: socket$inet_sctp(0x2, 0x5, 0x84) (async) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) (async) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000780)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5d8, 0xf8, 0x0, 0xf8, 0x330, 0x218, 0x508, 0x508, 0x508, 0x508, 0x508, 0x6, &(0x7f0000000000), {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @broadcast}, @private0, [0xff, 0xffffffff, 0x0, 0xffffffff], [0x0, 0xffffffff, 0xffffff00], 'bridge_slave_0\x00', 'team_slave_0\x00', {}, {0xff}, 0x3b, 0x0, 0x2, 0x52}, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x9}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0xfffffffc, 0x9}}}, {{@uncond, 0x0, 0xd8, 0x120, 0x0, {}, [@common=@ah={{0x30}, {[0x4d6, 0x4d5], 0x6, 0x81, 0x3}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@remote, @ipv6=@remote, 0x3c, 0x13, 0x3}}}, {{@uncond, 0x0, 0xd0, 0x118, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x4}}]}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv6=@private0={0xfc, 0x0, '\x00', 0x1}, @ipv4=@multicast2, 0x35, 0x15, 0x4}}}, {{@uncond, 0x0, 0xd0, 0x108, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x7}}]}, @common=@inet=@SET3={0x38, 'SET\x00', 0x3, {{0x3, 0x6, 0x4}, {0x2, 0x5, 0x2}, {0x1, 0x4}, 0x8001, 0x10001}}}, {{@ipv6={@private1, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xffffff00, 0xffffffff, 0xff], [0xffffff00, 0xff000000, 0xffffff00, 0xff], 'sit0\x00', 'macvtap0\x00', {}, {}, 0x3c, 0x4, 0x3, 0x10}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x638) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:12 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0xd00}]}, 0x34, 0x0) 17:07:12 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0), 0x24, 0x0) 17:07:12 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0xc}]}, 0x34, 0x0) 17:07:12 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x1394}]}, 0x34, 0x0) 17:07:12 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tran*=xen,'}}]}}) 17:07:12 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x2000}]}, 0x34, 0x0) 17:07:12 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0xd}]}, 0x34, 0x0) 17:07:12 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x44004, 0x0) syz_io_uring_setup(0x5fb9, &(0x7f0000000340), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f00000003c0)=0x0, &(0x7f0000000400)) syz_io_uring_submit(r0, 0x0, &(0x7f0000000780)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0xe4da) syz_io_uring_submit(r0, 0x0, &(0x7f0000000380)=@IORING_OP_WRITEV={0x2, 0x5, 0x2000, @fd_index=0x3, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)="614bb37767cb7326cfb40bab68e5d768a144717da0ac5514db6a6ae3bf8eb36e7d514ab26aaaf03e2b09c6855c36a07a8dc197f7135a07cea2a3c46fd78281f80ae607cc4ca8add2dadd7660fcce93e97826de784b9f33d0cef7372ba17b1e75fbbda92b1e6f2a13e1bba4e358d326b973c8d076f28fb3f34eb4700836ee813f23a883157b59101672be1891a04eb3c379911add7dd0866c32e938d596d31503819fb17a1f11ad8a709d4305d2fdfc0f3996cee272d272d2cf", 0xb9}, {&(0x7f00000000c0)="53717b0f8942ce09685b0383dae4b645484337039a4389e6cbe71053cc2a479599d66a9f32de4c9a0d6580539795521c4ae6f07b9523cf1fb5f4365c1762cdb406a91fc3c5ebc55e0e498db3f349f062ab7ac3f0a7ab9882a02f603390cf38744118da24d82c1d4614dd6517bcabf67003965e62", 0x74}, {&(0x7f0000000140)="5574ac9cab0a48e7096e9b01d0ceeb8367ff2344debdc708d324efea93f68b38cbb1a8998c83443756eb545ef327a985b834deb3de3287bae19ce2784a226c593ef6e32d", 0x44}, {&(0x7f00000001c0)="ac561153c83053fe7fe95d041b53419885c8121effd72065bc769e2c797628a71724dd8dc66830a90a5f6fa3d7c2862d2c6b32baebdb058464ab16ecad24b8788ed59fa1050a5d713a3a47aa132e6a74127c2f16766027b3b66ffd5fe2e755a7298f893c8269227f2ff94ff3a6dc35f6d063bba3a6e3046dcfce499d55ad5c1ed45df4e3bf863df69d62d8e7607ddab9eaa620", 0x93}, {&(0x7f0000000280)="50efa3d5a366d80759b1477c9cdc6ea98e82cdc0bbc8fad335d1b6b13c88a6986973fa621af295383b2e47232cd5d5509529f43e9a150c89be96aff6aacc3d088f4aa82f522b579b2be3f8e77838a94cdeaa02a09624ce69418fef9f", 0x5c}, {&(0x7f0000000780)="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", 0x1000}, {&(0x7f0000001780)="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", 0x1000}], 0x7, 0x2, 0x1, {0x3}}, 0x3) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="7472616e733d78656e2c726f6f74636f6e746578743d73746166665f752c00ab3892a10797ce3eac7b0e263dcf217377bce7d09529ea1aa53e320a690ca124365e4a102094be420feb59cb7012a1a8bb1c848a08bd043740e229091af861386f60ec943ef06a84b63fce7d17d75ff6b80e371fd4244306bc1895688ba6cb300c8e557ee5155bc64b4b1f36963790df383beddc6bf50e4d477954212100a669"]) syz_mount_image$nfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x1, 0x6, &(0x7f0000002b40)=[{&(0x7f00000005c0)="44cfdd9ea40664069bb26e12e5fafe8d07cbdb71b73b34903d21efc55a5a8d3886b6053712de04fe2f4424b782551d5169db20001caa7264b1e9d7782c18b8ed4eeaeedee0c346739b039c034a1304f6c7734cb8bb46ab8d400b16c3d3cc2642eb1c53c991d3e7a60e3c325f25cc330e861207efad5d1c8fb3c14743ecf5bb5fc77eb10f802fc9dd05ec4ba1133fabb3ae8749a96f6e464fc9821d1e7ec728fd17065e8b1877b456fa3e0699e23d5355a561ee05cc67c74e8807cf4c92db04ca82d48c73677a", 0xc6, 0x7}, {&(0x7f0000002780)="86f297360934ffee25917d12a94a1e14cb11ead2c85bd584d443466e370b4804e26889da8cbe5e5972bf2471df419d7f8763cbc5041e41f0033617f9c0ea57ae24a0d3c7388dbccd55b9b203b5825375", 0x50, 0x6}, {&(0x7f0000002800)="3b30ca2fcd9079df37758ceafa165d8bed8d74f741fa5ea017da9b019670c2085a2fa8c7915306a752c2062811a317b35d70a8c6197bdaf617cc6c3e4782600b634066a3b37a5e698353124fa5b50c9f903be7d15f04dadc95f04f8e918881effeb707a789c460b948a8a30d70a658e443d8db0170a6f3e36f51ec26c1d5c419cae2e502379a184608996c672f22706a2d3dad1ba10b5f9a58254d3fae70d201a67523e4d213108d50c91be6f48cef84d4a0e98d3f14eb77d0d43d3166b4200c5fe4dd9fb5317e6f611a8729803b5401a0b4e0d19ced1d20a4ca", 0xda, 0xffffffffffffffe1}, {&(0x7f0000002900)="124d4b36abcccfdc20e6251fe85a2c664804839d50d2b621fc6f30344fb4037a26e27e5e4f236f72ff9269b2a5ba1b87a4dce72c93d325be321d30c08e80a6bb1b518dd2e4f52ce0c0fc9ba9431a7bd468b3a429bc9a884af8ef42bcb9c1774478888ec0f11659740a22f4184698d0a3c5a33fb8c3118c9806aaec1f7e953a161583bb5c32b341b969b2899d9a701bb991603d8dd20095f1f75e8538a78a4b77050daa3ef67447b4990d8d80607670260e4d5eec132fdb588482ec023e15e3bb58d36a84668b33d351b65f7f5ec204d6a51a56fc830c29e365a59b6fb49e7dee798bb6ffb77b87ebb8b05d907aa634a622d24ffc368a179f2fde", 0xfa, 0xffff}, {&(0x7f0000002a00)="005ef820d3159716ef5cb6873302e299de12af9751b1ac5a8d9914adad13cf6ad3244269ed2b306f1e59e03215247000922a600e413b5a67ee86e80189bfaf24eb0efb5dff4bf07b8a334da5179b5cee0c5a48c1f1e5de3e8bac79317595520a534e5c6e508385ab101173737bf9fadc030d94878630b1fc304811c79e343e83762e50fb87ae", 0x86, 0x3f}, {&(0x7f0000002ac0)="23d237cdb4d7292bbae3cd4238ad0c97088f50d829a7950f11e2a9505065f2e003c20a62b38e36fa19f1c1c61924a06cb7e140257e810d91227d3e25e642bf32b0ff75b619c55cd3a65d3766698e9b06d39fa42619998abd8adf478fa0ee956d6e2550a4a149c07dc9287260a96b403b195896", 0x73, 0xf3}], 0x120041, &(0x7f0000000740)={[{']-)$:'}, {'\x00'}, {'\x00'}, {'/'}, {'\x00'}, {'-\x8a\x90('}, {'$,'}, {'-'}, {}], [{@obj_role={'obj_role', 0x3d, ':/}'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000500)=0x5b) [ 1416.695365][ T8977] 9pnet: Could not find request transport: xen [ 1416.725828][ T8987] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:12 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0), 0x24, 0x0) 17:07:12 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x2400}]}, 0x34, 0x0) 17:07:12 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x24}]}, 0x34, 0x0) 17:07:12 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tran+=xen,'}}]}}) 17:07:12 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x44004, 0x0) (rerun: 64) syz_io_uring_setup(0x5fb9, &(0x7f0000000340), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f00000003c0)=0x0, &(0x7f0000000400)) syz_io_uring_submit(r0, 0x0, &(0x7f0000000780)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0xe4da) syz_io_uring_submit(r0, 0x0, &(0x7f0000000380)=@IORING_OP_WRITEV={0x2, 0x5, 0x2000, @fd_index=0x3, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)="614bb37767cb7326cfb40bab68e5d768a144717da0ac5514db6a6ae3bf8eb36e7d514ab26aaaf03e2b09c6855c36a07a8dc197f7135a07cea2a3c46fd78281f80ae607cc4ca8add2dadd7660fcce93e97826de784b9f33d0cef7372ba17b1e75fbbda92b1e6f2a13e1bba4e358d326b973c8d076f28fb3f34eb4700836ee813f23a883157b59101672be1891a04eb3c379911add7dd0866c32e938d596d31503819fb17a1f11ad8a709d4305d2fdfc0f3996cee272d272d2cf", 0xb9}, {&(0x7f00000000c0)="53717b0f8942ce09685b0383dae4b645484337039a4389e6cbe71053cc2a479599d66a9f32de4c9a0d6580539795521c4ae6f07b9523cf1fb5f4365c1762cdb406a91fc3c5ebc55e0e498db3f349f062ab7ac3f0a7ab9882a02f603390cf38744118da24d82c1d4614dd6517bcabf67003965e62", 0x74}, {&(0x7f0000000140)="5574ac9cab0a48e7096e9b01d0ceeb8367ff2344debdc708d324efea93f68b38cbb1a8998c83443756eb545ef327a985b834deb3de3287bae19ce2784a226c593ef6e32d", 0x44}, {&(0x7f00000001c0)="ac561153c83053fe7fe95d041b53419885c8121effd72065bc769e2c797628a71724dd8dc66830a90a5f6fa3d7c2862d2c6b32baebdb058464ab16ecad24b8788ed59fa1050a5d713a3a47aa132e6a74127c2f16766027b3b66ffd5fe2e755a7298f893c8269227f2ff94ff3a6dc35f6d063bba3a6e3046dcfce499d55ad5c1ed45df4e3bf863df69d62d8e7607ddab9eaa620", 0x93}, {&(0x7f0000000280)="50efa3d5a366d80759b1477c9cdc6ea98e82cdc0bbc8fad335d1b6b13c88a6986973fa621af295383b2e47232cd5d5509529f43e9a150c89be96aff6aacc3d088f4aa82f522b579b2be3f8e77838a94cdeaa02a09624ce69418fef9f", 0x5c}, {&(0x7f0000000780)="0038992625648af38f499d6b7a6f5051f59b6c1ec3e8e72258088b18098cb2cd55f2ebf5924365d3bef706085c4b94170abd2831091f4bfe53539f0713f371763f8f0f2156ffa374a6b9be59cde75130e699afb0821b40008fdf5c5be7a8c55b79d22ee72cc9fb9d62e3da7d496bb0569909abc832c90d7555a66e38cadd3c00fbfa3d5dadcad660d9c66ecc6636d0a72883b5e7efe0f727c64ba024a75af0f2f81c0bd90f344bba2f1e132e3d189c86b99f1ef90c30a7eab2ec10f790c0d3e009ec186899a7cb1cc6fd7d664f87a728d976b60d08c79a452dcd8d4a920a1d516a736549aa33d17123ec8c4bb6a0c99002f354a9b679e0de4ae41c45a3623c2951f7772da3cff7585f397a0330b816e7952d55df3b02caa2af3a3f0e6e10ceb2c8dfe0c2927085922ca1ef9487a58e829c417552f5b687439185ffd92d4c35270e96f5f4e3b1b8d882978af5f36752659ee815c75635b382a72d74a0f5b05f9b5253f3eda766493fc4228cb36d3a71f6ae7752174431e44edffb68a390686b8876ffc622675f42839efdbd931557a4a530a5059dcd51a198e707f2dafe2122acacade861fedc8d1bdf3eda76c34960fa5069564620b9487a24a431905d548efdae6c568ef66b128e4059169f80cd433d02881c12b88c4ea852bdcde022f32e8b2c46468557a51c48a24ba2ea3e75c9a38e6010c72291944f4cddd6326c2dcf26e0f297294c1d51e738fb2c99e17fd0e5b8d3c538e86ccacb8d31f02b3fb95eaf510928b7f92e9802dddd82633a44e51e48f1d31f5da77c0f50c351e53f54e29611e7e9a5a4210d236f747de75265f58106b998958b0880221a11872a31b624529d370e3a2ce12842cb4599ee0f45015537bf71b6d68e88a2474f3b953f1f08c6e8996de55aa905a245e503c4ee247f76459f30cf41b35e96d63d04d08687cee33540c75c9c70c64752a660bfc2505109465b5d6b7d3fdc1cfb3c9ac11f88a4d9cd7e50830f1b57aa5dff227bfc0daa28065935885704e16734ae91e17dbdcd3f3840e5cadc8fed286ec08a3417f39b570ee22e35654fcde293437049452f68c1bf9a3a20fc6d4bc46d600b144b09b388c5feeca35af30803d448f2bd5ab460dad2d03c5edfb48890c80a9840b3e7e137250717307f9474c5d06a28146d57954f92ae3a7d522f199ffbdc0f078508e4e48a6690a01e85ff57078cb921498f8f46797de63c658260e05b9414b8e2489eba80f3164a3df683d87c0a5307feddf8c934178204265b21b54436e4c23acda1a4085deb639be2ed962845bf3111244c8e0c3b931481fa8be02e6132f838d8ec6ccb4a071e924ff26d75c646557022eba45c394905d1c67ea13e87ef07fc907e5351209695b5f36936a6c5a2b2e367952127cc7b9ce899877f64f241a7382163fee53dddb31c7e28d42f619b895639a04705f7442c11f36aac216db93392a52ab92b16e05ad944e870689ff06869da0661f41b8ce20f6c82485ceae8738a9ef26262efe2f4ea2e5dda4e96ebba33e2720e7e6c8c6ed69bdc16117255668a36fb23b0a3765c0fe77e667dd20f7b34542fc4d72190ddbd6f6c385334259ba01a74471a3eb5cfa8304ded114bc0547241f7efc3a8ab1078d5f960b6fe6d8e4be4fc40ba0836e0aca36a7179951c23161c64b38bf1039084a8065d0aa62c129706a65347a5d11e1c021ca5f1b58b64af5d2b89a3da8434ffba92beb20fb4569b71782263cef01f935a69c5f07a1c2f27045766edbe05f13fba96af1ca98a91d763dddbc1589cbc4f462f5ebd69c3c82e0704983eac9a7923e2c67a7b8f205dd9a742e6a36362c16bee1065e9bc2fd9bc377ff8387c9aef7630ef456f8b1aed7614020cba2aa4e4e6f0d4b7f6eecb653057dd2aa348babf84d856cc9ad8cb02aecf3981f0aca2f2bda37e6f5a81bb9b96f2f8bbbeeac372ca5babecc688e75b85e8ddf5c3c3c5ead1c673418146f1805000f44718569c958430c016f8aa8c733b53791df7dad82aa4ec9bc9cbde13dbe6e0348eeef586890fc542664e889ca12cfa01ee191c92211584000ee9c4c776a1264d1fd12ee137a17ce3783a066e6eac4d17ab7dba24c12a83930fc80616b333933aad3ae6d2177ab40fadfcd53c57fdc9a95fc4d922a0d32d51bef4dbda9bb524f1ea17546d1eb6da265dc0f062fba11a74d0e246cb2cc916503c41c1e5907fc54b9f20ec683488e98f4fecd9c32b693a8ad018ce124fe3e066950b123dfd540c362ad935c68c7d6e7039a9389504869355c26880fbd63dacad862d3662223b4e163e7835d8b3e52850a0dd14b54e41c0ac23d29e459db6b2cb148bb7f150358b49d21150a6d457530ed02b69b97b1e42635736fb4b87c4e10a0fade365c056ad62f7898349aec68103ac3c21459d11e104e432645195708d2bc0385e04d1f65bbfd810aaf9509182bc53420f5f6890156e675e87fd8967ee6af5c4fa5ae0b0a43dda5428ca9d9724e4490e3694629830d3f5b570c67ebae526894218f95273627d3551c769a648d98a5c6520ed72a25c77398fe8728921d38018134b541158cca417aa667acbe75cd4034bf6178002f8e8af6d100bfb8ef2af80c90909eb30c0a1788f1dbf510a7a8f823e96a3156132e8f78376f215d3adcd2da36c00c30c8b2c936f02fa1fb9042728154e933bc97e34baa1dbf743a2f58d395c0ced7186c0b8e4a06c8ebbcda5f83b9fa6a46864389704fcb5358dc52b0b05bef7ceead2fb6c06a0f0bbcf5f1bada5e879e5138f8f2e53a42b76075144f05e2ef8bcdb90099cc3cff6d71bf11c7af2491fb989b9d450839cd594ca1605c33d99338faf68855d86bdfa1c81ba2805629f506e953429c134b42c526f8a32eeaf2821117a43ccbfc2ea3bfad544fd4b7511dfba254d74509752e3e97f2a48e873202c978e98ef7b4867711f1306044cbb1e81ba015f6f7821d2cf28a54e7a6b9d0961a94b133ca522953f2786b09e9fac55056006b4da206651b1bd937e5b39845e19315939531dff4bf094a9f0f90b8d1d0568a2de805c0ed93a2ec435094068e9fade1300151e55a7090f802d31447a13203857ac1191d0b3b2bc729c343a034ddda4f9759b627139c342b2fc3565b43e53fb557e27bed4879bc7f87c0ca1dadb4a9b2161a5cea7887cdf5b2fa1e5ce72e346fd9b3c2d6f6115938dcebd3106a93a70ee1403a661d443a9eb1e25d5eea753aeadf1ccdd93820882e163c437b3450410c44396214ab7fddb18f08dde2ad06dbe235b47b1f1273cd16a6370bd84d316b1b0810d4d61414b337b01e79c2a82809427a40757dacf64fb860270f910b678626aa59c4acd499d6dbfc932c479d39dc3417ce7325a925bbee16bd727e2c54e58d4693210712eba57066d08b79ea54b8bd4b6b08cade7be7ab57d71121ed87217c16f82980675530516200a0c8b5f017be00be8c58b65b2059e72ddb10e841c0b69184d8920ed7203c7ec2cb77999f1f2052c5d92e6e72cd81660c96308213f1707e1aabb2dd681bb80fda435b6286f8564a096606f827fc08151bddb41da6055cdbd5421cddbf0d16033c7f8d1ac4ea3d526ac07a31709d16e17292a93e6753e81a85ed37d843dd8e2fc106a1f2c2b179f5471e9c5762d042d5de1eb0d228d494f2cf80a81e7fe57c287dd6206a48c9f6a84d290ea37d5164a80c524355d1130fdad018d14d5ece6b5af08d29861240e969366d0fff99b0cf7f2b7e2ec9ae518070e3baa1c968c3102deb74c39c17f74a548b9c962551739824e557cd8cb3cda24c331f9f31e07d180b9c92c30a093737631e8a46ad69df854908ba716ed084c8f1db00a5acb8d39b63c11890713e423c04438b3dad2ab05822225b01593cb4b2c59495cddd77bd5c9106b56810e8ae1f6873db994680546f18a3d0d1eb10782867abeeb077991ffeeb39638ee6113b701de4f24d47f98626d956dcb46ae51471870891d40665abccda47cde69e7e1cbbda867325a194c3654ef9deb466ac74c794522187242568934cf42af5ef1698ae58b5a686c967b8c2680b8e30c41147bb46d2b34652de1c0356f55b4cb890cbf22ca8a95101d57cd497ae6bb179c72e9512db5b188fcd5b4fd84d0e2b35a5908744ec02dd25868f794729c3b1f4f722ff5b2961b0aae89933b69eb7fff595f647f2b1b0cc958198ed4f0b3dae2a802fd19137bb5ed07435dc28754047bb4b14ac977500b9db6896ea58d64f34e566bb98cf254aae29529b1738adac356611f9f01dde5f6449b5131523a22892ff3264b50781f442ee86e1b66fb97c86c202de88e6e3f4a51ba7f3072cb65a4bc0b6d7dd04f676f1247835f4e994de76438a1577476026f056d3f701c96088500a8fee9ac68639509dcd4cc33f8245414b5ef2ced0fa6929bf202d7dbf1ab838abe46364839ad27435d67dbbfed7889905be5eaa16174ce4c6eff4fd85f9ae99a41c78d68809d071a4ef539ca5ae406e742b4123dc3177a27b6010311de70de0440a4a8356c594115d0b02b7f72d5a2dfacefddb4c8438052dfc5d314008e21dd11895d1180b92fe1b53fce3ddcc24b3b07b699917fe37aaf89143b4f7a6a419f61ccb85904216ca22ae88b4d5cd99db5ceca110146bbb700facfac00c807b38e933c446333d6d9154b6dd1eb1b67522ac2679d7c381d8a1bcce1c3acf2a3adb5756dbc063f799a15def3356d83556cb8a12e2ec108034241bd4d0582744a637a3083cdb0bdd3e0468142088187ec89948a89f571ea21f8fd0e22c657700643061c3876a6abfbad0c2df1f18b722999e59e764715975e81a7dcbfd5712db8bf38e2a3fe5a2b7fb535a62accf4543d03d07b0d8536cfb2f82166844a2967462a71af8f2d5760dc89bc7d4036d2538ecfcf6ecb89348fd4c6d7905dd7ab3856e1e4f428a44adffca8ae33a0fa4369b45aaae9d0ac279c16ca4d388389492498dae8adf007c746316c77843d12bf205c1d9cf86a40071932f4c50a227cfee998f9ed28fdc0c39861c665898d0a15eb48060ceef7bb6f7f3f9f322fda42c29ef549fa2dbf80b0f8ed0a925e29a34a00f61f6166bf3634564a17509e4d99c2d177a4c2245aba2016b3e5d76b6ec0905c37a1c49ad084aa95b4187c98b29543a3111b7cbad6da6e912e4fe06b2a89c2ee3972633305c7e5e6f54d678b5d64bcf017e5a4521b46977d0770c82a3b0e6ebe141df7d93917745d9b842274174762fcda3eaccf65baed9964bbd5f532b8434dbc5be061db7c3dfef2777bbf551b277ed6188d15a413c2e1b718243f6c1cc523c1e73cc9deca05bfae4816ad837859dd534e9b7277382cc5a3301842724de42d2b7f1d9cbf2ecadec1592279874ef030ff605e40a09fad615a47c57635a1efd38c78a6dc05b1880719b4a52b5da10ba30c2517964c093c29ae205571fe171f85ea3150b1c7500094729c94a699791db54296802e1e193b56c3ec42392a9af69c6f2d728c355c01dcceb3dfa7176f88970fc63401de34b8816fc964e9699eb0aaf53bdde35752128b1b491bc12fd67b659cefe7d0f00b065f800b2b5bc1cae8125ccf87d380dd4f9abf482d1530bd83b9218f4e7aa7e9d4483de106657c98ce4f856ec835c4d6a40e9262caf7bc8a294990c27719d7822839abffa46db0e08e5118bcb6045dbaab21625ef4e314dd497de2fac9dfc739f58475e3ef417a77cd97e123caa9f7ad08dfbec5969d8d9cb42b589c2eadca178ea7677ed762af5aa17fffcecf29c9d42f822732d8224de0d945b4706dce80509185afc7e7", 0x1000}, {&(0x7f0000001780)="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", 0x1000}], 0x7, 0x2, 0x1, {0x3}}, 0x3) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="7472616e733d78656e2c726f6f74636f6e746578743d73746166665f752c00ab3892a10797ce3eac7b0e263dcf217377bce7d09529ea1aa53e320a690ca124365e4a102094be420feb59cb7012a1a8bb1c848a08bd043740e229091af861386f60ec943ef06a84b63fce7d17d75ff6b80e371fd4244306bc1895688ba6cb300c8e557ee5155bc64b4b1f36963790df383beddc6bf50e4d477954212100a669"]) (async) syz_mount_image$nfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x1, 0x6, &(0x7f0000002b40)=[{&(0x7f00000005c0)="44cfdd9ea40664069bb26e12e5fafe8d07cbdb71b73b34903d21efc55a5a8d3886b6053712de04fe2f4424b782551d5169db20001caa7264b1e9d7782c18b8ed4eeaeedee0c346739b039c034a1304f6c7734cb8bb46ab8d400b16c3d3cc2642eb1c53c991d3e7a60e3c325f25cc330e861207efad5d1c8fb3c14743ecf5bb5fc77eb10f802fc9dd05ec4ba1133fabb3ae8749a96f6e464fc9821d1e7ec728fd17065e8b1877b456fa3e0699e23d5355a561ee05cc67c74e8807cf4c92db04ca82d48c73677a", 0xc6, 0x7}, {&(0x7f0000002780)="86f297360934ffee25917d12a94a1e14cb11ead2c85bd584d443466e370b4804e26889da8cbe5e5972bf2471df419d7f8763cbc5041e41f0033617f9c0ea57ae24a0d3c7388dbccd55b9b203b5825375", 0x50, 0x6}, {&(0x7f0000002800)="3b30ca2fcd9079df37758ceafa165d8bed8d74f741fa5ea017da9b019670c2085a2fa8c7915306a752c2062811a317b35d70a8c6197bdaf617cc6c3e4782600b634066a3b37a5e698353124fa5b50c9f903be7d15f04dadc95f04f8e918881effeb707a789c460b948a8a30d70a658e443d8db0170a6f3e36f51ec26c1d5c419cae2e502379a184608996c672f22706a2d3dad1ba10b5f9a58254d3fae70d201a67523e4d213108d50c91be6f48cef84d4a0e98d3f14eb77d0d43d3166b4200c5fe4dd9fb5317e6f611a8729803b5401a0b4e0d19ced1d20a4ca", 0xda, 0xffffffffffffffe1}, {&(0x7f0000002900)="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", 0xfa, 0xffff}, {&(0x7f0000002a00)="005ef820d3159716ef5cb6873302e299de12af9751b1ac5a8d9914adad13cf6ad3244269ed2b306f1e59e03215247000922a600e413b5a67ee86e80189bfaf24eb0efb5dff4bf07b8a334da5179b5cee0c5a48c1f1e5de3e8bac79317595520a534e5c6e508385ab101173737bf9fadc030d94878630b1fc304811c79e343e83762e50fb87ae", 0x86, 0x3f}, {&(0x7f0000002ac0)="23d237cdb4d7292bbae3cd4238ad0c97088f50d829a7950f11e2a9505065f2e003c20a62b38e36fa19f1c1c61924a06cb7e140257e810d91227d3e25e642bf32b0ff75b619c55cd3a65d3766698e9b06d39fa42619998abd8adf478fa0ee956d6e2550a4a149c07dc9287260a96b403b195896", 0x73, 0xf3}], 0x120041, &(0x7f0000000740)={[{']-)$:'}, {'\x00'}, {'\x00'}, {'/'}, {'\x00'}, {'-\x8a\x90('}, {'$,'}, {'-'}, {}], [{@obj_role={'obj_role', 0x3d, ':/}'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) (async) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000500)=0x5b) 17:07:12 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0), 0x24, 0x0) 17:07:12 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x281}]}, 0x34, 0x0) [ 1416.782664][ T8996] 9pnet: Could not find request transport: xen 17:07:12 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x3f00}]}, 0x34, 0x0) 17:07:12 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x4000}]}, 0x34, 0x0) 17:07:12 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x600}]}, 0x34, 0x0) [ 1416.858314][ T9014] 9pnet: Could not find request transport: xen 17:07:12 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tran,=xen,'}}]}}) 17:07:12 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x44004, 0x0) syz_io_uring_setup(0x5fb9, &(0x7f0000000340), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f00000003c0)=0x0, &(0x7f0000000400)) syz_io_uring_submit(r0, 0x0, &(0x7f0000000780)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0xe4da) syz_io_uring_submit(r0, 0x0, &(0x7f0000000380)=@IORING_OP_WRITEV={0x2, 0x5, 0x2000, @fd_index=0x3, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)="614bb37767cb7326cfb40bab68e5d768a144717da0ac5514db6a6ae3bf8eb36e7d514ab26aaaf03e2b09c6855c36a07a8dc197f7135a07cea2a3c46fd78281f80ae607cc4ca8add2dadd7660fcce93e97826de784b9f33d0cef7372ba17b1e75fbbda92b1e6f2a13e1bba4e358d326b973c8d076f28fb3f34eb4700836ee813f23a883157b59101672be1891a04eb3c379911add7dd0866c32e938d596d31503819fb17a1f11ad8a709d4305d2fdfc0f3996cee272d272d2cf", 0xb9}, {&(0x7f00000000c0)="53717b0f8942ce09685b0383dae4b645484337039a4389e6cbe71053cc2a479599d66a9f32de4c9a0d6580539795521c4ae6f07b9523cf1fb5f4365c1762cdb406a91fc3c5ebc55e0e498db3f349f062ab7ac3f0a7ab9882a02f603390cf38744118da24d82c1d4614dd6517bcabf67003965e62", 0x74}, {&(0x7f0000000140)="5574ac9cab0a48e7096e9b01d0ceeb8367ff2344debdc708d324efea93f68b38cbb1a8998c83443756eb545ef327a985b834deb3de3287bae19ce2784a226c593ef6e32d", 0x44}, {&(0x7f00000001c0)="ac561153c83053fe7fe95d041b53419885c8121effd72065bc769e2c797628a71724dd8dc66830a90a5f6fa3d7c2862d2c6b32baebdb058464ab16ecad24b8788ed59fa1050a5d713a3a47aa132e6a74127c2f16766027b3b66ffd5fe2e755a7298f893c8269227f2ff94ff3a6dc35f6d063bba3a6e3046dcfce499d55ad5c1ed45df4e3bf863df69d62d8e7607ddab9eaa620", 0x93}, {&(0x7f0000000280)="50efa3d5a366d80759b1477c9cdc6ea98e82cdc0bbc8fad335d1b6b13c88a6986973fa621af295383b2e47232cd5d5509529f43e9a150c89be96aff6aacc3d088f4aa82f522b579b2be3f8e77838a94cdeaa02a09624ce69418fef9f", 0x5c}, {&(0x7f0000000780)="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", 0x1000}, {&(0x7f0000001780)="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", 0x1000}], 0x7, 0x2, 0x1, {0x3}}, 0x3) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="7472616e733d78656e2c726f6f74636f6e746578743d73746166665f752c00ab3892a10797ce3eac7b0e263dcf217377bce7d09529ea1aa53e320a690ca124365e4a102094be420feb59cb7012a1a8bb1c848a08bd043740e229091af861386f60ec943ef06a84b63fce7d17d75ff6b80e371fd4244306bc1895688ba6cb300c8e557ee5155bc64b4b1f36963790df383beddc6bf50e4d477954212100a669"]) syz_mount_image$nfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x1, 0x6, &(0x7f0000002b40)=[{&(0x7f00000005c0)="44cfdd9ea40664069bb26e12e5fafe8d07cbdb71b73b34903d21efc55a5a8d3886b6053712de04fe2f4424b782551d5169db20001caa7264b1e9d7782c18b8ed4eeaeedee0c346739b039c034a1304f6c7734cb8bb46ab8d400b16c3d3cc2642eb1c53c991d3e7a60e3c325f25cc330e861207efad5d1c8fb3c14743ecf5bb5fc77eb10f802fc9dd05ec4ba1133fabb3ae8749a96f6e464fc9821d1e7ec728fd17065e8b1877b456fa3e0699e23d5355a561ee05cc67c74e8807cf4c92db04ca82d48c73677a", 0xc6, 0x7}, {&(0x7f0000002780)="86f297360934ffee25917d12a94a1e14cb11ead2c85bd584d443466e370b4804e26889da8cbe5e5972bf2471df419d7f8763cbc5041e41f0033617f9c0ea57ae24a0d3c7388dbccd55b9b203b5825375", 0x50, 0x6}, {&(0x7f0000002800)="3b30ca2fcd9079df37758ceafa165d8bed8d74f741fa5ea017da9b019670c2085a2fa8c7915306a752c2062811a317b35d70a8c6197bdaf617cc6c3e4782600b634066a3b37a5e698353124fa5b50c9f903be7d15f04dadc95f04f8e918881effeb707a789c460b948a8a30d70a658e443d8db0170a6f3e36f51ec26c1d5c419cae2e502379a184608996c672f22706a2d3dad1ba10b5f9a58254d3fae70d201a67523e4d213108d50c91be6f48cef84d4a0e98d3f14eb77d0d43d3166b4200c5fe4dd9fb5317e6f611a8729803b5401a0b4e0d19ced1d20a4ca", 0xda, 0xffffffffffffffe1}, {&(0x7f0000002900)="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", 0xfa, 0xffff}, {&(0x7f0000002a00)="005ef820d3159716ef5cb6873302e299de12af9751b1ac5a8d9914adad13cf6ad3244269ed2b306f1e59e03215247000922a600e413b5a67ee86e80189bfaf24eb0efb5dff4bf07b8a334da5179b5cee0c5a48c1f1e5de3e8bac79317595520a534e5c6e508385ab101173737bf9fadc030d94878630b1fc304811c79e343e83762e50fb87ae", 0x86, 0x3f}, {&(0x7f0000002ac0)="23d237cdb4d7292bbae3cd4238ad0c97088f50d829a7950f11e2a9505065f2e003c20a62b38e36fa19f1c1c61924a06cb7e140257e810d91227d3e25e642bf32b0ff75b619c55cd3a65d3766698e9b06d39fa42619998abd8adf478fa0ee956d6e2550a4a149c07dc9287260a96b403b195896", 0x73, 0xf3}], 0x120041, &(0x7f0000000740)={[{']-)$:'}, {'\x00'}, {'\x00'}, {'/'}, {'\x00'}, {'-\x8a\x90('}, {'$,'}, {'-'}, {}], [{@obj_role={'obj_role', 0x3d, ':/}'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000500)=0x5b) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$autofs(0xffffffffffffff9c, &(0x7f0000000140), 0x44004, 0x0) (async) syz_io_uring_setup(0x5fb9, &(0x7f0000000340), &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f00000003c0), &(0x7f0000000400)) (async) syz_io_uring_submit(r0, 0x0, &(0x7f0000000780)=@IORING_OP_STATX={0x15, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0}, 0xe4da) (async) syz_io_uring_submit(r0, 0x0, &(0x7f0000000380)=@IORING_OP_WRITEV={0x2, 0x5, 0x2000, @fd_index=0x3, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)="614bb37767cb7326cfb40bab68e5d768a144717da0ac5514db6a6ae3bf8eb36e7d514ab26aaaf03e2b09c6855c36a07a8dc197f7135a07cea2a3c46fd78281f80ae607cc4ca8add2dadd7660fcce93e97826de784b9f33d0cef7372ba17b1e75fbbda92b1e6f2a13e1bba4e358d326b973c8d076f28fb3f34eb4700836ee813f23a883157b59101672be1891a04eb3c379911add7dd0866c32e938d596d31503819fb17a1f11ad8a709d4305d2fdfc0f3996cee272d272d2cf", 0xb9}, {&(0x7f00000000c0)="53717b0f8942ce09685b0383dae4b645484337039a4389e6cbe71053cc2a479599d66a9f32de4c9a0d6580539795521c4ae6f07b9523cf1fb5f4365c1762cdb406a91fc3c5ebc55e0e498db3f349f062ab7ac3f0a7ab9882a02f603390cf38744118da24d82c1d4614dd6517bcabf67003965e62", 0x74}, {&(0x7f0000000140)="5574ac9cab0a48e7096e9b01d0ceeb8367ff2344debdc708d324efea93f68b38cbb1a8998c83443756eb545ef327a985b834deb3de3287bae19ce2784a226c593ef6e32d", 0x44}, {&(0x7f00000001c0)="ac561153c83053fe7fe95d041b53419885c8121effd72065bc769e2c797628a71724dd8dc66830a90a5f6fa3d7c2862d2c6b32baebdb058464ab16ecad24b8788ed59fa1050a5d713a3a47aa132e6a74127c2f16766027b3b66ffd5fe2e755a7298f893c8269227f2ff94ff3a6dc35f6d063bba3a6e3046dcfce499d55ad5c1ed45df4e3bf863df69d62d8e7607ddab9eaa620", 0x93}, {&(0x7f0000000280)="50efa3d5a366d80759b1477c9cdc6ea98e82cdc0bbc8fad335d1b6b13c88a6986973fa621af295383b2e47232cd5d5509529f43e9a150c89be96aff6aacc3d088f4aa82f522b579b2be3f8e77838a94cdeaa02a09624ce69418fef9f", 0x5c}, {&(0x7f0000000780)="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", 0x1000}, {&(0x7f0000001780)="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", 0x1000}], 0x7, 0x2, 0x1, {0x3}}, 0x3) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="7472616e733d78656e2c726f6f74636f6e746578743d73746166665f752c00ab3892a10797ce3eac7b0e263dcf217377bce7d09529ea1aa53e320a690ca124365e4a102094be420feb59cb7012a1a8bb1c848a08bd043740e229091af861386f60ec943ef06a84b63fce7d17d75ff6b80e371fd4244306bc1895688ba6cb300c8e557ee5155bc64b4b1f36963790df383beddc6bf50e4d477954212100a669"]) (async) syz_mount_image$nfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x1, 0x6, &(0x7f0000002b40)=[{&(0x7f00000005c0)="44cfdd9ea40664069bb26e12e5fafe8d07cbdb71b73b34903d21efc55a5a8d3886b6053712de04fe2f4424b782551d5169db20001caa7264b1e9d7782c18b8ed4eeaeedee0c346739b039c034a1304f6c7734cb8bb46ab8d400b16c3d3cc2642eb1c53c991d3e7a60e3c325f25cc330e861207efad5d1c8fb3c14743ecf5bb5fc77eb10f802fc9dd05ec4ba1133fabb3ae8749a96f6e464fc9821d1e7ec728fd17065e8b1877b456fa3e0699e23d5355a561ee05cc67c74e8807cf4c92db04ca82d48c73677a", 0xc6, 0x7}, {&(0x7f0000002780)="86f297360934ffee25917d12a94a1e14cb11ead2c85bd584d443466e370b4804e26889da8cbe5e5972bf2471df419d7f8763cbc5041e41f0033617f9c0ea57ae24a0d3c7388dbccd55b9b203b5825375", 0x50, 0x6}, {&(0x7f0000002800)="3b30ca2fcd9079df37758ceafa165d8bed8d74f741fa5ea017da9b019670c2085a2fa8c7915306a752c2062811a317b35d70a8c6197bdaf617cc6c3e4782600b634066a3b37a5e698353124fa5b50c9f903be7d15f04dadc95f04f8e918881effeb707a789c460b948a8a30d70a658e443d8db0170a6f3e36f51ec26c1d5c419cae2e502379a184608996c672f22706a2d3dad1ba10b5f9a58254d3fae70d201a67523e4d213108d50c91be6f48cef84d4a0e98d3f14eb77d0d43d3166b4200c5fe4dd9fb5317e6f611a8729803b5401a0b4e0d19ced1d20a4ca", 0xda, 0xffffffffffffffe1}, {&(0x7f0000002900)="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", 0xfa, 0xffff}, {&(0x7f0000002a00)="005ef820d3159716ef5cb6873302e299de12af9751b1ac5a8d9914adad13cf6ad3244269ed2b306f1e59e03215247000922a600e413b5a67ee86e80189bfaf24eb0efb5dff4bf07b8a334da5179b5cee0c5a48c1f1e5de3e8bac79317595520a534e5c6e508385ab101173737bf9fadc030d94878630b1fc304811c79e343e83762e50fb87ae", 0x86, 0x3f}, {&(0x7f0000002ac0)="23d237cdb4d7292bbae3cd4238ad0c97088f50d829a7950f11e2a9505065f2e003c20a62b38e36fa19f1c1c61924a06cb7e140257e810d91227d3e25e642bf32b0ff75b619c55cd3a65d3766698e9b06d39fa42619998abd8adf478fa0ee956d6e2550a4a149c07dc9287260a96b403b195896", 0x73, 0xf3}], 0x120041, &(0x7f0000000740)={[{']-)$:'}, {'\x00'}, {'\x00'}, {'/'}, {'\x00'}, {'-\x8a\x90('}, {'$,'}, {'-'}, {}], [{@obj_role={'obj_role', 0x3d, ':/}'}}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}]}) (async) ioctl$SG_SET_KEEP_ORPHAN(0xffffffffffffffff, 0x2287, &(0x7f0000000500)=0x5b) (async) 17:07:12 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x4}]}, 0x34, 0x0) 17:07:13 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0xc00}]}, 0x34, 0x0) 17:07:13 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x8100}]}, 0x34, 0x0) 17:07:13 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:13 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x8102}]}, 0x34, 0x0) 17:07:13 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:agp_device_t:s0\x00', 0x22, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:13 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tran-=xen,'}}]}}) [ 1416.955503][ T9028] 9pnet: Could not find request transport: xen [ 1416.976237][ T9040] SELinux: Context system_u:object_r:agp_device_t:s0 is not valid (left unmapped). 17:07:13 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x9413}]}, 0x34, 0x0) 17:07:13 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xff010000}, [{}]}, 0x34, 0x0) 17:07:13 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0xd00}]}, 0x34, 0x0) 17:07:13 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x1361}]}, 0x34, 0x0) [ 1416.985861][ T24] audit: type=1400 audit(1662311233.043:469): avc: denied { relabelto } for pid=9039 comm="syz-executor.0" name="file0" dev="sda1" ino=1175 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:agp_device_t:s0" [ 1416.993315][ T9040] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:13 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}], 0x10}}) 17:07:13 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0xff00}]}, 0x34, 0x0) 17:07:13 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:agp_device_t:s0\x00', 0x22, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) syz_mount_image$nfs4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:agp_device_t:s0\x00', 0x22, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async) [ 1417.067781][ T24] audit: type=1400 audit(1662311233.043:470): avc: denied { mounton } for pid=9039 comm="syz-executor.0" path="/root/syzkaller-testdir1164057216/syzkaller.1mIz4U/17788/file0" dev="sda1" ino=1175 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:agp_device_t:s0" [ 1417.100355][ T9047] 9pnet: Could not find request transport: xen 17:07:13 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tran.=xen,'}}]}}) 17:07:13 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0xff01}]}, 0x34, 0x0) 17:07:13 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x2}}, 0x34, 0x0) 17:07:13 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x2000}]}, 0x34, 0x0) 17:07:13 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) lsetxattr$security_selinux(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)='system_u:object_r:agp_device_t:s0\x00', 0x22, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:13 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xff010000}, [{}]}, 0x34, 0x0) [ 1417.131251][ T24] audit: type=1400 audit(1662311233.163:471): avc: denied { rmdir } for pid=1824 comm="syz-executor.0" name="file0" dev="sda1" ino=1175 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:agp_device_t:s0" [ 1417.157912][ T9060] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1417.168030][ T9058] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:13 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x81000000}, [{}]}, 0x34, 0x0) 17:07:13 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x2400}]}, 0x34, 0x0) 17:07:13 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x3f00}]}, 0x34, 0x0) 17:07:13 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x0, 0x84) getpeername(r0, &(0x7f0000000000)=@ax25={{}, [@rose, @remote, @remote, @remote, @bcast, @rose, @remote, @netrom]}, &(0x7f0000000080)=0x80) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f00000000c0)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@appraise}]}}) 17:07:13 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x4}}, 0x34, 0x0) 17:07:13 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tran0=xen,'}}]}}) 17:07:13 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x4000}]}, 0x34, 0x0) 17:07:13 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x8}}, 0x34, 0x0) [ 1417.232989][ T9064] 9pnet: Could not find request transport: xen 17:07:13 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x6113}]}, 0x34, 0x0) 17:07:13 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xfeffffff}, [{}]}, 0x34, 0x0) 17:07:13 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x8100}]}, 0x34, 0x0) 17:07:13 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:13 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tranL=xen,'}}]}}) 17:07:13 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0x8102}]}, 0x34, 0x0) 17:07:13 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x2}}, 0x34, 0x0) [ 1417.331356][ T9093] 9pnet: Could not find request transport: xen [ 1417.345210][ T9101] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:13 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) r0 = socket$inet_sctp(0x2, 0x0, 0x84) (rerun: 64) getpeername(r0, &(0x7f0000000000)=@ax25={{}, [@rose, @remote, @remote, @remote, @bcast, @rose, @remote, @netrom]}, &(0x7f0000000080)=0x80) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f00000000c0)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@appraise}]}}) 17:07:13 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x8}}, 0x34, 0x0) 17:07:13 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x4}}, 0x34, 0x0) 17:07:13 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0xff00}]}, 0x34, 0x0) 17:07:13 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x6}}, 0x34, 0x0) 17:07:13 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x8}}, 0x34, 0x0) 17:07:13 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tranX=xen,'}}]}}) 17:07:13 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{0x8, 0xff01}]}, 0x34, 0x0) 17:07:13 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x8}}, 0x34, 0x0) 17:07:13 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x8}}, 0x34, 0x0) 17:07:13 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x2}}, 0x34, 0x0) [ 1417.437408][ T9108] 9pnet: Could not find request transport: xen [ 1417.467970][ T9116] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:13 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0xc}}, 0x34, 0x0) [ 1417.530437][ T9131] 9pnet: Could not find request transport: xen 17:07:14 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_sctp(0x2, 0x0, 0x84) getpeername(r0, &(0x7f0000000000)=@ax25={{}, [@rose, @remote, @remote, @remote, @bcast, @rose, @remote, @netrom]}, &(0x7f0000000080)=0x80) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f00000000c0)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@appraise}]}}) 17:07:14 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x4}}, 0x34, 0x0) 17:07:14 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x8}}, 0x34, 0x0) 17:07:14 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tranc=xen,'}}]}}) 17:07:14 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0xd}}, 0x34, 0x0) 17:07:14 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x8}}, 0x34, 0x0) 17:07:14 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x8}}, 0x34, 0x0) 17:07:14 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x24}}, 0x34, 0x0) 17:07:14 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:14 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x8}}, 0x34, 0x0) 17:07:14 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x281}}, 0x34, 0x0) 17:07:14 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x8}}, 0x34, 0x0) [ 1418.318178][ T9253] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.331068][ T9242] 9pnet: Could not find request transport: xen 17:07:14 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)=@nl=@unspec, 0x80, &(0x7f0000000780)=[{&(0x7f0000000140)="aea386098de1c97e50f4a46a597f8986a368f77e695640749d0ff3f6d111fb317910e5cdab711b7877fdfeb5304d2c80fedcb77438dda3ba979f16edc551b96c43fcd55ead41cb40fddc2dc1d610c49e275e42214a124a99ffc5a549707bd68e3298973a9386f349e3eb139d8ff1aa9b2ed214dcf62a110b5e0b838d36be43e18088e98bebec571b9f067a12a853591e20695711006b4a04bbaba0508a559453125082772fbdacf36c040f219828a5a742e8dd3e179b8ec4ca84ae8a60eb076fae5b5a7151309e1e4a57", 0xca}, {&(0x7f0000000240)="546ce862d45d949ff34c70e94ec7b0678e9aae32c93d8307002b92f767e37ec8e2ad2009f39e81baf8f986ff02b6c84d278f357040bff0b80728237080675306f30908ec2be1acefcfa1fc2f50695a841fdb5c2d019f5de8f8f146473db419106a9cb8bb5858746d9a0788e79d4ea257790eaa49274f171ea31eded4ef36b9df0c135ab537a6fccf58273b7ddd02d9f8a554ad37e4c3c2bca4595d09e96dd3dffb5877bf61c61adc8048f1901e9375115f92f6d8fdd64b5cde71b4eac1b83617c43bd33e882b5145886334ea68bcb7c1af64c7048a2c3659b7d032975584ca756c2e9f5139365b57a937c4e3c72a", 0xee}, {&(0x7f0000000340)="e85961", 0x3}, {&(0x7f0000000400)="2bb2f8061ef6ac2b91e704a1d25045bd0abdabb98961a2a6da1df94b0c262eb14347c0ebb6f2162b5fdb635e842fc7869aa861dd53bc92bca0e97885ecd597bf1684e67926f5db1b9f0bd8ba47d1ca525a97ce0848ec7434118b1f03b88d3e5ae7eb951d8c110320cb0796c0cc6dd0f27ce2e7cadaeddcee322163adaeecc2eb7b139648334c37e6fb92d15da973c5329ed55dbd060277a8b456d6c2fd3b4033dd99d7772f21475b58812cf8152e632c18fd19f76cfce03ee5da2cd288a42f718cf7f8c0ef8ed3c4c23de091d28f720e290098095401ae7d87d1307fd014e6d89311c86110182a92c8864d8c2647ac7748a451", 0xf3}, {&(0x7f0000000380)="9ff4454cfb6037e873c9e24af21ab0f764b9064a9e162b7519a31d3dbd5711a283e2ead5c9842abcdb31aa62d84ac003734afa333b19b563382e1c8e4c", 0x3d}, {&(0x7f0000000500)="43a181f32e75af06a6f643469bcee262dd2be54690ba6eca13af5aa448b0fed57f3b06a67b8615a1421b82f8b518609bb762897d7381d81621de4e345c7f6b53c16aaf65b6c8890af1d8f2a874de31be6ba5d0df426ca0", 0x57}, {&(0x7f0000000580)="e37499964aea15850d8bc8429d68637e39c6f9ce3e6e557e9bbe5ec3eedfe730037f9606c7997ccc7a33de59fab48b4b240a4361342016f0a98292e82ae0199d0c937fe05e3e312b3dd0e82ab822a790b147df6df88aba8d899b2be6b67610b631ba4c463e13f122381d348571e909681ca2015bb964117ef09dc4ba", 0x7c}, {&(0x7f0000000600)='PI+', 0x3}, {&(0x7f0000000640)="446c75199940761301c176818ff2a818c9d89aa626a9070d550d21ba0e96c2b37dba35fa5ffb40a4e19992e6ecc0e4d11a21b80eaf9280aee5", 0x39}], 0x9, &(0x7f0000000840)=[{0x10, 0x12, 0xff}, {0xe8, 0x114, 0x1, "2eb23f790242917f82c97fa807c765250e201272817f204512c43af850908b815485c79ac37b0c8f49652f42380c8401c9eec08b2605b491e6460f1367bbbe1507cf42bab2a36609bbc217502c3acf1c999c2218caba47d311f3abc7cba6082d0cd41e4e110f48110c2f40d4eccc95b0a2dbb32d96242dbe0f2e919d7e5446650f05e56f70326fe4605e2922f7aaee4f08327c67866e49a4641549b3d415226635996d5899a3f7591d6f4d5ff26f8f4742eb2b110d082fb3f92a1306850fea761a9846a9c7475f6cd7a5791bf42ea032826fa7dadd1082bc"}], 0xf8}, 0x20044084) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/101, 0x65) acct(&(0x7f0000000a00)='./file0\x00') mknod(&(0x7f0000000940)='./file0\x00', 0x10, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000980)=@ax25={{0x3, @null, 0x2}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) 17:07:14 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x2}}, 0x34, 0x0) 17:07:14 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trand=xen,'}}]}}) 17:07:14 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x600}}, 0x34, 0x0) 17:07:14 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x8}}, 0x34, 0x0) 17:07:14 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x4}}, 0x34, 0x0) 17:07:14 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x8}}, 0x34, 0x0) 17:07:14 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x6}}, 0x34, 0x0) 17:07:14 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0xc00}}, 0x34, 0x0) 17:07:14 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)=@nl=@unspec, 0x80, &(0x7f0000000780)=[{&(0x7f0000000140)="aea386098de1c97e50f4a46a597f8986a368f77e695640749d0ff3f6d111fb317910e5cdab711b7877fdfeb5304d2c80fedcb77438dda3ba979f16edc551b96c43fcd55ead41cb40fddc2dc1d610c49e275e42214a124a99ffc5a549707bd68e3298973a9386f349e3eb139d8ff1aa9b2ed214dcf62a110b5e0b838d36be43e18088e98bebec571b9f067a12a853591e20695711006b4a04bbaba0508a559453125082772fbdacf36c040f219828a5a742e8dd3e179b8ec4ca84ae8a60eb076fae5b5a7151309e1e4a57", 0xca}, {&(0x7f0000000240)="546ce862d45d949ff34c70e94ec7b0678e9aae32c93d8307002b92f767e37ec8e2ad2009f39e81baf8f986ff02b6c84d278f357040bff0b80728237080675306f30908ec2be1acefcfa1fc2f50695a841fdb5c2d019f5de8f8f146473db419106a9cb8bb5858746d9a0788e79d4ea257790eaa49274f171ea31eded4ef36b9df0c135ab537a6fccf58273b7ddd02d9f8a554ad37e4c3c2bca4595d09e96dd3dffb5877bf61c61adc8048f1901e9375115f92f6d8fdd64b5cde71b4eac1b83617c43bd33e882b5145886334ea68bcb7c1af64c7048a2c3659b7d032975584ca756c2e9f5139365b57a937c4e3c72a", 0xee}, {&(0x7f0000000340)="e85961", 0x3}, {&(0x7f0000000400)="2bb2f8061ef6ac2b91e704a1d25045bd0abdabb98961a2a6da1df94b0c262eb14347c0ebb6f2162b5fdb635e842fc7869aa861dd53bc92bca0e97885ecd597bf1684e67926f5db1b9f0bd8ba47d1ca525a97ce0848ec7434118b1f03b88d3e5ae7eb951d8c110320cb0796c0cc6dd0f27ce2e7cadaeddcee322163adaeecc2eb7b139648334c37e6fb92d15da973c5329ed55dbd060277a8b456d6c2fd3b4033dd99d7772f21475b58812cf8152e632c18fd19f76cfce03ee5da2cd288a42f718cf7f8c0ef8ed3c4c23de091d28f720e290098095401ae7d87d1307fd014e6d89311c86110182a92c8864d8c2647ac7748a451", 0xf3}, {&(0x7f0000000380)="9ff4454cfb6037e873c9e24af21ab0f764b9064a9e162b7519a31d3dbd5711a283e2ead5c9842abcdb31aa62d84ac003734afa333b19b563382e1c8e4c", 0x3d}, {&(0x7f0000000500)="43a181f32e75af06a6f643469bcee262dd2be54690ba6eca13af5aa448b0fed57f3b06a67b8615a1421b82f8b518609bb762897d7381d81621de4e345c7f6b53c16aaf65b6c8890af1d8f2a874de31be6ba5d0df426ca0", 0x57}, {&(0x7f0000000580)="e37499964aea15850d8bc8429d68637e39c6f9ce3e6e557e9bbe5ec3eedfe730037f9606c7997ccc7a33de59fab48b4b240a4361342016f0a98292e82ae0199d0c937fe05e3e312b3dd0e82ab822a790b147df6df88aba8d899b2be6b67610b631ba4c463e13f122381d348571e909681ca2015bb964117ef09dc4ba", 0x7c}, {&(0x7f0000000600)='PI+', 0x3}, {&(0x7f0000000640)="446c75199940761301c176818ff2a818c9d89aa626a9070d550d21ba0e96c2b37dba35fa5ffb40a4e19992e6ecc0e4d11a21b80eaf9280aee5", 0x39}], 0x9, &(0x7f0000000840)=[{0x10, 0x12, 0xff}, {0xe8, 0x114, 0x1, "2eb23f790242917f82c97fa807c765250e201272817f204512c43af850908b815485c79ac37b0c8f49652f42380c8401c9eec08b2605b491e6460f1367bbbe1507cf42bab2a36609bbc217502c3acf1c999c2218caba47d311f3abc7cba6082d0cd41e4e110f48110c2f40d4eccc95b0a2dbb32d96242dbe0f2e919d7e5446650f05e56f70326fe4605e2922f7aaee4f08327c67866e49a4641549b3d415226635996d5899a3f7591d6f4d5ff26f8f4742eb2b110d082fb3f92a1306850fea761a9846a9c7475f6cd7a5791bf42ea032826fa7dadd1082bc"}], 0xf8}, 0x20044084) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async, rerun: 64) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/101, 0x65) (rerun: 64) acct(&(0x7f0000000a00)='./file0\x00') mknod(&(0x7f0000000940)='./file0\x00', 0x10, 0x2) (async) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000980)=@ax25={{0x3, @null, 0x2}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) [ 1418.406628][ T9266] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:14 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x8}}, 0x34, 0x0) [ 1418.461525][ T9268] 9pnet: Could not find request transport: xen [ 1418.488205][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:14 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tranh=xen,'}}]}}) 17:07:14 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x8}}, 0x34, 0x0) 17:07:14 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0xd00}}, 0x34, 0x0) 17:07:14 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x8}}, 0x34, 0x0) 17:07:14 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0xc}}, 0x34, 0x0) [ 1418.517261][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.544128][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:14 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x8}}, 0x34, 0x0) 17:07:14 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0xd}}, 0x34, 0x0) 17:07:14 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x1394}}, 0x34, 0x0) 17:07:14 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trani=xen,'}}]}}) 17:07:14 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x8}}, 0x34, 0x0) [ 1418.567882][ T9291] 9pnet: Could not find request transport: xen [ 1418.577008][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.596714][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.615744][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.633834][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.645309][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.653644][ T9304] 9pnet: Could not find request transport: xen [ 1418.664401][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.704178][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.712773][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.721274][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.729691][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.738097][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.746655][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.755034][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.763749][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.772190][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.780748][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.789076][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.797674][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.806805][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.815375][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.823719][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.832451][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.840814][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.849203][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.857782][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.866216][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.874719][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.883134][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.892397][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.901803][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.910244][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.918609][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.927845][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.954503][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.963933][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.972642][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.982189][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1418.990932][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.000284][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.008763][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.017381][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.026862][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.035527][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.044858][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.054166][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.063910][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.072626][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.081738][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.090259][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.098636][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.107923][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.116376][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.125727][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.134250][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.143728][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.152257][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.162473][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.170886][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.180352][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.188850][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.197461][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:15 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)=@nl=@unspec, 0x80, &(0x7f0000000780)=[{&(0x7f0000000140)="aea386098de1c97e50f4a46a597f8986a368f77e695640749d0ff3f6d111fb317910e5cdab711b7877fdfeb5304d2c80fedcb77438dda3ba979f16edc551b96c43fcd55ead41cb40fddc2dc1d610c49e275e42214a124a99ffc5a549707bd68e3298973a9386f349e3eb139d8ff1aa9b2ed214dcf62a110b5e0b838d36be43e18088e98bebec571b9f067a12a853591e20695711006b4a04bbaba0508a559453125082772fbdacf36c040f219828a5a742e8dd3e179b8ec4ca84ae8a60eb076fae5b5a7151309e1e4a57", 0xca}, {&(0x7f0000000240)="546ce862d45d949ff34c70e94ec7b0678e9aae32c93d8307002b92f767e37ec8e2ad2009f39e81baf8f986ff02b6c84d278f357040bff0b80728237080675306f30908ec2be1acefcfa1fc2f50695a841fdb5c2d019f5de8f8f146473db419106a9cb8bb5858746d9a0788e79d4ea257790eaa49274f171ea31eded4ef36b9df0c135ab537a6fccf58273b7ddd02d9f8a554ad37e4c3c2bca4595d09e96dd3dffb5877bf61c61adc8048f1901e9375115f92f6d8fdd64b5cde71b4eac1b83617c43bd33e882b5145886334ea68bcb7c1af64c7048a2c3659b7d032975584ca756c2e9f5139365b57a937c4e3c72a", 0xee}, {&(0x7f0000000340)="e85961", 0x3}, {&(0x7f0000000400)="2bb2f8061ef6ac2b91e704a1d25045bd0abdabb98961a2a6da1df94b0c262eb14347c0ebb6f2162b5fdb635e842fc7869aa861dd53bc92bca0e97885ecd597bf1684e67926f5db1b9f0bd8ba47d1ca525a97ce0848ec7434118b1f03b88d3e5ae7eb951d8c110320cb0796c0cc6dd0f27ce2e7cadaeddcee322163adaeecc2eb7b139648334c37e6fb92d15da973c5329ed55dbd060277a8b456d6c2fd3b4033dd99d7772f21475b58812cf8152e632c18fd19f76cfce03ee5da2cd288a42f718cf7f8c0ef8ed3c4c23de091d28f720e290098095401ae7d87d1307fd014e6d89311c86110182a92c8864d8c2647ac7748a451", 0xf3}, {&(0x7f0000000380)="9ff4454cfb6037e873c9e24af21ab0f764b9064a9e162b7519a31d3dbd5711a283e2ead5c9842abcdb31aa62d84ac003734afa333b19b563382e1c8e4c", 0x3d}, {&(0x7f0000000500)="43a181f32e75af06a6f643469bcee262dd2be54690ba6eca13af5aa448b0fed57f3b06a67b8615a1421b82f8b518609bb762897d7381d81621de4e345c7f6b53c16aaf65b6c8890af1d8f2a874de31be6ba5d0df426ca0", 0x57}, {&(0x7f0000000580)="e37499964aea15850d8bc8429d68637e39c6f9ce3e6e557e9bbe5ec3eedfe730037f9606c7997ccc7a33de59fab48b4b240a4361342016f0a98292e82ae0199d0c937fe05e3e312b3dd0e82ab822a790b147df6df88aba8d899b2be6b67610b631ba4c463e13f122381d348571e909681ca2015bb964117ef09dc4ba", 0x7c}, {&(0x7f0000000600)='PI+', 0x3}, {&(0x7f0000000640)="446c75199940761301c176818ff2a818c9d89aa626a9070d550d21ba0e96c2b37dba35fa5ffb40a4e19992e6ecc0e4d11a21b80eaf9280aee5", 0x39}], 0x9, &(0x7f0000000840)=[{0x10, 0x12, 0xff}, {0xe8, 0x114, 0x1, "2eb23f790242917f82c97fa807c765250e201272817f204512c43af850908b815485c79ac37b0c8f49652f42380c8401c9eec08b2605b491e6460f1367bbbe1507cf42bab2a36609bbc217502c3acf1c999c2218caba47d311f3abc7cba6082d0cd41e4e110f48110c2f40d4eccc95b0a2dbb32d96242dbe0f2e919d7e5446650f05e56f70326fe4605e2922f7aaee4f08327c67866e49a4641549b3d415226635996d5899a3f7591d6f4d5ff26f8f4742eb2b110d082fb3f92a1306850fea761a9846a9c7475f6cd7a5791bf42ea032826fa7dadd1082bc"}], 0xf8}, 0x20044084) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async, rerun: 32) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/101, 0x65) (async, rerun: 32) acct(&(0x7f0000000a00)='./file0\x00') (async, rerun: 64) mknod(&(0x7f0000000940)='./file0\x00', 0x10, 0x2) (rerun: 64) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000980)=@ax25={{0x3, @null, 0x2}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) 17:07:15 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x24}}, 0x34, 0x0) 17:07:15 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x2000}}, 0x34, 0x0) 17:07:15 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x8}}, 0x34, 0x0) 17:07:15 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tranl=xen,'}}]}}) 17:07:15 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x281}}, 0x34, 0x0) 17:07:15 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x8}}, 0x34, 0x0) 17:07:15 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x2400}}, 0x34, 0x0) [ 1419.206873][ T9283] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:15 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x3f00}}, 0x34, 0x0) 17:07:15 executing program 0: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 17:07:15 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x600}}, 0x34, 0x0) 17:07:15 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trano=xen,'}}]}}) [ 1419.265160][ T9316] 9pnet: Could not find request transport: xen 17:07:15 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:15 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0xc00}}, 0x34, 0x0) 17:07:15 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x4000}}, 0x34, 0x0) 17:07:15 executing program 0: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) 17:07:15 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0xd00}}, 0x34, 0x0) 17:07:15 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x8100}}, 0x34, 0x0) 17:07:15 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tranp=xen,'}}]}}) 17:07:15 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) [ 1419.354474][ T9338] 9pnet: Could not find request transport: xen 17:07:15 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:15 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x1361}}, 0x34, 0x0) 17:07:15 executing program 0: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) 17:07:15 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x8102}}, 0x34, 0x0) 17:07:15 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x2000}}, 0x34, 0x0) 17:07:15 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e733d78656e2c72a197f5f72bf78a6f6f74636f6e746578743d73636166665f714f00"]) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) quotactl(0x3, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000100)="0ffa16e352e97d82bd10fe3f1f3a2daa96ce8e6f894c79eb059a2d798f7c22c7224a69433846009b23e235ad15c132558891d06455d1fb98bd5cf02baa5f5b7fc9aebacc00489ff0cd5d0a91b975843894751c33effe04cac4d3c86b73f96f8314cfffe26fe0160844f8cd2988406b6fc8c386e0c5331090f49cc817d4461845732bf0fc23469cc0fc40607d731dd0b4565dd18b6e31afa6f43759a29ce64fdc9bb874a1f51d2ef213fceeb79549b9d4b02097951b8515a45a43b711a35c6b6a0a9a31200495aeadfce5a1f4d83097248b8b89f5fa7a7c70c4d2ce464324ed376a85ca58c6") connect(0xffffffffffffffff, &(0x7f0000000200)=@l2tp={0x2, 0x0, @multicast1, 0x4}, 0x80) 17:07:15 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trant=xen,'}}]}}) 17:07:15 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}], {0x8}}, 0x2c, 0x0) 17:07:15 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [], {0x8}}, 0x24, 0x0) 17:07:15 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x2400}}, 0x34, 0x0) [ 1419.433799][ T9357] 9pnet: Could not find request transport: xen 17:07:15 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x9413}}, 0x34, 0x0) 17:07:15 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tranu=xen,'}}]}}) 17:07:15 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x3f00}}, 0x34, 0x0) 17:07:15 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)=@nl=@unspec, 0x80, &(0x7f0000000780)=[{&(0x7f0000000140)="aea386098de1c97e50f4a46a597f8986a368f77e695640749d0ff3f6d111fb317910e5cdab711b7877fdfeb5304d2c80fedcb77438dda3ba979f16edc551b96c43fcd55ead41cb40fddc2dc1d610c49e275e42214a124a99ffc5a549707bd68e3298973a9386f349e3eb139d8ff1aa9b2ed214dcf62a110b5e0b838d36be43e18088e98bebec571b9f067a12a853591e20695711006b4a04bbaba0508a559453125082772fbdacf36c040f219828a5a742e8dd3e179b8ec4ca84ae8a60eb076fae5b5a7151309e1e4a57", 0xca}, {&(0x7f0000000240)="546ce862d45d949ff34c70e94ec7b0678e9aae32c93d8307002b92f767e37ec8e2ad2009f39e81baf8f986ff02b6c84d278f357040bff0b80728237080675306f30908ec2be1acefcfa1fc2f50695a841fdb5c2d019f5de8f8f146473db419106a9cb8bb5858746d9a0788e79d4ea257790eaa49274f171ea31eded4ef36b9df0c135ab537a6fccf58273b7ddd02d9f8a554ad37e4c3c2bca4595d09e96dd3dffb5877bf61c61adc8048f1901e9375115f92f6d8fdd64b5cde71b4eac1b83617c43bd33e882b5145886334ea68bcb7c1af64c7048a2c3659b7d032975584ca756c2e9f5139365b57a937c4e3c72a", 0xee}, {&(0x7f0000000340)="e85961", 0x3}, {&(0x7f0000000400)="2bb2f8061ef6ac2b91e704a1d25045bd0abdabb98961a2a6da1df94b0c262eb14347c0ebb6f2162b5fdb635e842fc7869aa861dd53bc92bca0e97885ecd597bf1684e67926f5db1b9f0bd8ba47d1ca525a97ce0848ec7434118b1f03b88d3e5ae7eb951d8c110320cb0796c0cc6dd0f27ce2e7cadaeddcee322163adaeecc2eb7b139648334c37e6fb92d15da973c5329ed55dbd060277a8b456d6c2fd3b4033dd99d7772f21475b58812cf8152e632c18fd19f76cfce03ee5da2cd288a42f718cf7f8c0ef8ed3c4c23de091d28f720e290098095401ae7d87d1307fd014e6d89311c86110182a92c8864d8c2647ac7748a451", 0xf3}, {&(0x7f0000000380)="9ff4454cfb6037e873c9e24af21ab0f764b9064a9e162b7519a31d3dbd5711a283e2ead5c9842abcdb31aa62d84ac003734afa333b19b563382e1c8e4c", 0x3d}, {&(0x7f0000000500)="43a181f32e75af06a6f643469bcee262dd2be54690ba6eca13af5aa448b0fed57f3b06a67b8615a1421b82f8b518609bb762897d7381d81621de4e345c7f6b53c16aaf65b6c8890af1d8f2a874de31be6ba5d0df426ca0", 0x57}, {&(0x7f0000000580)="e37499964aea15850d8bc8429d68637e39c6f9ce3e6e557e9bbe5ec3eedfe730037f9606c7997ccc7a33de59fab48b4b240a4361342016f0a98292e82ae0199d0c937fe05e3e312b3dd0e82ab822a790b147df6df88aba8d899b2be6b67610b631ba4c463e13f122381d348571e909681ca2015bb964117ef09dc4ba", 0x7c}, {&(0x7f0000000600)='PI+', 0x3}, {&(0x7f0000000640)="446c75199940761301c176818ff2a818c9d89aa626a9070d550d21ba0e96c2b37dba35fa5ffb40a4e19992e6ecc0e4d11a21b80eaf9280aee5", 0x39}], 0x9, &(0x7f0000000840)=[{0x10, 0x12, 0xff}, {0xe8, 0x114, 0x1, "2eb23f790242917f82c97fa807c765250e201272817f204512c43af850908b815485c79ac37b0c8f49652f42380c8401c9eec08b2605b491e6460f1367bbbe1507cf42bab2a36609bbc217502c3acf1c999c2218caba47d311f3abc7cba6082d0cd41e4e110f48110c2f40d4eccc95b0a2dbb32d96242dbe0f2e919d7e5446650f05e56f70326fe4605e2922f7aaee4f08327c67866e49a4641549b3d415226635996d5899a3f7591d6f4d5ff26f8f4742eb2b110d082fb3f92a1306850fea761a9846a9c7475f6cd7a5791bf42ea032826fa7dadd1082bc"}], 0xf8}, 0x20044084) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/101, 0x65) acct(&(0x7f0000000a00)='./file0\x00') mknod(&(0x7f0000000940)='./file0\x00', 0x10, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000980)=@ax25={{0x3, @null, 0x2}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) 17:07:15 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0xff00}}, 0x34, 0x0) [ 1419.505725][ T9374] 9pnet: Could not find request transport: xen [ 1419.514129][ T9376] 9pnet: Could not find request transport: xen 17:07:15 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x4000}}, 0x34, 0x0) 17:07:15 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e733d78656e2c72a197f5f72bf78a6f6f74636f6e746578743d73636166665f714f00"]) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) quotactl(0x3, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000100)="0ffa16e352e97d82bd10fe3f1f3a2daa96ce8e6f894c79eb059a2d798f7c22c7224a69433846009b23e235ad15c132558891d06455d1fb98bd5cf02baa5f5b7fc9aebacc00489ff0cd5d0a91b975843894751c33effe04cac4d3c86b73f96f8314cfffe26fe0160844f8cd2988406b6fc8c386e0c5331090f49cc817d4461845732bf0fc23469cc0fc40607d731dd0b4565dd18b6e31afa6f43759a29ce64fdc9bb874a1f51d2ef213fceeb79549b9d4b02097951b8515a45a43b711a35c6b6a0a9a31200495aeadfce5a1f4d83097248b8b89f5fa7a7c70c4d2ce464324ed376a85ca58c6") connect(0xffffffffffffffff, &(0x7f0000000200)=@l2tp={0x2, 0x0, @multicast1, 0x4}, 0x80) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e733d78656e2c72a197f5f72bf78a6f6f74636f6e746578743d73636166665f714f00"]) (async) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) (async) quotactl(0x3, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000100)="0ffa16e352e97d82bd10fe3f1f3a2daa96ce8e6f894c79eb059a2d798f7c22c7224a69433846009b23e235ad15c132558891d06455d1fb98bd5cf02baa5f5b7fc9aebacc00489ff0cd5d0a91b975843894751c33effe04cac4d3c86b73f96f8314cfffe26fe0160844f8cd2988406b6fc8c386e0c5331090f49cc817d4461845732bf0fc23469cc0fc40607d731dd0b4565dd18b6e31afa6f43759a29ce64fdc9bb874a1f51d2ef213fceeb79549b9d4b02097951b8515a45a43b711a35c6b6a0a9a31200495aeadfce5a1f4d83097248b8b89f5fa7a7c70c4d2ce464324ed376a85ca58c6") (async) connect(0xffffffffffffffff, &(0x7f0000000200)=@l2tp={0x2, 0x0, @multicast1, 0x4}, 0x80) (async) 17:07:15 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0xff01}}, 0x34, 0x0) 17:07:15 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)=@nl=@unspec, 0x80, &(0x7f0000000780)=[{&(0x7f0000000140)="aea386098de1c97e50f4a46a597f8986a368f77e695640749d0ff3f6d111fb317910e5cdab711b7877fdfeb5304d2c80fedcb77438dda3ba979f16edc551b96c43fcd55ead41cb40fddc2dc1d610c49e275e42214a124a99ffc5a549707bd68e3298973a9386f349e3eb139d8ff1aa9b2ed214dcf62a110b5e0b838d36be43e18088e98bebec571b9f067a12a853591e20695711006b4a04bbaba0508a559453125082772fbdacf36c040f219828a5a742e8dd3e179b8ec4ca84ae8a60eb076fae5b5a7151309e1e4a57", 0xca}, {&(0x7f0000000240)="546ce862d45d949ff34c70e94ec7b0678e9aae32c93d8307002b92f767e37ec8e2ad2009f39e81baf8f986ff02b6c84d278f357040bff0b80728237080675306f30908ec2be1acefcfa1fc2f50695a841fdb5c2d019f5de8f8f146473db419106a9cb8bb5858746d9a0788e79d4ea257790eaa49274f171ea31eded4ef36b9df0c135ab537a6fccf58273b7ddd02d9f8a554ad37e4c3c2bca4595d09e96dd3dffb5877bf61c61adc8048f1901e9375115f92f6d8fdd64b5cde71b4eac1b83617c43bd33e882b5145886334ea68bcb7c1af64c7048a2c3659b7d032975584ca756c2e9f5139365b57a937c4e3c72a", 0xee}, {&(0x7f0000000340)="e85961", 0x3}, {&(0x7f0000000400)="2bb2f8061ef6ac2b91e704a1d25045bd0abdabb98961a2a6da1df94b0c262eb14347c0ebb6f2162b5fdb635e842fc7869aa861dd53bc92bca0e97885ecd597bf1684e67926f5db1b9f0bd8ba47d1ca525a97ce0848ec7434118b1f03b88d3e5ae7eb951d8c110320cb0796c0cc6dd0f27ce2e7cadaeddcee322163adaeecc2eb7b139648334c37e6fb92d15da973c5329ed55dbd060277a8b456d6c2fd3b4033dd99d7772f21475b58812cf8152e632c18fd19f76cfce03ee5da2cd288a42f718cf7f8c0ef8ed3c4c23de091d28f720e290098095401ae7d87d1307fd014e6d89311c86110182a92c8864d8c2647ac7748a451", 0xf3}, {&(0x7f0000000380)="9ff4454cfb6037e873c9e24af21ab0f764b9064a9e162b7519a31d3dbd5711a283e2ead5c9842abcdb31aa62d84ac003734afa333b19b563382e1c8e4c", 0x3d}, {&(0x7f0000000500)="43a181f32e75af06a6f643469bcee262dd2be54690ba6eca13af5aa448b0fed57f3b06a67b8615a1421b82f8b518609bb762897d7381d81621de4e345c7f6b53c16aaf65b6c8890af1d8f2a874de31be6ba5d0df426ca0", 0x57}, {&(0x7f0000000580)="e37499964aea15850d8bc8429d68637e39c6f9ce3e6e557e9bbe5ec3eedfe730037f9606c7997ccc7a33de59fab48b4b240a4361342016f0a98292e82ae0199d0c937fe05e3e312b3dd0e82ab822a790b147df6df88aba8d899b2be6b67610b631ba4c463e13f122381d348571e909681ca2015bb964117ef09dc4ba", 0x7c}, {&(0x7f0000000600)='PI+', 0x3}, {&(0x7f0000000640)="446c75199940761301c176818ff2a818c9d89aa626a9070d550d21ba0e96c2b37dba35fa5ffb40a4e19992e6ecc0e4d11a21b80eaf9280aee5", 0x39}], 0x9, &(0x7f0000000840)=[{0x10, 0x12, 0xff}, {0xe8, 0x114, 0x1, "2eb23f790242917f82c97fa807c765250e201272817f204512c43af850908b815485c79ac37b0c8f49652f42380c8401c9eec08b2605b491e6460f1367bbbe1507cf42bab2a36609bbc217502c3acf1c999c2218caba47d311f3abc7cba6082d0cd41e4e110f48110c2f40d4eccc95b0a2dbb32d96242dbe0f2e919d7e5446650f05e56f70326fe4605e2922f7aaee4f08327c67866e49a4641549b3d415226635996d5899a3f7591d6f4d5ff26f8f4742eb2b110d082fb3f92a1306850fea761a9846a9c7475f6cd7a5791bf42ea032826fa7dadd1082bc"}], 0xf8}, 0x20044084) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/101, 0x65) acct(&(0x7f0000000a00)='./file0\x00') mknod(&(0x7f0000000940)='./file0\x00', 0x10, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000980)=@ax25={{0x3, @null, 0x2}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) [ 1419.562137][ T9394] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.595826][ T9390] 9pnet: Could not find request transport: xen 17:07:15 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x6113}}, 0x34, 0x0) 17:07:15 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:15 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tranx=xen,'}}]}}) 17:07:15 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)=@nl=@unspec, 0x80, &(0x7f0000000780)=[{&(0x7f0000000140)="aea386098de1c97e50f4a46a597f8986a368f77e695640749d0ff3f6d111fb317910e5cdab711b7877fdfeb5304d2c80fedcb77438dda3ba979f16edc551b96c43fcd55ead41cb40fddc2dc1d610c49e275e42214a124a99ffc5a549707bd68e3298973a9386f349e3eb139d8ff1aa9b2ed214dcf62a110b5e0b838d36be43e18088e98bebec571b9f067a12a853591e20695711006b4a04bbaba0508a559453125082772fbdacf36c040f219828a5a742e8dd3e179b8ec4ca84ae8a60eb076fae5b5a7151309e1e4a57", 0xca}, {&(0x7f0000000240)="546ce862d45d949ff34c70e94ec7b0678e9aae32c93d8307002b92f767e37ec8e2ad2009f39e81baf8f986ff02b6c84d278f357040bff0b80728237080675306f30908ec2be1acefcfa1fc2f50695a841fdb5c2d019f5de8f8f146473db419106a9cb8bb5858746d9a0788e79d4ea257790eaa49274f171ea31eded4ef36b9df0c135ab537a6fccf58273b7ddd02d9f8a554ad37e4c3c2bca4595d09e96dd3dffb5877bf61c61adc8048f1901e9375115f92f6d8fdd64b5cde71b4eac1b83617c43bd33e882b5145886334ea68bcb7c1af64c7048a2c3659b7d032975584ca756c2e9f5139365b57a937c4e3c72a", 0xee}, {&(0x7f0000000340)="e85961", 0x3}, {&(0x7f0000000400)="2bb2f8061ef6ac2b91e704a1d25045bd0abdabb98961a2a6da1df94b0c262eb14347c0ebb6f2162b5fdb635e842fc7869aa861dd53bc92bca0e97885ecd597bf1684e67926f5db1b9f0bd8ba47d1ca525a97ce0848ec7434118b1f03b88d3e5ae7eb951d8c110320cb0796c0cc6dd0f27ce2e7cadaeddcee322163adaeecc2eb7b139648334c37e6fb92d15da973c5329ed55dbd060277a8b456d6c2fd3b4033dd99d7772f21475b58812cf8152e632c18fd19f76cfce03ee5da2cd288a42f718cf7f8c0ef8ed3c4c23de091d28f720e290098095401ae7d87d1307fd014e6d89311c86110182a92c8864d8c2647ac7748a451", 0xf3}, {&(0x7f0000000380)="9ff4454cfb6037e873c9e24af21ab0f764b9064a9e162b7519a31d3dbd5711a283e2ead5c9842abcdb31aa62d84ac003734afa333b19b563382e1c8e4c", 0x3d}, {&(0x7f0000000500)="43a181f32e75af06a6f643469bcee262dd2be54690ba6eca13af5aa448b0fed57f3b06a67b8615a1421b82f8b518609bb762897d7381d81621de4e345c7f6b53c16aaf65b6c8890af1d8f2a874de31be6ba5d0df426ca0", 0x57}, {&(0x7f0000000580)="e37499964aea15850d8bc8429d68637e39c6f9ce3e6e557e9bbe5ec3eedfe730037f9606c7997ccc7a33de59fab48b4b240a4361342016f0a98292e82ae0199d0c937fe05e3e312b3dd0e82ab822a790b147df6df88aba8d899b2be6b67610b631ba4c463e13f122381d348571e909681ca2015bb964117ef09dc4ba", 0x7c}, {&(0x7f0000000600)='PI+', 0x3}, {&(0x7f0000000640)="446c75199940761301c176818ff2a818c9d89aa626a9070d550d21ba0e96c2b37dba35fa5ffb40a4e19992e6ecc0e4d11a21b80eaf9280aee5", 0x39}], 0x9, &(0x7f0000000840)=[{0x10, 0x12, 0xff}, {0xe8, 0x114, 0x1, "2eb23f790242917f82c97fa807c765250e201272817f204512c43af850908b815485c79ac37b0c8f49652f42380c8401c9eec08b2605b491e6460f1367bbbe1507cf42bab2a36609bbc217502c3acf1c999c2218caba47d311f3abc7cba6082d0cd41e4e110f48110c2f40d4eccc95b0a2dbb32d96242dbe0f2e919d7e5446650f05e56f70326fe4605e2922f7aaee4f08327c67866e49a4641549b3d415226635996d5899a3f7591d6f4d5ff26f8f4742eb2b110d082fb3f92a1306850fea761a9846a9c7475f6cd7a5791bf42ea032826fa7dadd1082bc"}], 0xf8}, 0x20044084) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/101, 0x65) acct(&(0x7f0000000a00)='./file0\x00') mknod(&(0x7f0000000940)='./file0\x00', 0x10, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000980)=@ax25={{0x3, @null, 0x2}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) 17:07:15 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x8100}}, 0x34, 0x0) [ 1419.653472][ T9400] 9pnet: Could not find request transport: xen [ 1419.658554][ T9405] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1419.688573][ T9407] 9pnet: Could not find request transport: xen 17:07:15 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x2}}, 0x34, 0x0) 17:07:15 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e733d78656e2c72a197f5f72bf78a6f6f74636f6e746578743d73636166665f714f00"]) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) quotactl(0x3, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000100)="0ffa16e352e97d82bd10fe3f1f3a2daa96ce8e6f894c79eb059a2d798f7c22c7224a69433846009b23e235ad15c132558891d06455d1fb98bd5cf02baa5f5b7fc9aebacc00489ff0cd5d0a91b975843894751c33effe04cac4d3c86b73f96f8314cfffe26fe0160844f8cd2988406b6fc8c386e0c5331090f49cc817d4461845732bf0fc23469cc0fc40607d731dd0b4565dd18b6e31afa6f43759a29ce64fdc9bb874a1f51d2ef213fceeb79549b9d4b02097951b8515a45a43b711a35c6b6a0a9a31200495aeadfce5a1f4d83097248b8b89f5fa7a7c70c4d2ce464324ed376a85ca58c6") connect(0xffffffffffffffff, &(0x7f0000000200)=@l2tp={0x2, 0x0, @multicast1, 0x4}, 0x80) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e733d78656e2c72a197f5f72bf78a6f6f74636f6e746578743d73636166665f714f00"]) (async) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) (async) quotactl(0x3, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000100)="0ffa16e352e97d82bd10fe3f1f3a2daa96ce8e6f894c79eb059a2d798f7c22c7224a69433846009b23e235ad15c132558891d06455d1fb98bd5cf02baa5f5b7fc9aebacc00489ff0cd5d0a91b975843894751c33effe04cac4d3c86b73f96f8314cfffe26fe0160844f8cd2988406b6fc8c386e0c5331090f49cc817d4461845732bf0fc23469cc0fc40607d731dd0b4565dd18b6e31afa6f43759a29ce64fdc9bb874a1f51d2ef213fceeb79549b9d4b02097951b8515a45a43b711a35c6b6a0a9a31200495aeadfce5a1f4d83097248b8b89f5fa7a7c70c4d2ce464324ed376a85ca58c6") (async) connect(0xffffffffffffffff, &(0x7f0000000200)=@l2tp={0x2, 0x0, @multicast1, 0x4}, 0x80) (async) 17:07:15 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tranz=xen,'}}]}}) 17:07:15 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x8102}}, 0x34, 0x0) 17:07:15 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x4}}, 0x34, 0x0) 17:07:15 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)=@nl=@unspec, 0x80, &(0x7f0000000780)=[{&(0x7f0000000140)="aea386098de1c97e50f4a46a597f8986a368f77e695640749d0ff3f6d111fb317910e5cdab711b7877fdfeb5304d2c80fedcb77438dda3ba979f16edc551b96c43fcd55ead41cb40fddc2dc1d610c49e275e42214a124a99ffc5a549707bd68e3298973a9386f349e3eb139d8ff1aa9b2ed214dcf62a110b5e0b838d36be43e18088e98bebec571b9f067a12a853591e20695711006b4a04bbaba0508a559453125082772fbdacf36c040f219828a5a742e8dd3e179b8ec4ca84ae8a60eb076fae5b5a7151309e1e4a57", 0xca}, {&(0x7f0000000240)="546ce862d45d949ff34c70e94ec7b0678e9aae32c93d8307002b92f767e37ec8e2ad2009f39e81baf8f986ff02b6c84d278f357040bff0b80728237080675306f30908ec2be1acefcfa1fc2f50695a841fdb5c2d019f5de8f8f146473db419106a9cb8bb5858746d9a0788e79d4ea257790eaa49274f171ea31eded4ef36b9df0c135ab537a6fccf58273b7ddd02d9f8a554ad37e4c3c2bca4595d09e96dd3dffb5877bf61c61adc8048f1901e9375115f92f6d8fdd64b5cde71b4eac1b83617c43bd33e882b5145886334ea68bcb7c1af64c7048a2c3659b7d032975584ca756c2e9f5139365b57a937c4e3c72a", 0xee}, {&(0x7f0000000340)="e85961", 0x3}, {&(0x7f0000000400)="2bb2f8061ef6ac2b91e704a1d25045bd0abdabb98961a2a6da1df94b0c262eb14347c0ebb6f2162b5fdb635e842fc7869aa861dd53bc92bca0e97885ecd597bf1684e67926f5db1b9f0bd8ba47d1ca525a97ce0848ec7434118b1f03b88d3e5ae7eb951d8c110320cb0796c0cc6dd0f27ce2e7cadaeddcee322163adaeecc2eb7b139648334c37e6fb92d15da973c5329ed55dbd060277a8b456d6c2fd3b4033dd99d7772f21475b58812cf8152e632c18fd19f76cfce03ee5da2cd288a42f718cf7f8c0ef8ed3c4c23de091d28f720e290098095401ae7d87d1307fd014e6d89311c86110182a92c8864d8c2647ac7748a451", 0xf3}, {&(0x7f0000000380)="9ff4454cfb6037e873c9e24af21ab0f764b9064a9e162b7519a31d3dbd5711a283e2ead5c9842abcdb31aa62d84ac003734afa333b19b563382e1c8e4c", 0x3d}, {&(0x7f0000000500)="43a181f32e75af06a6f643469bcee262dd2be54690ba6eca13af5aa448b0fed57f3b06a67b8615a1421b82f8b518609bb762897d7381d81621de4e345c7f6b53c16aaf65b6c8890af1d8f2a874de31be6ba5d0df426ca0", 0x57}, {&(0x7f0000000580)="e37499964aea15850d8bc8429d68637e39c6f9ce3e6e557e9bbe5ec3eedfe730037f9606c7997ccc7a33de59fab48b4b240a4361342016f0a98292e82ae0199d0c937fe05e3e312b3dd0e82ab822a790b147df6df88aba8d899b2be6b67610b631ba4c463e13f122381d348571e909681ca2015bb964117ef09dc4ba", 0x7c}, {&(0x7f0000000600)='PI+', 0x3}, {&(0x7f0000000640)="446c75199940761301c176818ff2a818c9d89aa626a9070d550d21ba0e96c2b37dba35fa5ffb40a4e19992e6ecc0e4d11a21b80eaf9280aee5", 0x39}], 0x9, &(0x7f0000000840)=[{0x10, 0x12, 0xff}, {0xe8, 0x114, 0x1, "2eb23f790242917f82c97fa807c765250e201272817f204512c43af850908b815485c79ac37b0c8f49652f42380c8401c9eec08b2605b491e6460f1367bbbe1507cf42bab2a36609bbc217502c3acf1c999c2218caba47d311f3abc7cba6082d0cd41e4e110f48110c2f40d4eccc95b0a2dbb32d96242dbe0f2e919d7e5446650f05e56f70326fe4605e2922f7aaee4f08327c67866e49a4641549b3d415226635996d5899a3f7591d6f4d5ff26f8f4742eb2b110d082fb3f92a1306850fea761a9846a9c7475f6cd7a5791bf42ea032826fa7dadd1082bc"}], 0xf8}, 0x20044084) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/101, 0x65) acct(&(0x7f0000000a00)='./file0\x00') mknod(&(0x7f0000000940)='./file0\x00', 0x10, 0x2) connect(0xffffffffffffffff, &(0x7f0000000980)=@ax25={{0x3, @null, 0x2}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) [ 1419.704549][ T9416] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:15 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0xff00}}, 0x34, 0x0) 17:07:15 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x6}}, 0x34, 0x0) 17:07:15 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans\"xen,'}}]}}) 17:07:15 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7472616e733d78656e2c726f6f74636f6e746578743d73746166665f092c009b59a92cda87f90f3f1efe7b4fe08e707bd0"]) 17:07:15 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x8}}, 0x34, 0x0) [ 1419.773294][ T9423] 9pnet: Could not find request transport: xen [ 1419.782870][ T9422] 9pnet: Could not find request transport: xen [ 1419.789764][ T9431] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:15 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0xff01}}, 0x34, 0x0) 17:07:15 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)=@nl=@unspec, 0x80, &(0x7f0000000780)=[{&(0x7f0000000140)="aea386098de1c97e50f4a46a597f8986a368f77e695640749d0ff3f6d111fb317910e5cdab711b7877fdfeb5304d2c80fedcb77438dda3ba979f16edc551b96c43fcd55ead41cb40fddc2dc1d610c49e275e42214a124a99ffc5a549707bd68e3298973a9386f349e3eb139d8ff1aa9b2ed214dcf62a110b5e0b838d36be43e18088e98bebec571b9f067a12a853591e20695711006b4a04bbaba0508a559453125082772fbdacf36c040f219828a5a742e8dd3e179b8ec4ca84ae8a60eb076fae5b5a7151309e1e4a57", 0xca}, {&(0x7f0000000240)="546ce862d45d949ff34c70e94ec7b0678e9aae32c93d8307002b92f767e37ec8e2ad2009f39e81baf8f986ff02b6c84d278f357040bff0b80728237080675306f30908ec2be1acefcfa1fc2f50695a841fdb5c2d019f5de8f8f146473db419106a9cb8bb5858746d9a0788e79d4ea257790eaa49274f171ea31eded4ef36b9df0c135ab537a6fccf58273b7ddd02d9f8a554ad37e4c3c2bca4595d09e96dd3dffb5877bf61c61adc8048f1901e9375115f92f6d8fdd64b5cde71b4eac1b83617c43bd33e882b5145886334ea68bcb7c1af64c7048a2c3659b7d032975584ca756c2e9f5139365b57a937c4e3c72a", 0xee}, {&(0x7f0000000340)="e85961", 0x3}, {&(0x7f0000000400)="2bb2f8061ef6ac2b91e704a1d25045bd0abdabb98961a2a6da1df94b0c262eb14347c0ebb6f2162b5fdb635e842fc7869aa861dd53bc92bca0e97885ecd597bf1684e67926f5db1b9f0bd8ba47d1ca525a97ce0848ec7434118b1f03b88d3e5ae7eb951d8c110320cb0796c0cc6dd0f27ce2e7cadaeddcee322163adaeecc2eb7b139648334c37e6fb92d15da973c5329ed55dbd060277a8b456d6c2fd3b4033dd99d7772f21475b58812cf8152e632c18fd19f76cfce03ee5da2cd288a42f718cf7f8c0ef8ed3c4c23de091d28f720e290098095401ae7d87d1307fd014e6d89311c86110182a92c8864d8c2647ac7748a451", 0xf3}, {&(0x7f0000000380)="9ff4454cfb6037e873c9e24af21ab0f764b9064a9e162b7519a31d3dbd5711a283e2ead5c9842abcdb31aa62d84ac003734afa333b19b563382e1c8e4c", 0x3d}, {&(0x7f0000000500)="43a181f32e75af06a6f643469bcee262dd2be54690ba6eca13af5aa448b0fed57f3b06a67b8615a1421b82f8b518609bb762897d7381d81621de4e345c7f6b53c16aaf65b6c8890af1d8f2a874de31be6ba5d0df426ca0", 0x57}, {&(0x7f0000000580)="e37499964aea15850d8bc8429d68637e39c6f9ce3e6e557e9bbe5ec3eedfe730037f9606c7997ccc7a33de59fab48b4b240a4361342016f0a98292e82ae0199d0c937fe05e3e312b3dd0e82ab822a790b147df6df88aba8d899b2be6b67610b631ba4c463e13f122381d348571e909681ca2015bb964117ef09dc4ba", 0x7c}, {&(0x7f0000000600)='PI+', 0x3}, {&(0x7f0000000640)="446c75199940761301c176818ff2a818c9d89aa626a9070d550d21ba0e96c2b37dba35fa5ffb40a4e19992e6ecc0e4d11a21b80eaf9280aee5", 0x39}], 0x9, &(0x7f0000000840)=[{0x10, 0x12, 0xff}, {0xe8, 0x114, 0x1, "2eb23f790242917f82c97fa807c765250e201272817f204512c43af850908b815485c79ac37b0c8f49652f42380c8401c9eec08b2605b491e6460f1367bbbe1507cf42bab2a36609bbc217502c3acf1c999c2218caba47d311f3abc7cba6082d0cd41e4e110f48110c2f40d4eccc95b0a2dbb32d96242dbe0f2e919d7e5446650f05e56f70326fe4605e2922f7aaee4f08327c67866e49a4641549b3d415226635996d5899a3f7591d6f4d5ff26f8f4742eb2b110d082fb3f92a1306850fea761a9846a9c7475f6cd7a5791bf42ea032826fa7dadd1082bc"}], 0xf8}, 0x20044084) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/101, 0x65) acct(&(0x7f0000000a00)='./file0\x00') mknod(&(0x7f0000000940)='./file0\x00', 0x10, 0x2) connect(0xffffffffffffffff, &(0x7f0000000980)=@ax25={{0x3, @null, 0x2}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) 17:07:15 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:15 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xc}}, 0x34, 0x0) [ 1419.839935][ T9444] SELinux: security_context_str_to_sid (staff_ ) failed with errno=-22 [ 1419.867105][ T9451] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:15 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)=@nl=@unspec, 0x80, &(0x7f0000000780)=[{&(0x7f0000000140)="aea386098de1c97e50f4a46a597f8986a368f77e695640749d0ff3f6d111fb317910e5cdab711b7877fdfeb5304d2c80fedcb77438dda3ba979f16edc551b96c43fcd55ead41cb40fddc2dc1d610c49e275e42214a124a99ffc5a549707bd68e3298973a9386f349e3eb139d8ff1aa9b2ed214dcf62a110b5e0b838d36be43e18088e98bebec571b9f067a12a853591e20695711006b4a04bbaba0508a559453125082772fbdacf36c040f219828a5a742e8dd3e179b8ec4ca84ae8a60eb076fae5b5a7151309e1e4a57", 0xca}, {&(0x7f0000000240)="546ce862d45d949ff34c70e94ec7b0678e9aae32c93d8307002b92f767e37ec8e2ad2009f39e81baf8f986ff02b6c84d278f357040bff0b80728237080675306f30908ec2be1acefcfa1fc2f50695a841fdb5c2d019f5de8f8f146473db419106a9cb8bb5858746d9a0788e79d4ea257790eaa49274f171ea31eded4ef36b9df0c135ab537a6fccf58273b7ddd02d9f8a554ad37e4c3c2bca4595d09e96dd3dffb5877bf61c61adc8048f1901e9375115f92f6d8fdd64b5cde71b4eac1b83617c43bd33e882b5145886334ea68bcb7c1af64c7048a2c3659b7d032975584ca756c2e9f5139365b57a937c4e3c72a", 0xee}, {&(0x7f0000000340)="e85961", 0x3}, {&(0x7f0000000400)="2bb2f8061ef6ac2b91e704a1d25045bd0abdabb98961a2a6da1df94b0c262eb14347c0ebb6f2162b5fdb635e842fc7869aa861dd53bc92bca0e97885ecd597bf1684e67926f5db1b9f0bd8ba47d1ca525a97ce0848ec7434118b1f03b88d3e5ae7eb951d8c110320cb0796c0cc6dd0f27ce2e7cadaeddcee322163adaeecc2eb7b139648334c37e6fb92d15da973c5329ed55dbd060277a8b456d6c2fd3b4033dd99d7772f21475b58812cf8152e632c18fd19f76cfce03ee5da2cd288a42f718cf7f8c0ef8ed3c4c23de091d28f720e290098095401ae7d87d1307fd014e6d89311c86110182a92c8864d8c2647ac7748a451", 0xf3}, {&(0x7f0000000380)="9ff4454cfb6037e873c9e24af21ab0f764b9064a9e162b7519a31d3dbd5711a283e2ead5c9842abcdb31aa62d84ac003734afa333b19b563382e1c8e4c", 0x3d}, {&(0x7f0000000500)="43a181f32e75af06a6f643469bcee262dd2be54690ba6eca13af5aa448b0fed57f3b06a67b8615a1421b82f8b518609bb762897d7381d81621de4e345c7f6b53c16aaf65b6c8890af1d8f2a874de31be6ba5d0df426ca0", 0x57}, {&(0x7f0000000580)="e37499964aea15850d8bc8429d68637e39c6f9ce3e6e557e9bbe5ec3eedfe730037f9606c7997ccc7a33de59fab48b4b240a4361342016f0a98292e82ae0199d0c937fe05e3e312b3dd0e82ab822a790b147df6df88aba8d899b2be6b67610b631ba4c463e13f122381d348571e909681ca2015bb964117ef09dc4ba", 0x7c}, {&(0x7f0000000600)='PI+', 0x3}, {&(0x7f0000000640)="446c75199940761301c176818ff2a818c9d89aa626a9070d550d21ba0e96c2b37dba35fa5ffb40a4e19992e6ecc0e4d11a21b80eaf9280aee5", 0x39}], 0x9, &(0x7f0000000840)=[{0x10, 0x12, 0xff}, {0xe8, 0x114, 0x1, "2eb23f790242917f82c97fa807c765250e201272817f204512c43af850908b815485c79ac37b0c8f49652f42380c8401c9eec08b2605b491e6460f1367bbbe1507cf42bab2a36609bbc217502c3acf1c999c2218caba47d311f3abc7cba6082d0cd41e4e110f48110c2f40d4eccc95b0a2dbb32d96242dbe0f2e919d7e5446650f05e56f70326fe4605e2922f7aaee4f08327c67866e49a4641549b3d415226635996d5899a3f7591d6f4d5ff26f8f4742eb2b110d082fb3f92a1306850fea761a9846a9c7475f6cd7a5791bf42ea032826fa7dadd1082bc"}], 0xf8}, 0x20044084) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/101, 0x65) acct(&(0x7f0000000a00)='./file0\x00') mknod(&(0x7f0000000940)='./file0\x00', 0x10, 0x2) connect(0xffffffffffffffff, &(0x7f0000000980)=@ax25={{0x3, @null, 0x2}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) 17:07:15 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7472616e733d78656e2c726f6f74636f6e746578743d73746166665f092c009b59a92cda87f90f3f1efe7b4fe08e707bd0"]) 17:07:15 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xd}}, 0x34, 0x0) 17:07:15 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x2}}, 0x34, 0x0) [ 1419.888809][ T9442] 9pnet: Could not find request transport: xen 17:07:15 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans,xen,'}}]}}) 17:07:15 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x24}}, 0x34, 0x0) 17:07:16 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x281}}, 0x34, 0x0) 17:07:16 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x4}}, 0x34, 0x0) 17:07:16 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7472616e733d78656e2c726f6f74636f6e746578743d73746166665f092c009b59a92cda87f90f3f1efe7b4fe08e707bd0"]) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="7472616e733d78656e2c726f6f74636f6e746578743d73746166665f092c009b59a92cda87f90f3f1efe7b4fe08e707bd0"]) (async) 17:07:16 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x600}}, 0x34, 0x0) 17:07:16 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)=@nl=@unspec, 0x80, &(0x7f0000000780)=[{&(0x7f0000000140)="aea386098de1c97e50f4a46a597f8986a368f77e695640749d0ff3f6d111fb317910e5cdab711b7877fdfeb5304d2c80fedcb77438dda3ba979f16edc551b96c43fcd55ead41cb40fddc2dc1d610c49e275e42214a124a99ffc5a549707bd68e3298973a9386f349e3eb139d8ff1aa9b2ed214dcf62a110b5e0b838d36be43e18088e98bebec571b9f067a12a853591e20695711006b4a04bbaba0508a559453125082772fbdacf36c040f219828a5a742e8dd3e179b8ec4ca84ae8a60eb076fae5b5a7151309e1e4a57", 0xca}, {&(0x7f0000000240)="546ce862d45d949ff34c70e94ec7b0678e9aae32c93d8307002b92f767e37ec8e2ad2009f39e81baf8f986ff02b6c84d278f357040bff0b80728237080675306f30908ec2be1acefcfa1fc2f50695a841fdb5c2d019f5de8f8f146473db419106a9cb8bb5858746d9a0788e79d4ea257790eaa49274f171ea31eded4ef36b9df0c135ab537a6fccf58273b7ddd02d9f8a554ad37e4c3c2bca4595d09e96dd3dffb5877bf61c61adc8048f1901e9375115f92f6d8fdd64b5cde71b4eac1b83617c43bd33e882b5145886334ea68bcb7c1af64c7048a2c3659b7d032975584ca756c2e9f5139365b57a937c4e3c72a", 0xee}, {&(0x7f0000000340)="e85961", 0x3}, {&(0x7f0000000400)="2bb2f8061ef6ac2b91e704a1d25045bd0abdabb98961a2a6da1df94b0c262eb14347c0ebb6f2162b5fdb635e842fc7869aa861dd53bc92bca0e97885ecd597bf1684e67926f5db1b9f0bd8ba47d1ca525a97ce0848ec7434118b1f03b88d3e5ae7eb951d8c110320cb0796c0cc6dd0f27ce2e7cadaeddcee322163adaeecc2eb7b139648334c37e6fb92d15da973c5329ed55dbd060277a8b456d6c2fd3b4033dd99d7772f21475b58812cf8152e632c18fd19f76cfce03ee5da2cd288a42f718cf7f8c0ef8ed3c4c23de091d28f720e290098095401ae7d87d1307fd014e6d89311c86110182a92c8864d8c2647ac7748a451", 0xf3}, {&(0x7f0000000380)="9ff4454cfb6037e873c9e24af21ab0f764b9064a9e162b7519a31d3dbd5711a283e2ead5c9842abcdb31aa62d84ac003734afa333b19b563382e1c8e4c", 0x3d}, {&(0x7f0000000500)="43a181f32e75af06a6f643469bcee262dd2be54690ba6eca13af5aa448b0fed57f3b06a67b8615a1421b82f8b518609bb762897d7381d81621de4e345c7f6b53c16aaf65b6c8890af1d8f2a874de31be6ba5d0df426ca0", 0x57}, {&(0x7f0000000580)="e37499964aea15850d8bc8429d68637e39c6f9ce3e6e557e9bbe5ec3eedfe730037f9606c7997ccc7a33de59fab48b4b240a4361342016f0a98292e82ae0199d0c937fe05e3e312b3dd0e82ab822a790b147df6df88aba8d899b2be6b67610b631ba4c463e13f122381d348571e909681ca2015bb964117ef09dc4ba", 0x7c}, {&(0x7f0000000600)='PI+', 0x3}, {&(0x7f0000000640)="446c75199940761301c176818ff2a818c9d89aa626a9070d550d21ba0e96c2b37dba35fa5ffb40a4e19992e6ecc0e4d11a21b80eaf9280aee5", 0x39}], 0x9, &(0x7f0000000840)=[{0x10, 0x12, 0xff}, {0xe8, 0x114, 0x1, "2eb23f790242917f82c97fa807c765250e201272817f204512c43af850908b815485c79ac37b0c8f49652f42380c8401c9eec08b2605b491e6460f1367bbbe1507cf42bab2a36609bbc217502c3acf1c999c2218caba47d311f3abc7cba6082d0cd41e4e110f48110c2f40d4eccc95b0a2dbb32d96242dbe0f2e919d7e5446650f05e56f70326fe4605e2922f7aaee4f08327c67866e49a4641549b3d415226635996d5899a3f7591d6f4d5ff26f8f4742eb2b110d082fb3f92a1306850fea761a9846a9c7475f6cd7a5791bf42ea032826fa7dadd1082bc"}], 0xf8}, 0x20044084) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/101, 0x65) acct(&(0x7f0000000a00)='./file0\x00') r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000980)=@ax25={{0x3, @null, 0x2}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) [ 1419.934569][ T9462] SELinux: security_context_str_to_sid (staff_ ) failed with errno=-22 [ 1419.954246][ T9459] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:16 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x6}}, 0x34, 0x0) 17:07:16 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=\nen,'}}]}}) [ 1420.003715][ T9468] 9pnet: Could not find request transport: xen [ 1420.018823][ T9476] SELinux: security_context_str_to_sid (staff_ ) failed with errno=-22 [ 1420.028803][ T9478] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.038948][ T9482] SELinux: security_context_str_to_sid (staff_ ) failed with errno=-22 17:07:16 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xc00}}, 0x34, 0x0) 17:07:16 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)=@nl=@unspec, 0x80, &(0x7f0000000780)=[{&(0x7f0000000140)="aea386098de1c97e50f4a46a597f8986a368f77e695640749d0ff3f6d111fb317910e5cdab711b7877fdfeb5304d2c80fedcb77438dda3ba979f16edc551b96c43fcd55ead41cb40fddc2dc1d610c49e275e42214a124a99ffc5a549707bd68e3298973a9386f349e3eb139d8ff1aa9b2ed214dcf62a110b5e0b838d36be43e18088e98bebec571b9f067a12a853591e20695711006b4a04bbaba0508a559453125082772fbdacf36c040f219828a5a742e8dd3e179b8ec4ca84ae8a60eb076fae5b5a7151309e1e4a57", 0xca}, {&(0x7f0000000240)="546ce862d45d949ff34c70e94ec7b0678e9aae32c93d8307002b92f767e37ec8e2ad2009f39e81baf8f986ff02b6c84d278f357040bff0b80728237080675306f30908ec2be1acefcfa1fc2f50695a841fdb5c2d019f5de8f8f146473db419106a9cb8bb5858746d9a0788e79d4ea257790eaa49274f171ea31eded4ef36b9df0c135ab537a6fccf58273b7ddd02d9f8a554ad37e4c3c2bca4595d09e96dd3dffb5877bf61c61adc8048f1901e9375115f92f6d8fdd64b5cde71b4eac1b83617c43bd33e882b5145886334ea68bcb7c1af64c7048a2c3659b7d032975584ca756c2e9f5139365b57a937c4e3c72a", 0xee}, {&(0x7f0000000340)="e85961", 0x3}, {&(0x7f0000000400)="2bb2f8061ef6ac2b91e704a1d25045bd0abdabb98961a2a6da1df94b0c262eb14347c0ebb6f2162b5fdb635e842fc7869aa861dd53bc92bca0e97885ecd597bf1684e67926f5db1b9f0bd8ba47d1ca525a97ce0848ec7434118b1f03b88d3e5ae7eb951d8c110320cb0796c0cc6dd0f27ce2e7cadaeddcee322163adaeecc2eb7b139648334c37e6fb92d15da973c5329ed55dbd060277a8b456d6c2fd3b4033dd99d7772f21475b58812cf8152e632c18fd19f76cfce03ee5da2cd288a42f718cf7f8c0ef8ed3c4c23de091d28f720e290098095401ae7d87d1307fd014e6d89311c86110182a92c8864d8c2647ac7748a451", 0xf3}, {&(0x7f0000000380)="9ff4454cfb6037e873c9e24af21ab0f764b9064a9e162b7519a31d3dbd5711a283e2ead5c9842abcdb31aa62d84ac003734afa333b19b563382e1c8e4c", 0x3d}, {&(0x7f0000000500)="43a181f32e75af06a6f643469bcee262dd2be54690ba6eca13af5aa448b0fed57f3b06a67b8615a1421b82f8b518609bb762897d7381d81621de4e345c7f6b53c16aaf65b6c8890af1d8f2a874de31be6ba5d0df426ca0", 0x57}, {&(0x7f0000000580)="e37499964aea15850d8bc8429d68637e39c6f9ce3e6e557e9bbe5ec3eedfe730037f9606c7997ccc7a33de59fab48b4b240a4361342016f0a98292e82ae0199d0c937fe05e3e312b3dd0e82ab822a790b147df6df88aba8d899b2be6b67610b631ba4c463e13f122381d348571e909681ca2015bb964117ef09dc4ba", 0x7c}, {&(0x7f0000000600)='PI+', 0x3}, {&(0x7f0000000640)="446c75199940761301c176818ff2a818c9d89aa626a9070d550d21ba0e96c2b37dba35fa5ffb40a4e19992e6ecc0e4d11a21b80eaf9280aee5", 0x39}], 0x9, &(0x7f0000000840)=[{0x10, 0x12, 0xff}, {0xe8, 0x114, 0x1, "2eb23f790242917f82c97fa807c765250e201272817f204512c43af850908b815485c79ac37b0c8f49652f42380c8401c9eec08b2605b491e6460f1367bbbe1507cf42bab2a36609bbc217502c3acf1c999c2218caba47d311f3abc7cba6082d0cd41e4e110f48110c2f40d4eccc95b0a2dbb32d96242dbe0f2e919d7e5446650f05e56f70326fe4605e2922f7aaee4f08327c67866e49a4641549b3d415226635996d5899a3f7591d6f4d5ff26f8f4742eb2b110d082fb3f92a1306850fea761a9846a9c7475f6cd7a5791bf42ea032826fa7dadd1082bc"}], 0xf8}, 0x20044084) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) llistxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/101, 0x65) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000980)=@ax25={{0x3, @null, 0x2}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) 17:07:16 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) r0 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x80000000, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="ec0ebf2a481c741724c538faba3b5baf25dc081122d9401b4a7edd14fe5a04b6718acd40310bb60a0f90f6b807c988ec4e09007fdf8e87e28491b960aa568d6b78cedff1743bc0705d5a09e6e478e59711b23b1fbdeb13be7b0eac9312696490b84a257f0272a41764f6441b520de4dd4c877e5dc9514a2bdfc6d8d8cba322dbf541adf60eef05e40571151a1441109f95feb9b819662d617d11f000f0b4f3e69fcdafae53", 0xa5, 0x2}, {&(0x7f0000000140)="f377ddb60c7f0a0b240f74c78a87e684ccdebc62127e01fa3bd6b1d5eee33d7e3ef9f03208a59f967de0efd279ba1df0a9198957241992fcc1297ca6f928c35d1800daae7a90bcf0d2017c54a6cbe97a4a88e077891213871293286bc638bf505be1c942ec335c980ca434210e459e54b41d825ea51969144e11befd2351f8949e4654e29686d6df9f3cc9c912fa3b3b5514869236a71a0a491fd05be5ec164b2fe5e2ea0288abbddef63e009339c9cd0256678cb497f4", 0xb7, 0x9}, {&(0x7f0000000200)="8ba596ecfe82312817990f", 0xb, 0x7}], 0x14430, &(0x7f00000002c0)={[{'[!+@\\)\xc9['}, {',/%'}, {'rootcontext'}, {'9p\x00'}, {}, {'rootcontext'}], [{@uid_lt}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) fchownat(r0, &(0x7f0000000340)='./file0\x00', 0xee01, 0xffffffffffffffff, 0x100) [ 1420.065720][ T9481] 9pnet: Could not find request transport: xen 17:07:16 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=\"en,'}}]}}) 17:07:16 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x8}}, 0x34, 0x0) 17:07:16 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xd00}}, 0x34, 0x0) 17:07:16 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=,en,'}}]}}) 17:07:16 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xc}}, 0x34, 0x0) 17:07:16 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)=@nl=@unspec, 0x80, &(0x7f0000000780)=[{&(0x7f0000000140)="aea386098de1c97e50f4a46a597f8986a368f77e695640749d0ff3f6d111fb317910e5cdab711b7877fdfeb5304d2c80fedcb77438dda3ba979f16edc551b96c43fcd55ead41cb40fddc2dc1d610c49e275e42214a124a99ffc5a549707bd68e3298973a9386f349e3eb139d8ff1aa9b2ed214dcf62a110b5e0b838d36be43e18088e98bebec571b9f067a12a853591e20695711006b4a04bbaba0508a559453125082772fbdacf36c040f219828a5a742e8dd3e179b8ec4ca84ae8a60eb076fae5b5a7151309e1e4a57", 0xca}, {&(0x7f0000000240)="546ce862d45d949ff34c70e94ec7b0678e9aae32c93d8307002b92f767e37ec8e2ad2009f39e81baf8f986ff02b6c84d278f357040bff0b80728237080675306f30908ec2be1acefcfa1fc2f50695a841fdb5c2d019f5de8f8f146473db419106a9cb8bb5858746d9a0788e79d4ea257790eaa49274f171ea31eded4ef36b9df0c135ab537a6fccf58273b7ddd02d9f8a554ad37e4c3c2bca4595d09e96dd3dffb5877bf61c61adc8048f1901e9375115f92f6d8fdd64b5cde71b4eac1b83617c43bd33e882b5145886334ea68bcb7c1af64c7048a2c3659b7d032975584ca756c2e9f5139365b57a937c4e3c72a", 0xee}, {&(0x7f0000000340)="e85961", 0x3}, {&(0x7f0000000400)="2bb2f8061ef6ac2b91e704a1d25045bd0abdabb98961a2a6da1df94b0c262eb14347c0ebb6f2162b5fdb635e842fc7869aa861dd53bc92bca0e97885ecd597bf1684e67926f5db1b9f0bd8ba47d1ca525a97ce0848ec7434118b1f03b88d3e5ae7eb951d8c110320cb0796c0cc6dd0f27ce2e7cadaeddcee322163adaeecc2eb7b139648334c37e6fb92d15da973c5329ed55dbd060277a8b456d6c2fd3b4033dd99d7772f21475b58812cf8152e632c18fd19f76cfce03ee5da2cd288a42f718cf7f8c0ef8ed3c4c23de091d28f720e290098095401ae7d87d1307fd014e6d89311c86110182a92c8864d8c2647ac7748a451", 0xf3}, {&(0x7f0000000380)="9ff4454cfb6037e873c9e24af21ab0f764b9064a9e162b7519a31d3dbd5711a283e2ead5c9842abcdb31aa62d84ac003734afa333b19b563382e1c8e4c", 0x3d}, {&(0x7f0000000500)="43a181f32e75af06a6f643469bcee262dd2be54690ba6eca13af5aa448b0fed57f3b06a67b8615a1421b82f8b518609bb762897d7381d81621de4e345c7f6b53c16aaf65b6c8890af1d8f2a874de31be6ba5d0df426ca0", 0x57}, {&(0x7f0000000580)="e37499964aea15850d8bc8429d68637e39c6f9ce3e6e557e9bbe5ec3eedfe730037f9606c7997ccc7a33de59fab48b4b240a4361342016f0a98292e82ae0199d0c937fe05e3e312b3dd0e82ab822a790b147df6df88aba8d899b2be6b67610b631ba4c463e13f122381d348571e909681ca2015bb964117ef09dc4ba", 0x7c}, {&(0x7f0000000600)='PI+', 0x3}, {&(0x7f0000000640)="446c75199940761301c176818ff2a818c9d89aa626a9070d550d21ba0e96c2b37dba35fa5ffb40a4e19992e6ecc0e4d11a21b80eaf9280aee5", 0x39}], 0x9, &(0x7f0000000840)=[{0x10, 0x12, 0xff}, {0xe8, 0x114, 0x1, "2eb23f790242917f82c97fa807c765250e201272817f204512c43af850908b815485c79ac37b0c8f49652f42380c8401c9eec08b2605b491e6460f1367bbbe1507cf42bab2a36609bbc217502c3acf1c999c2218caba47d311f3abc7cba6082d0cd41e4e110f48110c2f40d4eccc95b0a2dbb32d96242dbe0f2e919d7e5446650f05e56f70326fe4605e2922f7aaee4f08327c67866e49a4641549b3d415226635996d5899a3f7591d6f4d5ff26f8f4742eb2b110d082fb3f92a1306850fea761a9846a9c7475f6cd7a5791bf42ea032826fa7dadd1082bc"}], 0xf8}, 0x20044084) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000980)=@ax25={{0x3, @null, 0x2}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) 17:07:16 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x1394}}, 0x34, 0x0) [ 1420.113566][ T9489] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.134315][ T9491] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.147969][ T9494] 9pnet: Could not find request transport: xen [ 1420.156991][ T9489] loop0: detected capacity change from 0 to 264192 17:07:16 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xd}}, 0x34, 0x0) 17:07:16 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x2000}}, 0x34, 0x0) 17:07:16 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async, rerun: 32) r0 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x80000000, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="ec0ebf2a481c741724c538faba3b5baf25dc081122d9401b4a7edd14fe5a04b6718acd40310bb60a0f90f6b807c988ec4e09007fdf8e87e28491b960aa568d6b78cedff1743bc0705d5a09e6e478e59711b23b1fbdeb13be7b0eac9312696490b84a257f0272a41764f6441b520de4dd4c877e5dc9514a2bdfc6d8d8cba322dbf541adf60eef05e40571151a1441109f95feb9b819662d617d11f000f0b4f3e69fcdafae53", 0xa5, 0x2}, {&(0x7f0000000140)="f377ddb60c7f0a0b240f74c78a87e684ccdebc62127e01fa3bd6b1d5eee33d7e3ef9f03208a59f967de0efd279ba1df0a9198957241992fcc1297ca6f928c35d1800daae7a90bcf0d2017c54a6cbe97a4a88e077891213871293286bc638bf505be1c942ec335c980ca434210e459e54b41d825ea51969144e11befd2351f8949e4654e29686d6df9f3cc9c912fa3b3b5514869236a71a0a491fd05be5ec164b2fe5e2ea0288abbddef63e009339c9cd0256678cb497f4", 0xb7, 0x9}, {&(0x7f0000000200)="8ba596ecfe82312817990f", 0xb, 0x7}], 0x14430, &(0x7f00000002c0)={[{'[!+@\\)\xc9['}, {',/%'}, {'rootcontext'}, {'9p\x00'}, {}, {'rootcontext'}], [{@uid_lt}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) (rerun: 32) fchownat(r0, &(0x7f0000000340)='./file0\x00', 0xee01, 0xffffffffffffffff, 0x100) [ 1420.198721][ T9501] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.237021][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:16 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f00000000c0)=@nl=@unspec, 0x80, &(0x7f0000000780)=[{&(0x7f0000000140)="aea386098de1c97e50f4a46a597f8986a368f77e695640749d0ff3f6d111fb317910e5cdab711b7877fdfeb5304d2c80fedcb77438dda3ba979f16edc551b96c43fcd55ead41cb40fddc2dc1d610c49e275e42214a124a99ffc5a549707bd68e3298973a9386f349e3eb139d8ff1aa9b2ed214dcf62a110b5e0b838d36be43e18088e98bebec571b9f067a12a853591e20695711006b4a04bbaba0508a559453125082772fbdacf36c040f219828a5a742e8dd3e179b8ec4ca84ae8a60eb076fae5b5a7151309e1e4a57", 0xca}, {&(0x7f0000000240)="546ce862d45d949ff34c70e94ec7b0678e9aae32c93d8307002b92f767e37ec8e2ad2009f39e81baf8f986ff02b6c84d278f357040bff0b80728237080675306f30908ec2be1acefcfa1fc2f50695a841fdb5c2d019f5de8f8f146473db419106a9cb8bb5858746d9a0788e79d4ea257790eaa49274f171ea31eded4ef36b9df0c135ab537a6fccf58273b7ddd02d9f8a554ad37e4c3c2bca4595d09e96dd3dffb5877bf61c61adc8048f1901e9375115f92f6d8fdd64b5cde71b4eac1b83617c43bd33e882b5145886334ea68bcb7c1af64c7048a2c3659b7d032975584ca756c2e9f5139365b57a937c4e3c72a", 0xee}, {&(0x7f0000000340)="e85961", 0x3}, {&(0x7f0000000400)="2bb2f8061ef6ac2b91e704a1d25045bd0abdabb98961a2a6da1df94b0c262eb14347c0ebb6f2162b5fdb635e842fc7869aa861dd53bc92bca0e97885ecd597bf1684e67926f5db1b9f0bd8ba47d1ca525a97ce0848ec7434118b1f03b88d3e5ae7eb951d8c110320cb0796c0cc6dd0f27ce2e7cadaeddcee322163adaeecc2eb7b139648334c37e6fb92d15da973c5329ed55dbd060277a8b456d6c2fd3b4033dd99d7772f21475b58812cf8152e632c18fd19f76cfce03ee5da2cd288a42f718cf7f8c0ef8ed3c4c23de091d28f720e290098095401ae7d87d1307fd014e6d89311c86110182a92c8864d8c2647ac7748a451", 0xf3}, {&(0x7f0000000380)="9ff4454cfb6037e873c9e24af21ab0f764b9064a9e162b7519a31d3dbd5711a283e2ead5c9842abcdb31aa62d84ac003734afa333b19b563382e1c8e4c", 0x3d}, {&(0x7f0000000500)="43a181f32e75af06a6f643469bcee262dd2be54690ba6eca13af5aa448b0fed57f3b06a67b8615a1421b82f8b518609bb762897d7381d81621de4e345c7f6b53c16aaf65b6c8890af1d8f2a874de31be6ba5d0df426ca0", 0x57}, {&(0x7f0000000580)="e37499964aea15850d8bc8429d68637e39c6f9ce3e6e557e9bbe5ec3eedfe730037f9606c7997ccc7a33de59fab48b4b240a4361342016f0a98292e82ae0199d0c937fe05e3e312b3dd0e82ab822a790b147df6df88aba8d899b2be6b67610b631ba4c463e13f122381d348571e909681ca2015bb964117ef09dc4ba", 0x7c}, {&(0x7f0000000600)='PI+', 0x3}, {&(0x7f0000000640)="446c75199940761301c176818ff2a818c9d89aa626a9070d550d21ba0e96c2b37dba35fa5ffb40a4e19992e6ecc0e4d11a21b80eaf9280aee5", 0x39}], 0x9, &(0x7f0000000840)=[{0x10, 0x12, 0xff}, {0xe8, 0x114, 0x1, "2eb23f790242917f82c97fa807c765250e201272817f204512c43af850908b815485c79ac37b0c8f49652f42380c8401c9eec08b2605b491e6460f1367bbbe1507cf42bab2a36609bbc217502c3acf1c999c2218caba47d311f3abc7cba6082d0cd41e4e110f48110c2f40d4eccc95b0a2dbb32d96242dbe0f2e919d7e5446650f05e56f70326fe4605e2922f7aaee4f08327c67866e49a4641549b3d415226635996d5899a3f7591d6f4d5ff26f8f4742eb2b110d082fb3f92a1306850fea761a9846a9c7475f6cd7a5791bf42ea032826fa7dadd1082bc"}], 0xf8}, 0x20044084) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000980)=@ax25={{0x3, @null, 0x2}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) 17:07:16 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x2400}}, 0x34, 0x0) 17:07:16 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x24}}, 0x34, 0x0) [ 1420.245102][ T9506] 9pnet: Could not find request transport: xen 17:07:16 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=x\nn,'}}]}}) 17:07:16 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x3f00}}, 0x34, 0x0) 17:07:16 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000980)=@ax25={{0x3, @null, 0x2}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) 17:07:16 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x281}}, 0x34, 0x0) 17:07:16 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x4000}}, 0x34, 0x0) [ 1420.274157][ T9513] loop0: detected capacity change from 0 to 264192 [ 1420.299479][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:16 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x600}}, 0x34, 0x0) [ 1420.337225][ T9513] loop0: detected capacity change from 0 to 264192 [ 1420.343567][ T2635] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1420.353026][ T2635] Buffer I/O error on dev loop0, logical block 0, async page read [ 1420.366983][ T9521] 9pnet: Could not find request transport: xen [ 1420.370332][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:16 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=x\"n,'}}]}}) 17:07:16 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000980)=@ax25={{0x3, @null, 0x2}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) [ 1420.401929][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.421044][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.458152][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.466527][ T9536] 9pnet: Could not find request transport: xen [ 1420.475084][ T9513] loop0: detected capacity change from 0 to 264192 [ 1420.476339][ T1437] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1420.482148][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.490796][ T1437] Buffer I/O error on dev loop0, logical block 0, async page read [ 1420.509120][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.517809][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.528958][ T9513] loop0: detected capacity change from 0 to 264192 [ 1420.536447][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.545496][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.555571][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.564701][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.574634][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.583795][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.594465][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.604326][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.615390][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.624827][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.635014][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.645460][ T9513] loop0: detected capacity change from 0 to 264192 [ 1420.652117][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.661403][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.670294][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.681159][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.690126][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.699064][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.709729][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.718954][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.729851][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.739041][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.749309][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.758527][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.768530][ T9512] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1420.779240][ T9513] loop0: detected capacity change from 0 to 264192 [ 1420.784049][ T2635] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1420.795048][ T2635] Buffer I/O error on dev loop0, logical block 0, async page read 17:07:16 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (rerun: 32) r0 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x80000000, 0x3, &(0x7f0000000240)=[{&(0x7f0000000080)="ec0ebf2a481c741724c538faba3b5baf25dc081122d9401b4a7edd14fe5a04b6718acd40310bb60a0f90f6b807c988ec4e09007fdf8e87e28491b960aa568d6b78cedff1743bc0705d5a09e6e478e59711b23b1fbdeb13be7b0eac9312696490b84a257f0272a41764f6441b520de4dd4c877e5dc9514a2bdfc6d8d8cba322dbf541adf60eef05e40571151a1441109f95feb9b819662d617d11f000f0b4f3e69fcdafae53", 0xa5, 0x2}, {&(0x7f0000000140)="f377ddb60c7f0a0b240f74c78a87e684ccdebc62127e01fa3bd6b1d5eee33d7e3ef9f03208a59f967de0efd279ba1df0a9198957241992fcc1297ca6f928c35d1800daae7a90bcf0d2017c54a6cbe97a4a88e077891213871293286bc638bf505be1c942ec335c980ca434210e459e54b41d825ea51969144e11befd2351f8949e4654e29686d6df9f3cc9c912fa3b3b5514869236a71a0a491fd05be5ec164b2fe5e2ea0288abbddef63e009339c9cd0256678cb497f4", 0xb7, 0x9}, {&(0x7f0000000200)="8ba596ecfe82312817990f", 0xb, 0x7}], 0x14430, &(0x7f00000002c0)={[{'[!+@\\)\xc9['}, {',/%'}, {'rootcontext'}, {'9p\x00'}, {}, {'rootcontext'}], [{@uid_lt}, {@uid_eq={'uid', 0x3d, 0xee00}}]}) fchownat(r0, &(0x7f0000000340)='./file0\x00', 0xee01, 0xffffffffffffffff, 0x100) 17:07:16 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x8100}}, 0x34, 0x0) 17:07:16 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xc00}}, 0x34, 0x0) 17:07:16 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000980)=@ax25={{0x3, @null, 0x2}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) 17:07:16 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=x%n,'}}]}}) 17:07:16 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000980)=@ax25={{0x3, @null, 0x2}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) [ 1420.809941][ T2635] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1420.819177][ T2635] Buffer I/O error on dev loop0, logical block 0, async page read [ 1420.827126][ T2635] loop0: unable to read partition table 17:07:16 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x8102}}, 0x34, 0x0) 17:07:16 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xd00}}, 0x34, 0x0) 17:07:16 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x9413}}, 0x34, 0x0) 17:07:16 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=x,n,'}}]}}) 17:07:16 executing program 4: socket$inet_udp(0x2, 0x2, 0x0) connect(0xffffffffffffffff, &(0x7f0000000980)=@ax25={{0x3, @null, 0x2}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) [ 1420.869076][ T9551] loop0: detected capacity change from 0 to 264192 [ 1420.895168][ T9543] 9pnet: Could not find request transport: xen 17:07:17 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x1361}}, 0x34, 0x0) 17:07:17 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, 0x0, 0x0) 17:07:17 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xff00}}, 0x34, 0x0) 17:07:17 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x2000}}, 0x34, 0x0) 17:07:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, 0x0, 0x0) 17:07:17 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xe\n,'}}]}}) 17:07:17 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x2400}}, 0x34, 0x0) 17:07:17 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xff01}}, 0x34, 0x0) [ 1420.965146][ T9561] 9pnet: Could not find request transport: xen [ 1420.999603][ T9571] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, 0x0, 0x0) 17:07:17 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x3f00}}, 0x34, 0x0) 17:07:17 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) connect(r0, &(0x7f0000000980)=@ax25={{0x3, @null}, [@default, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @null, @default, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}]}, 0x80) 17:07:17 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async) 17:07:17 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x40000}}, 0x34, 0x0) 17:07:17 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xe\",'}}]}}) 17:07:17 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x4000}}, 0x34, 0x0) [ 1421.070292][ T9579] 9pnet: Could not find request transport: xen [ 1421.087963][ T9588] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:17 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x400000}}, 0x34, 0x0) 17:07:17 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x2000}}, 0x34, 0x0) 17:07:17 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) openat$misdntimer(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:17 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x6113}}, 0x34, 0x0) 17:07:17 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x2000}}, 0x34, 0x0) [ 1421.121499][ T9596] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1421.156558][ T9598] 9pnet: Could not find request transport: xen 17:07:17 executing program 0: r0 = epoll_create1(0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000140)={'erspan0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="69705f767469300000000000000000799284160a2e5897b20d00f22be92417e85aaf6659e86875a1c53639741e0b6b68611af95f0a6449e45a01021ee39d6a8c77f106559ad0e9c73cd4466db66dfc447e0daaeff38be2a847a1548d7f8381f7633fa975adacf9fe0a52068bbdde2810c049", @ANYRES32=0x0, @ANYBLOB="070000200000008000000000401f00c000660000f12f9078ffffffffac141440865d0000000306117a8968b995470338a3b2e5da406446010fbc84cf1acec98a53816cd21c4606118c72231a66264197468ef2744e87ef070df539fdc8b9a31e551c5ea301105674af2044bf35d8bcfdd8f11de901096a0a65be2b7b19864c00000003020ed1f09f7155d50f16f932e820000ee4d2fa4d64e9fb507cabf75d0102060e155fe3f3392d201b008ed4ec060fc61b1886e9c71d2a401740826907020709895dab95253c57000000"]}) write$rfkill(r1, &(0x7f0000000180)={0x100, 0x1, 0x1, 0x0, 0x1}, 0x8) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:17 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xe%,'}}]}}) 17:07:17 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x800000}}, 0x34, 0x0) 17:07:17 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x8100}}, 0x34, 0x0) 17:07:17 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0xf6ffffff}, [{}]}, 0x34, 0x0) 17:07:17 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x1000000}}, 0x34, 0x0) 17:07:17 executing program 0: r0 = epoll_create1(0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000140)={'erspan0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="69705f767469300000000000000000799284160a2e5897b20d00f22be92417e85aaf6659e86875a1c53639741e0b6b68611af95f0a6449e45a01021ee39d6a8c77f106559ad0e9c73cd4466db66dfc447e0daaeff38be2a847a1548d7f8381f7633fa975adacf9fe0a52068bbdde2810c049", @ANYRES32=0x0, @ANYBLOB="070000200000008000000000401f00c000660000f12f9078ffffffffac141440865d0000000306117a8968b995470338a3b2e5da406446010fbc84cf1acec98a53816cd21c4606118c72231a66264197468ef2744e87ef070df539fdc8b9a31e551c5ea301105674af2044bf35d8bcfdd8f11de901096a0a65be2b7b19864c00000003020ed1f09f7155d50f16f932e820000ee4d2fa4d64e9fb507cabf75d0102060e155fe3f3392d201b008ed4ec060fc61b1886e9c71d2a401740826907020709895dab95253c57000000"]}) (async) write$rfkill(r1, &(0x7f0000000180)={0x100, 0x1, 0x1, 0x0, 0x1}, 0x8) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:17 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000000}, [{}]}, 0x34, 0x0) [ 1421.233116][ T9617] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1421.255876][ T9615] 9pnet: Could not find request transport: xen 17:07:17 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xe,,'}}]}}) 17:07:17 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x2000000}}, 0x34, 0x0) 17:07:17 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x8102}}, 0x34, 0x0) 17:07:17 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xff00}}, 0x34, 0x0) 17:07:17 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000000}, [{}]}, 0x34, 0x0) [ 1421.291216][ T9629] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:17 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xff01}}, 0x34, 0x0) 17:07:17 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000000}, [{}]}, 0x34, 0x0) 17:07:17 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x4000000}}, 0x34, 0x0) 17:07:17 executing program 0: r0 = epoll_create1(0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000140)={'erspan0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="69705f767469300000000000000000799284160a2e5897b20d00f22be92417e85aaf6659e86875a1c53639741e0b6b68611af95f0a6449e45a01021ee39d6a8c77f106559ad0e9c73cd4466db66dfc447e0daaeff38be2a847a1548d7f8381f7633fa975adacf9fe0a52068bbdde2810c049", @ANYRES32=0x0, @ANYBLOB="070000200000008000000000401f00c000660000f12f9078ffffffffac141440865d0000000306117a8968b995470338a3b2e5da406446010fbc84cf1acec98a53816cd21c4606118c72231a66264197468ef2744e87ef070df539fdc8b9a31e551c5ea301105674af2044bf35d8bcfdd8f11de901096a0a65be2b7b19864c00000003020ed1f09f7155d50f16f932e820000ee4d2fa4d64e9fb507cabf75d0102060e155fe3f3392d201b008ed4ec060fc61b1886e9c71d2a401740826907020709895dab95253c57000000"]}) write$rfkill(r1, &(0x7f0000000180)={0x100, 0x1, 0x1, 0x0, 0x1}, 0x8) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) epoll_create1(0x0) (async) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (async) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r1, 0x89f8, &(0x7f0000000140)={'erspan0\x00', &(0x7f00000001c0)=ANY=[@ANYBLOB="69705f767469300000000000000000799284160a2e5897b20d00f22be92417e85aaf6659e86875a1c53639741e0b6b68611af95f0a6449e45a01021ee39d6a8c77f106559ad0e9c73cd4466db66dfc447e0daaeff38be2a847a1548d7f8381f7633fa975adacf9fe0a52068bbdde2810c049", @ANYRES32=0x0, @ANYBLOB="070000200000008000000000401f00c000660000f12f9078ffffffffac141440865d0000000306117a8968b995470338a3b2e5da406446010fbc84cf1acec98a53816cd21c4606118c72231a66264197468ef2744e87ef070df539fdc8b9a31e551c5ea301105674af2044bf35d8bcfdd8f11de901096a0a65be2b7b19864c00000003020ed1f09f7155d50f16f932e820000ee4d2fa4d64e9fb507cabf75d0102060e155fe3f3392d201b008ed4ec060fc61b1886e9c71d2a401740826907020709895dab95253c57000000"]}) (async) write$rfkill(r1, &(0x7f0000000180)={0x100, 0x1, 0x1, 0x0, 0x1}, 0x8) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async) 17:07:17 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen\"'}}]}}) 17:07:17 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000000}, [{}]}, 0x34, 0x0) 17:07:17 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x40000}}, 0x34, 0x0) [ 1421.338899][ T9633] 9pnet: Could not find request transport: xen 17:07:17 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x6000000}}, 0x34, 0x0) 17:07:17 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x400000}}, 0x34, 0x0) 17:07:17 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000000}, [{}]}, 0x34, 0x0) 17:07:17 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x8000000}}, 0x34, 0x0) [ 1421.402514][ T9649] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1421.436624][ T9651] 9pnet: Could not find request transport: xen 17:07:17 executing program 0: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000640), &(0x7f0000000680)='./file0\x00', 0x2, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="b33689f471b61e57f75a9373316884df28fa2e310b557b6e6be35f8399645c704695f7f8957443fe2b961e9d09d2179ea94d0908b43c23755d46f618603c0a42d3e176cfd119bacb28ea1165909b4e4513cbefa52c0305cc0fbcf0b258676d91f073cd5054c66b89e400ecae8a3640c957acad64d56d644d4b4b00296e7a03cf46aa3c43f8dcd5bcdcfd1401d32c9daebea20c5b849ddc4b564510836f86d6606bca2d2182d67d6b3c353b5ed0a19abad5282d76d0111068f1f2558a8626d22ff6f73a53a3167ef8df431b2d616aac6a4556c03f82575cf493e897f1d1a7d9c297c8ccea", 0xe4, 0x1}, {&(0x7f0000000880)="d2cb36e99a5a2e713ff0aeff6fc97bc5e73c57d204bc993cdb3bd2ca60947e14372c534f66a3e13fcedf5e91c9b5f4756681efce105c8eae0182b1a388b827d771e96c1c9bc21864e47f2be6f791e97ffffc0c2b832e66a26e3a7eb19b6fb0d6a579eb588ebf9a0ad30636e52b3a83321f3a096a5f0cce357feb61fac92027ecf3f5ce4ef8249f24", 0x88, 0x200}, {&(0x7f0000000940)="d3238af302769aaeb3045ef4d66767be26065ef1ba33d30e5c6e77404ac0964c106fcabcf26ad1050e4a21da5de18db7a8060d2706ed726fca06d756ad8822e7e19bd722218eee00", 0x48, 0x40}], 0x200004, &(0x7f0000000a40)={[{'trans=xen,'}, {'measure'}], [{@pcr={'pcr', 0x3d, 0x18}}, {@obj_user={'obj_user', 0x3d, '@\\{--,#})\xf2'}}]}) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1000) r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) accept$unix(r1, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) getresuid(&(0x7f0000000500), &(0x7f0000000540)=0x0, &(0x7f0000000580)) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="dab145b2d3ca2b442c9a5466", 0xc, 0x7}, {&(0x7f00000002c0)="69a87f72ba9c6bee5c67569f737000d47a7815a1f1c82d523d20a4050a91c746bc8d47debac79b170edb6f41f8fd084bdcd8f6af9056eeb21f0d5e2d767d7a04314a23ab55ac96d7be2e0844ebecdbaa5dfc1ad30ebe658b7d65b3d351a54d0d4abcf412", 0x64, 0x4}, {&(0x7f0000000400)="ec879671b393bee9e15f02586b8fbd546531ca7477f95290ae618b1b847cc6285d3664cb706f5b480ed579cf11c6bb6a8f4534f6c4541730024276e78a92afb11a42fb0cb281327d5b259854b3381eed004e2ef090891b1bbefc98e3edebed29d219769b6b8ee499380e9c9e1e43ab2ef8b2c684fe128a47a624968750a582a741a88300d9424becac82ca358767b9c6d3f023d3e42dd33ea68da4b0f5194bc5009f06b461b4e55477cfde17c99e0143f81a68156974c4972a01d4bb677f5d3ba594de7dff0e1fdb3d02f38db730", 0xce, 0x9}], 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt={'euid>', r2}}, {@measure}]}) 17:07:17 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x800000}}, 0x34, 0x0) 17:07:17 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xc000000}}, 0x34, 0x0) 17:07:17 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000000}, [{}]}, 0x34, 0x0) 17:07:17 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen0'}}]}}) 17:07:17 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x1000000}}, 0x34, 0x0) 17:07:17 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xd000000}}, 0x34, 0x0) 17:07:17 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000000}, [{}]}, 0x34, 0x0) [ 1421.519510][ T9672] loop0: detected capacity change from 0 to 2 [ 1421.537499][ T9672] nfs: Unknown parameter 'trans' 17:07:17 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000000}, [{}]}, 0x34, 0x0) 17:07:17 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x2000000}}, 0x34, 0x0) 17:07:17 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x20000000}}, 0x34, 0x0) 17:07:17 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}, 0x22}]}}) [ 1421.566230][ T9680] 9pnet: Could not find request transport: xen [ 1421.573149][ T9672] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1421.605619][ T9672] tmpfs: Bad value for 'nr_inodes' 17:07:17 executing program 0: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000640), &(0x7f0000000680)='./file0\x00', 0x2, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="b33689f471b61e57f75a9373316884df28fa2e310b557b6e6be35f8399645c704695f7f8957443fe2b961e9d09d2179ea94d0908b43c23755d46f618603c0a42d3e176cfd119bacb28ea1165909b4e4513cbefa52c0305cc0fbcf0b258676d91f073cd5054c66b89e400ecae8a3640c957acad64d56d644d4b4b00296e7a03cf46aa3c43f8dcd5bcdcfd1401d32c9daebea20c5b849ddc4b564510836f86d6606bca2d2182d67d6b3c353b5ed0a19abad5282d76d0111068f1f2558a8626d22ff6f73a53a3167ef8df431b2d616aac6a4556c03f82575cf493e897f1d1a7d9c297c8ccea", 0xe4, 0x1}, {&(0x7f0000000880)="d2cb36e99a5a2e713ff0aeff6fc97bc5e73c57d204bc993cdb3bd2ca60947e14372c534f66a3e13fcedf5e91c9b5f4756681efce105c8eae0182b1a388b827d771e96c1c9bc21864e47f2be6f791e97ffffc0c2b832e66a26e3a7eb19b6fb0d6a579eb588ebf9a0ad30636e52b3a83321f3a096a5f0cce357feb61fac92027ecf3f5ce4ef8249f24", 0x88, 0x200}, {&(0x7f0000000940)="d3238af302769aaeb3045ef4d66767be26065ef1ba33d30e5c6e77404ac0964c106fcabcf26ad1050e4a21da5de18db7a8060d2706ed726fca06d756ad8822e7e19bd722218eee00", 0x48, 0x40}], 0x200004, &(0x7f0000000a40)={[{'trans=xen,'}, {'measure'}], [{@pcr={'pcr', 0x3d, 0x18}}, {@obj_user={'obj_user', 0x3d, '@\\{--,#})\xf2'}}]}) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1000) r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) accept$unix(r1, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) getresuid(&(0x7f0000000500), &(0x7f0000000540)=0x0, &(0x7f0000000580)) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="dab145b2d3ca2b442c9a5466", 0xc, 0x7}, {&(0x7f00000002c0)="69a87f72ba9c6bee5c67569f737000d47a7815a1f1c82d523d20a4050a91c746bc8d47debac79b170edb6f41f8fd084bdcd8f6af9056eeb21f0d5e2d767d7a04314a23ab55ac96d7be2e0844ebecdbaa5dfc1ad30ebe658b7d65b3d351a54d0d4abcf412", 0x64, 0x4}, {&(0x7f0000000400)="ec879671b393bee9e15f02586b8fbd546531ca7477f95290ae618b1b847cc6285d3664cb706f5b480ed579cf11c6bb6a8f4534f6c4541730024276e78a92afb11a42fb0cb281327d5b259854b3381eed004e2ef090891b1bbefc98e3edebed29d219769b6b8ee499380e9c9e1e43ab2ef8b2c684fe128a47a624968750a582a741a88300d9424becac82ca358767b9c6d3f023d3e42dd33ea68da4b0f5194bc5009f06b461b4e55477cfde17c99e0143f81a68156974c4972a01d4bb677f5d3ba594de7dff0e1fdb3d02f38db730", 0xce, 0x9}], 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt={'euid>', r2}}, {@measure}]}) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_mount_image$nfs(&(0x7f0000000640), &(0x7f0000000680)='./file0\x00', 0x2, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="b33689f471b61e57f75a9373316884df28fa2e310b557b6e6be35f8399645c704695f7f8957443fe2b961e9d09d2179ea94d0908b43c23755d46f618603c0a42d3e176cfd119bacb28ea1165909b4e4513cbefa52c0305cc0fbcf0b258676d91f073cd5054c66b89e400ecae8a3640c957acad64d56d644d4b4b00296e7a03cf46aa3c43f8dcd5bcdcfd1401d32c9daebea20c5b849ddc4b564510836f86d6606bca2d2182d67d6b3c353b5ed0a19abad5282d76d0111068f1f2558a8626d22ff6f73a53a3167ef8df431b2d616aac6a4556c03f82575cf493e897f1d1a7d9c297c8ccea", 0xe4, 0x1}, {&(0x7f0000000880)="d2cb36e99a5a2e713ff0aeff6fc97bc5e73c57d204bc993cdb3bd2ca60947e14372c534f66a3e13fcedf5e91c9b5f4756681efce105c8eae0182b1a388b827d771e96c1c9bc21864e47f2be6f791e97ffffc0c2b832e66a26e3a7eb19b6fb0d6a579eb588ebf9a0ad30636e52b3a83321f3a096a5f0cce357feb61fac92027ecf3f5ce4ef8249f24", 0x88, 0x200}, {&(0x7f0000000940)="d3238af302769aaeb3045ef4d66767be26065ef1ba33d30e5c6e77404ac0964c106fcabcf26ad1050e4a21da5de18db7a8060d2706ed726fca06d756ad8822e7e19bd722218eee00", 0x48, 0x40}], 0x200004, &(0x7f0000000a40)={[{'trans=xen,'}, {'measure'}], [{@pcr={'pcr', 0x3d, 0x18}}, {@obj_user={'obj_user', 0x3d, '@\\{--,#})\xf2'}}]}) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1000) (async) accept$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) (async) accept$unix(r1, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) (async) getresuid(&(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580)) (async) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="dab145b2d3ca2b442c9a5466", 0xc, 0x7}, {&(0x7f00000002c0)="69a87f72ba9c6bee5c67569f737000d47a7815a1f1c82d523d20a4050a91c746bc8d47debac79b170edb6f41f8fd084bdcd8f6af9056eeb21f0d5e2d767d7a04314a23ab55ac96d7be2e0844ebecdbaa5dfc1ad30ebe658b7d65b3d351a54d0d4abcf412", 0x64, 0x4}, {&(0x7f0000000400)="ec879671b393bee9e15f02586b8fbd546531ca7477f95290ae618b1b847cc6285d3664cb706f5b480ed579cf11c6bb6a8f4534f6c4541730024276e78a92afb11a42fb0cb281327d5b259854b3381eed004e2ef090891b1bbefc98e3edebed29d219769b6b8ee499380e9c9e1e43ab2ef8b2c684fe128a47a624968750a582a741a88300d9424becac82ca358767b9c6d3f023d3e42dd33ea68da4b0f5194bc5009f06b461b4e55477cfde17c99e0143f81a68156974c4972a01d4bb677f5d3ba594de7dff0e1fdb3d02f38db730", 0xce, 0x9}], 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt={'euid>', r2}}, {@measure}]}) (async) 17:07:17 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000000}, [{}]}, 0x34, 0x0) 17:07:17 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x4000000}}, 0x34, 0x0) 17:07:17 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x24000000}}, 0x34, 0x0) 17:07:17 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000000}, [{}]}, 0x34, 0x0) 17:07:17 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x6000000}}, 0x34, 0x0) 17:07:17 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}, 0x30}]}}) 17:07:17 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x3f000000}}, 0x34, 0x0) 17:07:17 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x8000000}}, 0x34, 0x0) 17:07:17 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000000}, [{}]}, 0x34, 0x0) 17:07:17 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x81000000}}, 0x34, 0x0) [ 1421.668843][ T9695] 9pnet: Could not find request transport: xen [ 1421.691281][ T9698] loop0: detected capacity change from 0 to 2 [ 1421.699093][ T9698] nfs: Unknown parameter 'trans' 17:07:17 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000000}, [{}]}, 0x34, 0x0) [ 1421.763016][ T9698] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1421.770462][ T9710] 9pnet: Could not find request transport: xen [ 1421.793213][ T9698] tmpfs: Bad value for 'nr_inodes' 17:07:17 executing program 0: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_mount_image$nfs(&(0x7f0000000640), &(0x7f0000000680)='./file0\x00', 0x2, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="b33689f471b61e57f75a9373316884df28fa2e310b557b6e6be35f8399645c704695f7f8957443fe2b961e9d09d2179ea94d0908b43c23755d46f618603c0a42d3e176cfd119bacb28ea1165909b4e4513cbefa52c0305cc0fbcf0b258676d91f073cd5054c66b89e400ecae8a3640c957acad64d56d644d4b4b00296e7a03cf46aa3c43f8dcd5bcdcfd1401d32c9daebea20c5b849ddc4b564510836f86d6606bca2d2182d67d6b3c353b5ed0a19abad5282d76d0111068f1f2558a8626d22ff6f73a53a3167ef8df431b2d616aac6a4556c03f82575cf493e897f1d1a7d9c297c8ccea", 0xe4, 0x1}, {&(0x7f0000000880)="d2cb36e99a5a2e713ff0aeff6fc97bc5e73c57d204bc993cdb3bd2ca60947e14372c534f66a3e13fcedf5e91c9b5f4756681efce105c8eae0182b1a388b827d771e96c1c9bc21864e47f2be6f791e97ffffc0c2b832e66a26e3a7eb19b6fb0d6a579eb588ebf9a0ad30636e52b3a83321f3a096a5f0cce357feb61fac92027ecf3f5ce4ef8249f24", 0x88, 0x200}, {&(0x7f0000000940)="d3238af302769aaeb3045ef4d66767be26065ef1ba33d30e5c6e77404ac0964c106fcabcf26ad1050e4a21da5de18db7a8060d2706ed726fca06d756ad8822e7e19bd722218eee00", 0x48, 0x40}], 0x200004, &(0x7f0000000a40)={[{'trans=xen,'}, {'measure'}], [{@pcr={'pcr', 0x3d, 0x18}}, {@obj_user={'obj_user', 0x3d, '@\\{--,#})\xf2'}}]}) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async, rerun: 32) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1000) (async, rerun: 32) r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) accept$unix(r1, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) getresuid(&(0x7f0000000500), &(0x7f0000000540)=0x0, &(0x7f0000000580)) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="dab145b2d3ca2b442c9a5466", 0xc, 0x7}, {&(0x7f00000002c0)="69a87f72ba9c6bee5c67569f737000d47a7815a1f1c82d523d20a4050a91c746bc8d47debac79b170edb6f41f8fd084bdcd8f6af9056eeb21f0d5e2d767d7a04314a23ab55ac96d7be2e0844ebecdbaa5dfc1ad30ebe658b7d65b3d351a54d0d4abcf412", 0x64, 0x4}, {&(0x7f0000000400)="ec879671b393bee9e15f02586b8fbd546531ca7477f95290ae618b1b847cc6285d3664cb706f5b480ed579cf11c6bb6a8f4534f6c4541730024276e78a92afb11a42fb0cb281327d5b259854b3381eed004e2ef090891b1bbefc98e3edebed29d219769b6b8ee499380e9c9e1e43ab2ef8b2c684fe128a47a624968750a582a741a88300d9424becac82ca358767b9c6d3f023d3e42dd33ea68da4b0f5194bc5009f06b461b4e55477cfde17c99e0143f81a68156974c4972a01d4bb677f5d3ba594de7dff0e1fdb3d02f38db730", 0xce, 0x9}], 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt={'euid>', r2}}, {@measure}]}) 17:07:17 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xc000000}}, 0x34, 0x0) 17:07:17 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:17 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x81020000}}, 0x34, 0x0) 17:07:17 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000000}, [{}]}, 0x34, 0x0) 17:07:17 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xd000000}}, 0x34, 0x0) [ 1421.821181][ T9721] loop0: detected capacity change from 0 to 2 [ 1421.823230][ T2635] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1421.827639][ T9722] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1421.836408][ T2635] Buffer I/O error on dev loop0, logical block 0, async page read 17:07:17 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x8bffffff}}, 0x34, 0x0) 17:07:17 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x20000000}}, 0x34, 0x0) [ 1421.880814][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1421.896909][ T9735] 9pnet: Could not find request transport: xen 17:07:18 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000000}, [{}]}, 0x34, 0x0) 17:07:18 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0x2}}) 17:07:18 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x24000000}}, 0x34, 0x0) [ 1421.930737][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1421.942835][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:18 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x3f000000}}, 0x34, 0x0) [ 1421.982585][ T9749] 9pnet: Could not find request transport: xen [ 1422.020307][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.028683][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.038604][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.047757][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.056247][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.064719][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.073326][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.081777][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.109356][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.117768][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.127774][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.136173][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.144679][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.153158][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.179352][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.187798][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.196337][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.204960][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.214278][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.222666][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.231231][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.239593][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.247978][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.256604][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.264973][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.273494][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:18 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x200, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="7472616e733d78e5dab1e48abe3876d3"]) 17:07:18 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000000}, [{}]}, 0x34, 0x0) 17:07:18 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x8cffffff}}, 0x34, 0x0) 17:07:18 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x61130000}}, 0x34, 0x0) 17:07:18 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0x3}}) 17:07:18 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x94130000}}, 0x34, 0x0) 17:07:18 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x81000000}}, 0x34, 0x0) 17:07:18 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) [ 1422.281941][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.290476][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.298826][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.307470][ T9737] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:18 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x81020000}}, 0x34, 0x0) 17:07:18 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xe4ffffff}}, 0x34, 0x0) 17:07:18 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:18 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0x4}}) [ 1422.376466][ T9762] 9pnet: Could not find request transport: xen [ 1422.388813][ T9767] 9pnet: Could not find request transport: xåڱ䊾8vÓ 17:07:18 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x200, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="7472616e733d78e5dab1e48abe3876d3"]) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x200, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="7472616e733d78e5dab1e48abe3876d3"]) (async) 17:07:18 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xf6ffffff}}, 0x34, 0x0) 17:07:18 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x8bffffff}}, 0x34, 0x0) 17:07:18 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:18 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xfbffffff}}, 0x34, 0x0) 17:07:18 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0x8cffffff}}, 0x34, 0x0) 17:07:18 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {0x4, 0x0, 0x2000000}, [{}]}, 0x2c, 0x0) [ 1422.469964][ T9782] 9pnet: Could not find request transport: xen 17:07:18 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0x5}}) 17:07:18 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xfeffffff}}, 0x34, 0x0) 17:07:18 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {0x4, 0x0, 0x2000000}, [{}]}, 0x2c, 0x0) 17:07:18 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xe4ffffff}}, 0x34, 0x0) [ 1422.513088][ T9785] 9pnet: Could not find request transport: xåڱ䊾8vÓ 17:07:18 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xff000000}}, 0x34, 0x0) 17:07:18 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x200, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="7472616e733d78e5dab1e48abe3876d3"]) 17:07:18 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {0x4, 0x0, 0x2000000}, [{}]}, 0x2c, 0x0) 17:07:18 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xf6ffffff}}, 0x34, 0x0) 17:07:18 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0x6}}) 17:07:18 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xfbffffff}}, 0x34, 0x0) [ 1422.566825][ T9799] 9pnet: Could not find request transport: xåڱ䊾8vÓ [ 1422.574876][ T9802] 9pnet: Could not find request transport: xen 17:07:18 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000000}}, 0x2c, 0x0) 17:07:18 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xff010000}}, 0x34, 0x0) 17:07:18 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000069280)={{0x0, 0xff, 0x4, 0x2, 0x9, 0x100000000, 0xffffffff80000000, 0x7, 0x4, 0x3ff, 0xffff7fff, 0xa421, 0x0, 0x8, 0x9}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000006a280)={0x1000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x2, "644b15100a9337"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000006b280)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x3, "27761b1b75cf9d"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000006c280)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000006c480)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000006c680)={0xc3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "2bad31188f01ce"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000006d680)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000006d880)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "bcd97f337d2b08"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f000006e880)={{0x0, 0x0, 0x8, 0x5, 0x401, 0xffffffffffffe956, 0x8000, 0xffff6e42, 0x1, 0x5, 0x2, 0x2, 0x6, 0x8000000000000000, 0x8000000000000000}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000006f880)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "c93d18e7285a26"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000070880)={{0x0, 0x576b, 0x3, 0x6, 0x7, 0x8, 0x4800, 0x6125, 0x2, 0x80, 0x9, 0x0, 0x80, 0x1, 0x8}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000071880)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x40, "cdeb22d8e5e2b4"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000072880)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000072a80)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000072c80)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000072e80)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "3f7d61def0bdda"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000073e80)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000074080)={0x79101c38, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1, r2}, {0x0, r3}, {}, {r4}, {r5, r6}, {0x0, r7}, {0x0, r8}, {r9}, {}, {}, {}, {0x0, r10}, {r11}, {r12, r13}, {r14}, {r15, r16}, {r17}], 0x4, "e9ec13dc688abc"}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:18 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xffffff8b}}, 0x34, 0x0) 17:07:18 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000069280)={{0x0, 0xff, 0x4, 0x2, 0x9, 0x100000000, 0xffffffff80000000, 0x7, 0x4, 0x3ff, 0xffff7fff, 0xa421, 0x0, 0x8, 0x9}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000006a280)={0x1000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x2, "644b15100a9337"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000006b280)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x3, "27761b1b75cf9d"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000006c280)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000006c480)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000006c680)={0xc3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "2bad31188f01ce"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000006d680)={0x0, ""/256, 0x0, 0x0}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000006d880)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "bcd97f337d2b08"}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f000006e880)={{0x0, 0x0, 0x8, 0x5, 0x401, 0xffffffffffffe956, 0x8000, 0xffff6e42, 0x1, 0x5, 0x2, 0x2, 0x6, 0x8000000000000000, 0x8000000000000000}}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000006f880)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "c93d18e7285a26"}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000070880)={{0x0, 0x576b, 0x3, 0x6, 0x7, 0x8, 0x4800, 0x6125, 0x2, 0x80, 0x9, 0x0, 0x80, 0x1, 0x8}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000071880)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x40, "cdeb22d8e5e2b4"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000072880)={0x0, ""/256, 0x0, 0x0}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000072a80)={0x0}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000072c80)={0x0, ""/256, 0x0}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000072e80)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "3f7d61def0bdda"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000073e80)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000074080)={0x79101c38, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1, r2}, {0x0, r3}, {}, {r4}, {r5, r6}, {0x0, r7}, {0x0, r8}, {r9}, {}, {}, {}, {0x0, r10}, {r11}, {r12, r13}, {r14}, {r15, r16}, {r17}], 0x4, "e9ec13dc688abc"}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:18 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0x7}}) 17:07:18 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000000}}, 0x2c, 0x0) [ 1422.645758][ T9818] 9pnet: Could not find request transport: xåڱ䊾8vÓ [ 1422.656482][ T9820] 9pnet: Could not find request transport: xen 17:07:18 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xfeffffff}}, 0x34, 0x0) 17:07:18 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {0x4, 0x0, 0x2000000}}, 0x2c, 0x0) 17:07:18 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xff000000}}, 0x34, 0x0) 17:07:18 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xffffff8c}}, 0x34, 0x0) [ 1422.731068][ T9835] 9pnet: Could not find request transport: xen 17:07:18 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$BTRFS_IOC_TREE_SEARCH(0xffffffffffffffff, 0xd0009411, &(0x7f0000069280)={{0x0, 0xff, 0x4, 0x2, 0x9, 0x100000000, 0xffffffff80000000, 0x7, 0x4, 0x3ff, 0xffff7fff, 0xa421, 0x0, 0x8, 0x9}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000006a280)={0x1000, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x2, "644b15100a9337"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000006b280)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x3, "27761b1b75cf9d"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000006c280)={0x0, ""/256, 0x0}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000006c480)={0x0}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000006c680)={0xc3, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "2bad31188f01ce"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000006d680)={0x0, ""/256, 0x0, 0x0}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000006d880)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x4, "bcd97f337d2b08"}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f000006e880)={{0x0, 0x0, 0x8, 0x5, 0x401, 0xffffffffffffe956, 0x8000, 0xffff6e42, 0x1, 0x5, 0x2, 0x2, 0x6, 0x8000000000000000, 0x8000000000000000}}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f000006f880)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "c93d18e7285a26"}) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000070880)={{0x0, 0x576b, 0x3, 0x6, 0x7, 0x8, 0x4800, 0x6125, 0x2, 0x80, 0x9, 0x0, 0x80, 0x1, 0x8}}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000071880)={0x1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x40, "cdeb22d8e5e2b4"}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000072880)={0x0, ""/256, 0x0, 0x0}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000072a80)={0x0}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000072c80)={0x0, ""/256, 0x0}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000072e80)={0xfffffffffffffffe, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "3f7d61def0bdda"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000073e80)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r0, 0xd000943d, &(0x7f0000074080)={0x79101c38, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1, r2}, {0x0, r3}, {}, {r4}, {r5, r6}, {0x0, r7}, {0x0, r8}, {r9}, {}, {}, {}, {0x0, r10}, {r11}, {r12, r13}, {r14}, {r15, r16}, {r17}], 0x4, "e9ec13dc688abc"}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:18 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0x8}}) 17:07:18 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xff010000}}, 0x34, 0x0) 17:07:18 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xffffffe4}}, 0x34, 0x0) 17:07:18 executing program 4: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000640), &(0x7f0000000680)='./file0\x00', 0x2, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="b33689f471b61e57f75a9373316884df28fa2e310b557b6e6be35f8399645c704695f7f8957443fe2b961e9d09d2179ea94d0908b43c23755d46f618603c0a42d3e176cfd119bacb28ea1165909b4e4513cbefa52c0305cc0fbcf0b258676d91f073cd5054c66b89e400ecae8a3640c957acad64d56d644d4b4b00296e7a03cf46aa3c43f8dcd5bcdcfd1401d32c9daebea20c5b849ddc4b564510836f86d6606bca2d2182d67d6b3c353b5ed0a19abad5282d76d0111068f1f2558a8626d22ff6f73a53a3167ef8df431b2d616aac6a4556c03f82575cf493e897f1d1a7d9c297c8ccea", 0xe4, 0x1}, {&(0x7f0000000880)="d2cb36e99a5a2e713ff0aeff6fc97bc5e73c57d204bc993cdb3bd2ca60947e14372c534f66a3e13fcedf5e91c9b5f4756681efce105c8eae0182b1a388b827d771e96c1c9bc21864e47f2be6f791e97ffffc0c2b832e66a26e3a7eb19b6fb0d6a579eb588ebf9a0ad30636e52b3a83321f3a096a5f0cce357feb61fac92027ecf3f5ce4ef8249f24", 0x88, 0x200}, {&(0x7f0000000940)="d3238af302769aaeb3045ef4d66767be26065ef1ba33d30e5c6e77404ac0964c106fcabcf26ad1050e4a21da5de18db7a8060d2706ed726fca06d756ad8822e7e19bd722218eee00", 0x48, 0x40}], 0x200004, &(0x7f0000000a40)={[{'trans=xen,'}, {'measure'}], [{@pcr={'pcr', 0x3d, 0x18}}, {@obj_user={'obj_user', 0x3d, '@\\{--,#})\xf2'}}]}) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1000) r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) accept$unix(r1, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) getresuid(&(0x7f0000000500), &(0x7f0000000540)=0x0, &(0x7f0000000580)) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="dab145b2d3ca2b442c9a5466", 0xc, 0x7}, {&(0x7f00000002c0)="69a87f72ba9c6bee5c67569f737000d47a7815a1f1c82d523d20a4050a91c746bc8d47debac79b170edb6f41f8fd084bdcd8f6af9056eeb21f0d5e2d767d7a04314a23ab55ac96d7be2e0844ebecdbaa5dfc1ad30ebe658b7d65b3d351a54d0d4abcf412", 0x64, 0x4}, {&(0x7f0000000400)="ec879671b393bee9e15f02586b8fbd546531ca7477f95290ae618b1b847cc6285d3664cb706f5b480ed579cf11c6bb6a8f4534f6c4541730024276e78a92afb11a42fb0cb281327d5b259854b3381eed004e2ef090891b1bbefc98e3edebed29d219769b6b8ee499380e9c9e1e43ab2ef8b2c684fe128a47a624968750a582a741a88300d9424becac82ca358767b9c6d3f023d3e42dd33ea68da4b0f5194bc5009f06b461b4e55477cfde17c99e0143f81a68156974c4972a01d4bb677f5d3ba594de7dff0e1fdb3d02f38db730", 0xce, 0x9}], 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt={'euid>', r2}}, {@measure}]}) 17:07:18 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0xc240c, &(0x7f0000000000)={'trans=xen,', {[{@version_u}]}}) syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="96ee9f771bfb1d718584b517c867a7ddc1c66abe9aee401815a21e563536c40b79dbf048c907cd0b6f178648fb22ac06ffd14367707999c9f865c3b9ae7bde", 0x3f, 0x5}], 0x21002, &(0x7f0000000140)={[{'9p\x00'}, {'9p\x00'}, {',!'}, {'(#.!)R'}, {}, {'version=9p2000.u'}, {'%)'}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@measure}, {@euid_gt={'euid>', 0xee00}}, {@subj_role={'subj_role', 0x3d, 'version=9p2000.u'}}]}) 17:07:18 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xfffffff6}}, 0x34, 0x0) 17:07:18 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}) 17:07:18 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}) (async) 17:07:18 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xffffff8b}}, 0x34, 0x0) 17:07:18 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xfffffffb}}, 0x34, 0x0) 17:07:18 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0x9}}) 17:07:18 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0xc240c, &(0x7f0000000000)={'trans=xen,', {[{@version_u}]}}) (async, rerun: 32) syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="96ee9f771bfb1d718584b517c867a7ddc1c66abe9aee401815a21e563536c40b79dbf048c907cd0b6f178648fb22ac06ffd14367707999c9f865c3b9ae7bde", 0x3f, 0x5}], 0x21002, &(0x7f0000000140)={[{'9p\x00'}, {'9p\x00'}, {',!'}, {'(#.!)R'}, {}, {'version=9p2000.u'}, {'%)'}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@measure}, {@euid_gt={'euid>', 0xee00}}, {@subj_role={'subj_role', 0x3d, 'version=9p2000.u'}}]}) [ 1422.826999][ T9865] loop4: detected capacity change from 0 to 2 [ 1422.843976][ T9865] nfs: Unknown parameter 'trans' [ 1422.847595][ T9858] 9pnet: Could not find request transport: xen 17:07:18 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}}) (async) 17:07:18 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xfffffffe}}, 0x34, 0x0) 17:07:18 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xffffff8c}}, 0x34, 0x0) [ 1422.877789][ T9865] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1422.907835][ T9865] tmpfs: Bad value for 'nr_inodes' 17:07:19 executing program 4: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000640), &(0x7f0000000680)='./file0\x00', 0x2, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="b33689f471b61e57f75a9373316884df28fa2e310b557b6e6be35f8399645c704695f7f8957443fe2b961e9d09d2179ea94d0908b43c23755d46f618603c0a42d3e176cfd119bacb28ea1165909b4e4513cbefa52c0305cc0fbcf0b258676d91f073cd5054c66b89e400ecae8a3640c957acad64d56d644d4b4b00296e7a03cf46aa3c43f8dcd5bcdcfd1401d32c9daebea20c5b849ddc4b564510836f86d6606bca2d2182d67d6b3c353b5ed0a19abad5282d76d0111068f1f2558a8626d22ff6f73a53a3167ef8df431b2d616aac6a4556c03f82575cf493e897f1d1a7d9c297c8ccea", 0xe4, 0x1}, {&(0x7f0000000880)="d2cb36e99a5a2e713ff0aeff6fc97bc5e73c57d204bc993cdb3bd2ca60947e14372c534f66a3e13fcedf5e91c9b5f4756681efce105c8eae0182b1a388b827d771e96c1c9bc21864e47f2be6f791e97ffffc0c2b832e66a26e3a7eb19b6fb0d6a579eb588ebf9a0ad30636e52b3a83321f3a096a5f0cce357feb61fac92027ecf3f5ce4ef8249f24", 0x88, 0x200}, {&(0x7f0000000940)="d3238af302769aaeb3045ef4d66767be26065ef1ba33d30e5c6e77404ac0964c106fcabcf26ad1050e4a21da5de18db7a8060d2706ed726fca06d756ad8822e7e19bd722218eee00", 0x48, 0x40}], 0x200004, &(0x7f0000000a40)={[{'trans=xen,'}, {'measure'}], [{@pcr={'pcr', 0x3d, 0x18}}, {@obj_user={'obj_user', 0x3d, '@\\{--,#})\xf2'}}]}) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1000) r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) accept$unix(r1, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) getresuid(&(0x7f0000000500), &(0x7f0000000540)=0x0, &(0x7f0000000580)) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="dab145b2d3ca2b442c9a5466", 0xc, 0x7}, {&(0x7f00000002c0)="69a87f72ba9c6bee5c67569f737000d47a7815a1f1c82d523d20a4050a91c746bc8d47debac79b170edb6f41f8fd084bdcd8f6af9056eeb21f0d5e2d767d7a04314a23ab55ac96d7be2e0844ebecdbaa5dfc1ad30ebe658b7d65b3d351a54d0d4abcf412", 0x64, 0x4}, {&(0x7f0000000400)="ec879671b393bee9e15f02586b8fbd546531ca7477f95290ae618b1b847cc6285d3664cb706f5b480ed579cf11c6bb6a8f4534f6c4541730024276e78a92afb11a42fb0cb281327d5b259854b3381eed004e2ef090891b1bbefc98e3edebed29d219769b6b8ee499380e9c9e1e43ab2ef8b2c684fe128a47a624968750a582a741a88300d9424becac82ca358767b9c6d3f023d3e42dd33ea68da4b0f5194bc5009f06b461b4e55477cfde17c99e0143f81a68156974c4972a01d4bb677f5d3ba594de7dff0e1fdb3d02f38db730", 0xce, 0x9}], 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt={'euid>', r2}}, {@measure}]}) 17:07:19 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0xc240c, &(0x7f0000000000)={'trans=xen,', {[{@version_u}]}}) (async, rerun: 32) syz_mount_image$nfs4(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x1, 0x1, &(0x7f0000000100)=[{&(0x7f00000000c0)="96ee9f771bfb1d718584b517c867a7ddc1c66abe9aee401815a21e563536c40b79dbf048c907cd0b6f178648fb22ac06ffd14367707999c9f865c3b9ae7bde", 0x3f, 0x5}], 0x21002, &(0x7f0000000140)={[{'9p\x00'}, {'9p\x00'}, {',!'}, {'(#.!)R'}, {}, {'version=9p2000.u'}, {'%)'}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@measure}, {@euid_gt={'euid>', 0xee00}}, {@subj_role={'subj_role', 0x3d, 'version=9p2000.u'}}]}) (rerun: 32) 17:07:19 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b0000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b1e35cc2620a1b2a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bcb3f5d9b793fee4e6b3c58cfc5500000000000000000000000000000000000000000000000000000000555500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300"/532]}) 17:07:19 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xffffffe4}}, 0x34, 0x0) 17:07:19 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x2}}, 0x34, 0x0) 17:07:19 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0xa}}) [ 1422.925590][ T9884] 9pnet: Could not find request transport: xen 17:07:19 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xfffffff6}}, 0x34, 0x0) 17:07:19 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b0000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b1e35cc2620a1b2a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bcb3f5d9b793fee4e6b3c58cfc5500000000000000000000000000000000000000000000000000000000555500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300"/532]}) 17:07:19 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x3}}, 0x34, 0x0) 17:07:19 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b0000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000b1e35cc2620a1b2a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bcb3f5d9b793fee4e6b3c58cfc5500000000000000000000000000000000000000000000000000000000555500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300"/532]}) 17:07:19 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x4}}, 0x34, 0x0) 17:07:19 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) write$UHID_SET_REPORT_REPLY(r1, &(0x7f00000002c0)={0xe, {0x9, 0x7f, 0x3, 0x58, "299f831e7b1c1781b3d92c6973554671d4056f3b30de765d4d1dca1afbd1a7651ed39b4984b3f9419e662e6bd6b8485a75ff424c2574ed5d68b1b6a5bf21c8de6b292137e9da1c3e489f4871d24553b130170327cde21ef1"}}, 0x64) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x8ba5, 0x0, 0xfffffffd, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) [ 1422.985010][ T9906] loop4: detected capacity change from 0 to 2 [ 1423.009556][ T9906] nfs: Unknown parameter 'trans' [ 1423.014548][ T9904] 9pnet: Could not find request transport: xen 17:07:19 executing program 4: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000640), &(0x7f0000000680)='./file0\x00', 0x2, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="b33689f471b61e57f75a9373316884df28fa2e310b557b6e6be35f8399645c704695f7f8957443fe2b961e9d09d2179ea94d0908b43c23755d46f618603c0a42d3e176cfd119bacb28ea1165909b4e4513cbefa52c0305cc0fbcf0b258676d91f073cd5054c66b89e400ecae8a3640c957acad64d56d644d4b4b00296e7a03cf46aa3c43f8dcd5bcdcfd1401d32c9daebea20c5b849ddc4b564510836f86d6606bca2d2182d67d6b3c353b5ed0a19abad5282d76d0111068f1f2558a8626d22ff6f73a53a3167ef8df431b2d616aac6a4556c03f82575cf493e897f1d1a7d9c297c8ccea", 0xe4, 0x1}, {&(0x7f0000000880)="d2cb36e99a5a2e713ff0aeff6fc97bc5e73c57d204bc993cdb3bd2ca60947e14372c534f66a3e13fcedf5e91c9b5f4756681efce105c8eae0182b1a388b827d771e96c1c9bc21864e47f2be6f791e97ffffc0c2b832e66a26e3a7eb19b6fb0d6a579eb588ebf9a0ad30636e52b3a83321f3a096a5f0cce357feb61fac92027ecf3f5ce4ef8249f24", 0x88, 0x200}, {&(0x7f0000000940)="d3238af302769aaeb3045ef4d66767be26065ef1ba33d30e5c6e77404ac0964c106fcabcf26ad1050e4a21da5de18db7a8060d2706ed726fca06d756ad8822e7e19bd722218eee00", 0x48, 0x40}], 0x200004, &(0x7f0000000a40)={[{'trans=xen,'}, {'measure'}], [{@pcr={'pcr', 0x3d, 0x18}}, {@obj_user={'obj_user', 0x3d, '@\\{--,#})\xf2'}}]}) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1000) r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) accept$unix(r1, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) getresuid(&(0x7f0000000500), &(0x7f0000000540)=0x0, &(0x7f0000000580)) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="dab145b2d3ca2b442c9a5466", 0xc, 0x7}, {&(0x7f00000002c0)="69a87f72ba9c6bee5c67569f737000d47a7815a1f1c82d523d20a4050a91c746bc8d47debac79b170edb6f41f8fd084bdcd8f6af9056eeb21f0d5e2d767d7a04314a23ab55ac96d7be2e0844ebecdbaa5dfc1ad30ebe658b7d65b3d351a54d0d4abcf412", 0x64, 0x4}, {&(0x7f0000000400)="ec879671b393bee9e15f02586b8fbd546531ca7477f95290ae618b1b847cc6285d3664cb706f5b480ed579cf11c6bb6a8f4534f6c4541730024276e78a92afb11a42fb0cb281327d5b259854b3381eed004e2ef090891b1bbefc98e3edebed29d219769b6b8ee499380e9c9e1e43ab2ef8b2c684fe128a47a624968750a582a741a88300d9424becac82ca358767b9c6d3f023d3e42dd33ea68da4b0f5194bc5009f06b461b4e55477cfde17c99e0143f81a68156974c4972a01d4bb677f5d3ba594de7dff0e1fdb3d02f38db730", 0xce, 0x9}], 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt={'euid>', r2}}, {@measure}]}) [ 1423.072629][ T9906] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1423.101092][ T9906] tmpfs: Bad value for 'nr_inodes' [ 1423.156078][ T9920] loop4: detected capacity change from 0 to 2 [ 1423.163324][ T9920] nfs: Unknown parameter 'trans' [ 1423.181230][ T9920] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1423.190215][ T9920] tmpfs: Bad value for 'nr_inodes' 17:07:19 executing program 0: socketpair(0x34, 0x3, 0x3ff, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000040)=@l2, 0x80, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/133, 0x85}, {&(0x7f0000000180)=""/117, 0x75}, {&(0x7f0000000200)}, {&(0x7f0000000240)=""/126, 0x7e}, {&(0x7f00000002c0)=""/248, 0xf8}, {&(0x7f0000000780)=""/4096, 0x1000}], 0x6, &(0x7f0000000480)=""/124, 0x7c}, 0x2043) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000540), &(0x7f0000000580)='system_u:object_r:fonts_cache_t:s0\x00', 0x23, 0x1) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f472656e733d78656e66665f752c006d3a68a2bd55cecad48107fa1e64783974240865a6563eb6c1bc2e87ebf8fa9726630bb71699eca5e2d71314551e73aeb33f7350daa51bd459ba72896cded7f32b76cf5dcd8168b3d4e3e182596c3cbe7769993f07e7db56552ce9351d21876640d96d7dc46d0276a9422abee9a049"]) 17:07:19 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xfffffffb}}, 0x34, 0x0) 17:07:19 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0xb}}) 17:07:19 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x6}}, 0x34, 0x0) 17:07:19 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) write$UHID_SET_REPORT_REPLY(r1, &(0x7f00000002c0)={0xe, {0x9, 0x7f, 0x3, 0x58, "299f831e7b1c1781b3d92c6973554671d4056f3b30de765d4d1dca1afbd1a7651ed39b4984b3f9419e662e6bd6b8485a75ff424c2574ed5d68b1b6a5bf21c8de6b292137e9da1c3e489f4871d24553b130170327cde21ef1"}}, 0x64) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x8ba5, 0x0, 0xfffffffd, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) (async) write$UHID_SET_REPORT_REPLY(r1, &(0x7f00000002c0)={0xe, {0x9, 0x7f, 0x3, 0x58, "299f831e7b1c1781b3d92c6973554671d4056f3b30de765d4d1dca1afbd1a7651ed39b4984b3f9419e662e6bd6b8485a75ff424c2574ed5d68b1b6a5bf21c8de6b292137e9da1c3e489f4871d24553b130170327cde21ef1"}}, 0x64) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x8ba5, 0x0, 0xfffffffd, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) (async) 17:07:19 executing program 4: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000640), &(0x7f0000000680)='./file0\x00', 0x2, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="b33689f471b61e57f75a9373316884df28fa2e310b557b6e6be35f8399645c704695f7f8957443fe2b961e9d09d2179ea94d0908b43c23755d46f618603c0a42d3e176cfd119bacb28ea1165909b4e4513cbefa52c0305cc0fbcf0b258676d91f073cd5054c66b89e400ecae8a3640c957acad64d56d644d4b4b00296e7a03cf46aa3c43f8dcd5bcdcfd1401d32c9daebea20c5b849ddc4b564510836f86d6606bca2d2182d67d6b3c353b5ed0a19abad5282d76d0111068f1f2558a8626d22ff6f73a53a3167ef8df431b2d616aac6a4556c03f82575cf493e897f1d1a7d9c297c8ccea", 0xe4, 0x1}, {&(0x7f0000000880)="d2cb36e99a5a2e713ff0aeff6fc97bc5e73c57d204bc993cdb3bd2ca60947e14372c534f66a3e13fcedf5e91c9b5f4756681efce105c8eae0182b1a388b827d771e96c1c9bc21864e47f2be6f791e97ffffc0c2b832e66a26e3a7eb19b6fb0d6a579eb588ebf9a0ad30636e52b3a83321f3a096a5f0cce357feb61fac92027ecf3f5ce4ef8249f24", 0x88, 0x200}, {&(0x7f0000000940)="d3238af302769aaeb3045ef4d66767be26065ef1ba33d30e5c6e77404ac0964c106fcabcf26ad1050e4a21da5de18db7a8060d2706ed726fca06d756ad8822e7e19bd722218eee00", 0x48, 0x40}], 0x200004, &(0x7f0000000a40)={[{'trans=xen,'}, {'measure'}], [{@pcr={'pcr', 0x3d, 0x18}}, {@obj_user={'obj_user', 0x3d, '@\\{--,#})\xf2'}}]}) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1000) r1 = accept$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) accept$unix(r1, &(0x7f0000000140), &(0x7f00000001c0)=0x6e) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="dab145b2d3ca2b442c9a5466", 0xc, 0x7}, {&(0x7f00000002c0)="69a87f72ba9c6bee5c67569f737000d47a7815a1f1c82d523d20a4050a91c746bc8d47debac79b170edb6f41f8fd084bdcd8f6af9056eeb21f0d5e2d767d7a04314a23ab55ac96d7be2e0844ebecdbaa5dfc1ad30ebe658b7d65b3d351a54d0d4abcf412", 0x64, 0x4}, {&(0x7f0000000400)="ec879671b393bee9e15f02586b8fbd546531ca7477f95290ae618b1b847cc6285d3664cb706f5b480ed579cf11c6bb6a8f4534f6c4541730024276e78a92afb11a42fb0cb281327d5b259854b3381eed004e2ef090891b1bbefc98e3edebed29d219769b6b8ee499380e9c9e1e43ab2ef8b2c684fe128a47a624968750a582a741a88300d9424becac82ca358767b9c6d3f023d3e42dd33ea68da4b0f5194bc5009f06b461b4e55477cfde17c99e0143f81a68156974c4972a01d4bb677f5d3ba594de7dff0e1fdb3d02f38db730", 0xce, 0x9}], 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt}, {@measure}]}) 17:07:19 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x7}}, 0x34, 0x0) 17:07:19 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) write$UHID_SET_REPORT_REPLY(r1, &(0x7f00000002c0)={0xe, {0x9, 0x7f, 0x3, 0x58, "299f831e7b1c1781b3d92c6973554671d4056f3b30de765d4d1dca1afbd1a7651ed39b4984b3f9419e662e6bd6b8485a75ff424c2574ed5d68b1b6a5bf21c8de6b292137e9da1c3e489f4871d24553b130170327cde21ef1"}}, 0x64) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x8ba5, 0x0, 0xfffffffd, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000280)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) (async) write$UHID_SET_REPORT_REPLY(r1, &(0x7f00000002c0)={0xe, {0x9, 0x7f, 0x3, 0x58, "299f831e7b1c1781b3d92c6973554671d4056f3b30de765d4d1dca1afbd1a7651ed39b4984b3f9419e662e6bd6b8485a75ff424c2574ed5d68b1b6a5bf21c8de6b292137e9da1c3e489f4871d24553b130170327cde21ef1"}}, 0x64) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x8ba5, 0x0, 0xfffffffd, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x93, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4]}}) (async) [ 1423.847869][ T9929] SELinux: Context system_u:object_r:fonts_cache_t:s0 is not valid (left unmapped). [ 1423.856230][ T9930] loop4: detected capacity change from 0 to 2 [ 1423.863594][ T24] audit: type=1400 audit(1662311239.913:472): avc: denied { relabelto } for pid=9927 comm="syz-executor.0" name="file0" dev="sda1" ino=1179 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 trawcon="system_u:object_r:fonts_cache_t:s0" [ 1423.866916][ T9924] 9pnet: Could not find request transport: xen 17:07:19 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {0x10, 0x0, 0xfffffffe}}, 0x34, 0x0) 17:07:19 executing program 0: socketpair(0x34, 0x3, 0x3ff, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000040)=@l2, 0x80, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/133, 0x85}, {&(0x7f0000000180)=""/117, 0x75}, {&(0x7f0000000200)}, {&(0x7f0000000240)=""/126, 0x7e}, {&(0x7f00000002c0)=""/248, 0xf8}, {&(0x7f0000000780)=""/4096, 0x1000}], 0x6, &(0x7f0000000480)=""/124, 0x7c}, 0x2043) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000540), &(0x7f0000000580)='system_u:object_r:fonts_cache_t:s0\x00', 0x23, 0x1) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f472656e733d78656e66665f752c006d3a68a2bd55cecad48107fa1e64783974240865a6563eb6c1bc2e87ebf8fa9726630bb71699eca5e2d71314551e73aeb33f7350daa51bd459ba72896cded7f32b76cf5dcd8168b3d4e3e182596c3cbe7769993f07e7db56552ce9351d21876640d96d7dc46d0276a9422abee9a049"]) socketpair(0x34, 0x3, 0x3ff, &(0x7f0000000000)) (async) recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000040)=@l2, 0x80, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/133, 0x85}, {&(0x7f0000000180)=""/117, 0x75}, {&(0x7f0000000200)}, {&(0x7f0000000240)=""/126, 0x7e}, {&(0x7f00000002c0)=""/248, 0xf8}, {&(0x7f0000000780)=""/4096, 0x1000}], 0x6, &(0x7f0000000480)=""/124, 0x7c}, 0x2043) (async) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) lsetxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000540), &(0x7f0000000580)='system_u:object_r:fonts_cache_t:s0\x00', 0x23, 0x1) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f472656e733d78656e66665f752c006d3a68a2bd55cecad48107fa1e64783974240865a6563eb6c1bc2e87ebf8fa9726630bb71699eca5e2d71314551e73aeb33f7350daa51bd459ba72896cded7f32b76cf5dcd8168b3d4e3e182596c3cbe7769993f07e7db56552ce9351d21876640d96d7dc46d0276a9422abee9a049"]) (async) 17:07:19 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0xc}}) 17:07:20 executing program 0: socketpair(0x34, 0x3, 0x3ff, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000040)=@l2, 0x80, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/133, 0x85}, {&(0x7f0000000180)=""/117, 0x75}, {&(0x7f0000000200)}, {&(0x7f0000000240)=""/126, 0x7e}, {&(0x7f00000002c0)=""/248, 0xf8}, {&(0x7f0000000780)=""/4096, 0x1000}], 0x6, &(0x7f0000000480)=""/124, 0x7c}, 0x2043) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000540), &(0x7f0000000580)='system_u:object_r:fonts_cache_t:s0\x00', 0x23, 0x1) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f472656e733d78656e66665f752c006d3a68a2bd55cecad48107fa1e64783974240865a6563eb6c1bc2e87ebf8fa9726630bb71699eca5e2d71314551e73aeb33f7350daa51bd459ba72896cded7f32b76cf5dcd8168b3d4e3e182596c3cbe7769993f07e7db56552ce9351d21876640d96d7dc46d0276a9422abee9a049"]) socketpair(0x34, 0x3, 0x3ff, &(0x7f0000000000)) (async) recvmsg$kcm(r0, &(0x7f0000000500)={&(0x7f0000000040)=@l2, 0x80, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/133, 0x85}, {&(0x7f0000000180)=""/117, 0x75}, {&(0x7f0000000200)}, {&(0x7f0000000240)=""/126, 0x7e}, {&(0x7f00000002c0)=""/248, 0xf8}, {&(0x7f0000000780)=""/4096, 0x1000}], 0x6, &(0x7f0000000480)=""/124, 0x7c}, 0x2043) (async) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) lsetxattr$security_selinux(&(0x7f0000000200)='./file0\x00', &(0x7f0000000540), &(0x7f0000000580)='system_u:object_r:fonts_cache_t:s0\x00', 0x23, 0x1) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="f472656e733d78656e66665f752c006d3a68a2bd55cecad48107fa1e64783974240865a6563eb6c1bc2e87ebf8fa9726630bb71699eca5e2d71314551e73aeb33f7350daa51bd459ba72896cded7f32b76cf5dcd8168b3d4e3e182596c3cbe7769993f07e7db56552ce9351d21876640d96d7dc46d0276a9422abee9a049"]) (async) [ 1423.907789][ T9930] nfs: Unknown parameter 'trans' 17:07:20 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x8}}, 0x34, 0x0) 17:07:20 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x2}}, 0x34, 0x0) 17:07:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}}) 17:07:20 executing program 0: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) linkat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1400) 17:07:20 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x3}}, 0x34, 0x0) [ 1423.951329][ T9930] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1423.965102][ T9957] 9pnet: Could not find request transport: xen [ 1423.998172][ T9971] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1424.009242][ T9974] tmpfs: Bad value for 'nr_inodes' 17:07:20 executing program 4: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000640), &(0x7f0000000680)='./file0\x00', 0x2, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="b33689f471b61e57f75a9373316884df28fa2e310b557b6e6be35f8399645c704695f7f8957443fe2b961e9d09d2179ea94d0908b43c23755d46f618603c0a42d3e176cfd119bacb28ea1165909b4e4513cbefa52c0305cc0fbcf0b258676d91f073cd5054c66b89e400ecae8a3640c957acad64d56d644d4b4b00296e7a03cf46aa3c43f8dcd5bcdcfd1401d32c9daebea20c5b849ddc4b564510836f86d6606bca2d2182d67d6b3c353b5ed0a19abad5282d76d0111068f1f2558a8626d22ff6f73a53a3167ef8df431b2d616aac6a4556c03f82575cf493e897f1d1a7d9c297c8ccea", 0xe4, 0x1}, {&(0x7f0000000880)="d2cb36e99a5a2e713ff0aeff6fc97bc5e73c57d204bc993cdb3bd2ca60947e14372c534f66a3e13fcedf5e91c9b5f4756681efce105c8eae0182b1a388b827d771e96c1c9bc21864e47f2be6f791e97ffffc0c2b832e66a26e3a7eb19b6fb0d6a579eb588ebf9a0ad30636e52b3a83321f3a096a5f0cce357feb61fac92027ecf3f5ce4ef8249f24", 0x88, 0x200}, {&(0x7f0000000940)="d3238af302769aaeb3045ef4d66767be26065ef1ba33d30e5c6e77404ac0964c106fcabcf26ad1050e4a21da5de18db7a8060d2706ed726fca06d756ad8822e7e19bd722218eee00", 0x48, 0x40}], 0x200004, &(0x7f0000000a40)={[{'trans=xen,'}, {'measure'}], [{@pcr={'pcr', 0x3d, 0x18}}, {@obj_user={'obj_user', 0x3d, '@\\{--,#})\xf2'}}]}) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1000) accept$unix(0xffffffffffffffff, &(0x7f0000000080), &(0x7f0000000100)=0x6e) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="dab145b2d3ca2b442c9a5466", 0xc, 0x7}, {&(0x7f00000002c0)="69a87f72ba9c6bee5c67569f737000d47a7815a1f1c82d523d20a4050a91c746bc8d47debac79b170edb6f41f8fd084bdcd8f6af9056eeb21f0d5e2d767d7a04314a23ab55ac96d7be2e0844ebecdbaa5dfc1ad30ebe658b7d65b3d351a54d0d4abcf412", 0x64, 0x4}, {&(0x7f0000000400)="ec879671b393bee9e15f02586b8fbd546531ca7477f95290ae618b1b847cc6285d3664cb706f5b480ed579cf11c6bb6a8f4534f6c4541730024276e78a92afb11a42fb0cb281327d5b259854b3381eed004e2ef090891b1bbefc98e3edebed29d219769b6b8ee499380e9c9e1e43ab2ef8b2c684fe128a47a624968750a582a741a88300d9424becac82ca358767b9c6d3f023d3e42dd33ea68da4b0f5194bc5009f06b461b4e55477cfde17c99e0143f81a68156974c4972a01d4bb677f5d3ba594de7dff0e1fdb3d02f38db730", 0xce, 0x9}], 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt}, {@measure}]}) 17:07:20 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0xd}}) 17:07:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}}) 17:07:20 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x9}}, 0x34, 0x0) 17:07:20 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x4}}, 0x34, 0x0) 17:07:20 executing program 0: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) linkat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1400) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async) linkat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1400) (async) 17:07:20 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0xb}}, 0x34, 0x0) 17:07:20 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x6}}, 0x34, 0x0) 17:07:20 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff]}}) 17:07:20 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0xf}}, 0x34, 0x0) 17:07:20 executing program 3: sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x60, 0x3, 0x8, 0x801, 0x0, 0x0, {0x3, 0x0, 0x2}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0xa00}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_ESTABLISHED={0x8, 0x4, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_SCTP_HEARTBEAT_ACKED={0x8, 0x9, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_SCTP_HEARTBEAT_ACKED={0x8, 0x9, 0x1, 0x0, 0x7fffffff}, @CTA_TIMEOUT_SCTP_CLOSED={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_SCTP_SHUTDOWN_RECD={0x8, 0x6, 0x1, 0x0, 0xffff0000}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0xa01}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}]}, 0x60}, 0x1, 0x0, 0x0, 0x200008c4}, 0x20000000) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) [ 1424.082395][ T9985] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1424.098066][ T9977] 9pnet: Could not find request transport: xen [ 1424.116140][ T9993] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:20 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x7}}, 0x34, 0x0) [ 1424.129926][ T9987] loop4: detected capacity change from 0 to 2 [ 1424.136095][ T9987] nfs: Unknown parameter 'trans' 17:07:20 executing program 4: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000640), &(0x7f0000000680)='./file0\x00', 0x2, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="b33689f471b61e57f75a9373316884df28fa2e310b557b6e6be35f8399645c704695f7f8957443fe2b961e9d09d2179ea94d0908b43c23755d46f618603c0a42d3e176cfd119bacb28ea1165909b4e4513cbefa52c0305cc0fbcf0b258676d91f073cd5054c66b89e400ecae8a3640c957acad64d56d644d4b4b00296e7a03cf46aa3c43f8dcd5bcdcfd1401d32c9daebea20c5b849ddc4b564510836f86d6606bca2d2182d67d6b3c353b5ed0a19abad5282d76d0111068f1f2558a8626d22ff6f73a53a3167ef8df431b2d616aac6a4556c03f82575cf493e897f1d1a7d9c297c8ccea", 0xe4, 0x1}, {&(0x7f0000000880)="d2cb36e99a5a2e713ff0aeff6fc97bc5e73c57d204bc993cdb3bd2ca60947e14372c534f66a3e13fcedf5e91c9b5f4756681efce105c8eae0182b1a388b827d771e96c1c9bc21864e47f2be6f791e97ffffc0c2b832e66a26e3a7eb19b6fb0d6a579eb588ebf9a0ad30636e52b3a83321f3a096a5f0cce357feb61fac92027ecf3f5ce4ef8249f24", 0x88, 0x200}, {&(0x7f0000000940)="d3238af302769aaeb3045ef4d66767be26065ef1ba33d30e5c6e77404ac0964c106fcabcf26ad1050e4a21da5de18db7a8060d2706ed726fca06d756ad8822e7e19bd722218eee00", 0x48, 0x40}], 0x200004, &(0x7f0000000a40)={[{'trans=xen,'}, {'measure'}], [{@pcr={'pcr', 0x3d, 0x18}}, {@obj_user={'obj_user', 0x3d, '@\\{--,#})\xf2'}}]}) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) linkat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1000) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="dab145b2d3ca2b442c9a5466", 0xc, 0x7}, {&(0x7f00000002c0)="69a87f72ba9c6bee5c67569f737000d47a7815a1f1c82d523d20a4050a91c746bc8d47debac79b170edb6f41f8fd084bdcd8f6af9056eeb21f0d5e2d767d7a04314a23ab55ac96d7be2e0844ebecdbaa5dfc1ad30ebe658b7d65b3d351a54d0d4abcf412", 0x64, 0x4}, {&(0x7f0000000400)="ec879671b393bee9e15f02586b8fbd546531ca7477f95290ae618b1b847cc6285d3664cb706f5b480ed579cf11c6bb6a8f4534f6c4541730024276e78a92afb11a42fb0cb281327d5b259854b3381eed004e2ef090891b1bbefc98e3edebed29d219769b6b8ee499380e9c9e1e43ab2ef8b2c684fe128a47a624968750a582a741a88300d9424becac82ca358767b9c6d3f023d3e42dd33ea68da4b0f5194bc5009f06b461b4e55477cfde17c99e0143f81a68156974c4972a01d4bb677f5d3ba594de7dff0e1fdb3d02f38db730", 0xce, 0x9}], 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt}, {@measure}]}) 17:07:20 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0xe}}) 17:07:20 executing program 3: sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x60, 0x3, 0x8, 0x801, 0x0, 0x0, {0x3, 0x0, 0x2}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0xa00}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_ESTABLISHED={0x8, 0x4, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_SCTP_HEARTBEAT_ACKED={0x8, 0x9, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_SCTP_HEARTBEAT_ACKED={0x8, 0x9, 0x1, 0x0, 0x7fffffff}, @CTA_TIMEOUT_SCTP_CLOSED={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_SCTP_SHUTDOWN_RECD={0x8, 0x6, 0x1, 0x0, 0xffff0000}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0xa01}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}]}, 0x60}, 0x1, 0x0, 0x0, 0x200008c4}, 0x20000000) (async) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:20 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x10}}, 0x34, 0x0) 17:07:20 executing program 0: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) linkat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1400) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async) linkat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000040)='./file0\x00', 0x1400) (async) 17:07:20 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x8}}, 0x34, 0x0) [ 1424.190028][ T9987] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1424.198916][ T9987] tmpfs: Bad value for 'nr_inodes' 17:07:20 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x13}}, 0x34, 0x0) 17:07:20 executing program 3: sendmsg$IPCTNL_MSG_TIMEOUT_DEFAULT_SET(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x60, 0x3, 0x8, 0x801, 0x0, 0x0, {0x3, 0x0, 0x2}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0xa00}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @sctp=[@CTA_TIMEOUT_SCTP_ESTABLISHED={0x8, 0x4, 0x1, 0x0, 0x2}, @CTA_TIMEOUT_SCTP_HEARTBEAT_ACKED={0x8, 0x9, 0x1, 0x0, 0x4}, @CTA_TIMEOUT_SCTP_HEARTBEAT_ACKED={0x8, 0x9, 0x1, 0x0, 0x7fffffff}, @CTA_TIMEOUT_SCTP_CLOSED={0x8, 0x1, 0x1, 0x0, 0x5}, @CTA_TIMEOUT_SCTP_SHUTDOWN_RECD={0x8, 0x6, 0x1, 0x0, 0xffff0000}]}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0xa01}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x84}]}, 0x60}, 0x1, 0x0, 0x0, 0x200008c4}, 0x20000000) (async) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:20 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0xb}}, 0x34, 0x0) [ 1424.255903][T10012] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1424.290487][T10007] 9pnet: Could not find request transport: xen [ 1424.291011][T10016] loop4: detected capacity change from 0 to 2 17:07:20 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0xf}}, 0x34, 0x0) 17:07:20 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0x10}}) 17:07:20 executing program 3: recvmsg$unix(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000280), 0x6e, &(0x7f0000001580)=[{&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/69, 0x45}, {&(0x7f0000001380)=""/249, 0xf9}, {&(0x7f0000001480)=""/196, 0xc4}], 0x4}, 0x141) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) [ 1424.303856][T10019] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1424.309341][T10016] nfs: Unknown parameter 'trans' [ 1424.350917][T10016] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1424.376567][T10016] tmpfs: Bad value for 'nr_inodes' [ 1424.383623][T10030] 9pnet: Could not find request transport: xen 17:07:20 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000640), &(0x7f0000000680)='./file0\x00', 0x2, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="b33689f471b61e57f75a9373316884df28fa2e310b557b6e6be35f8399645c704695f7f8957443fe2b961e9d09d2179ea94d0908b43c23755d46f618603c0a42d3e176cfd119bacb28ea1165909b4e4513cbefa52c0305cc0fbcf0b258676d91f073cd5054c66b89e400ecae8a3640c957acad64d56d644d4b4b00296e7a03cf46aa3c43f8dcd5bcdcfd1401d32c9daebea20c5b849ddc4b564510836f86d6606bca2d2182d67d6b3c353b5ed0a19abad5282d76d0111068f1f2558a8626d22ff6f73a53a3167ef8df431b2d616aac6a4556c03f82575cf493e897f1d1a7d9c297c8ccea", 0xe4, 0x1}, {&(0x7f0000000880)="d2cb36e99a5a2e713ff0aeff6fc97bc5e73c57d204bc993cdb3bd2ca60947e14372c534f66a3e13fcedf5e91c9b5f4756681efce105c8eae0182b1a388b827d771e96c1c9bc21864e47f2be6f791e97ffffc0c2b832e66a26e3a7eb19b6fb0d6a579eb588ebf9a0ad30636e52b3a83321f3a096a5f0cce357feb61fac92027ecf3f5ce4ef8249f24", 0x88, 0x200}, {&(0x7f0000000940)="d3238af302769aaeb3045ef4d66767be26065ef1ba33d30e5c6e77404ac0964c106fcabcf26ad1050e4a21da5de18db7a8060d2706ed726fca06d756ad8822e7e19bd722218eee00", 0x48, 0x40}], 0x200004, &(0x7f0000000a40)={[{'trans=xen,'}, {'measure'}], [{@pcr={'pcr', 0x3d, 0x18}}, {@obj_user={'obj_user', 0x3d, '@\\{--,#})\xf2'}}]}) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="dab145b2d3ca2b442c9a5466", 0xc, 0x7}, {&(0x7f00000002c0)="69a87f72ba9c6bee5c67569f737000d47a7815a1f1c82d523d20a4050a91c746bc8d47debac79b170edb6f41f8fd084bdcd8f6af9056eeb21f0d5e2d767d7a04314a23ab55ac96d7be2e0844ebecdbaa5dfc1ad30ebe658b7d65b3d351a54d0d4abcf412", 0x64, 0x4}, {&(0x7f0000000400)="ec879671b393bee9e15f02586b8fbd546531ca7477f95290ae618b1b847cc6285d3664cb706f5b480ed579cf11c6bb6a8f4534f6c4541730024276e78a92afb11a42fb0cb281327d5b259854b3381eed004e2ef090891b1bbefc98e3edebed29d219769b6b8ee499380e9c9e1e43ab2ef8b2c684fe128a47a624968750a582a741a88300d9424becac82ca358767b9c6d3f023d3e42dd33ea68da4b0f5194bc5009f06b461b4e55477cfde17c99e0143f81a68156974c4972a01d4bb677f5d3ba594de7dff0e1fdb3d02f38db730", 0xce, 0x9}], 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt}, {@measure}]}) 17:07:20 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x17}}, 0x34, 0x0) 17:07:20 executing program 3: recvmsg$unix(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000280), 0x6e, &(0x7f0000001580)=[{&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/69, 0x45}, {&(0x7f0000001380)=""/249, 0xf9}, {&(0x7f0000001480)=""/196, 0xc4}], 0x4}, 0x141) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) recvmsg$unix(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000280), 0x6e, &(0x7f0000001580)=[{&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/69, 0x45}, {&(0x7f0000001380)=""/249, 0xf9}, {&(0x7f0000001480)=""/196, 0xc4}], 0x4}, 0x141) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) 17:07:20 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x10}}, 0x34, 0x0) 17:07:20 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getegid() lchown(&(0x7f00000002c0)='./file0\x00', 0xee00, r0) r1 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x9, 0x1, &(0x7f0000000180)=[{&(0x7f0000000080)="84e537363fb15cd6904df94b08c1da67a698370a3fb10f28d47e63d1befd95dd7ba16aa70615c174a4b4d82dcd3a94405b0cee187aab02205afbb66972be5818e6f743d7afe4a4f09666929ad3ba4daef202bdc90b25b595bbd1f0696c3fb92492534fa70556ccd83b2eceb576a38f8b407303a19fac51c86b0f329e0fdd127ad1c042ae2e2b6c588bae051772fcfca001405aaa3a89da7ba4183089f5338af20f21759bdefc1e86b95fcd6a7ffbc0fc3069b497c34ec9ac51897a27f1bc0cc4d8ceb5807535b9251694c2ebd0a48cc406a8d2f45cb7fb28d9b094de985dd721d5a3f5", 0xe3, 0xffffffff}], 0x204000, &(0x7f00000001c0)={[{')^-$*'}, {'staff_u'}], [{@dont_measure}, {@subj_role={'subj_role', 0x3d, ']&@:!\',{\'2'}}, {@dont_measure}, {@smackfstransmute={'smackfstransmute', 0x3d, '9p\x00'}}, {@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/*/@/@}['}}]}) fchownat(r1, &(0x7f0000000280)='./file0\x00', 0xee01, 0xee00, 0x1000) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:20 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0x11}}) 17:07:20 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x13}}, 0x34, 0x0) 17:07:20 executing program 3: recvmsg$unix(0xffffffffffffffff, &(0x7f00000015c0)={&(0x7f0000000280), 0x6e, &(0x7f0000001580)=[{&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/69, 0x45}, {&(0x7f0000001380)=""/249, 0xf9}, {&(0x7f0000001480)=""/196, 0xc4}], 0x4}, 0x141) (async) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:20 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x1b}}, 0x34, 0x0) [ 1424.441676][T10036] loop0: detected capacity change from 0 to 264192 [ 1424.468698][T10036] nfs: Unknown parameter ')^-$*' [ 1424.479205][T10049] loop4: detected capacity change from 0 to 2 17:07:20 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x560}}, 0x34, 0x0) 17:07:20 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x17}}, 0x34, 0x0) 17:07:20 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0x12}}) [ 1424.494747][T10043] 9pnet: Could not find request transport: xen [ 1424.494839][T10049] nfs: Unknown parameter 'trans' [ 1424.539889][T10036] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1424.573017][T10049] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1424.581720][T10058] 9pnet: Could not find request transport: xen [ 1424.599806][T10049] tmpfs: Bad value for 'nr_inodes' 17:07:20 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs(&(0x7f0000000640), &(0x7f0000000680)='./file0\x00', 0x2, 0x3, &(0x7f00000009c0)=[{&(0x7f0000000780)="b33689f471b61e57f75a9373316884df28fa2e310b557b6e6be35f8399645c704695f7f8957443fe2b961e9d09d2179ea94d0908b43c23755d46f618603c0a42d3e176cfd119bacb28ea1165909b4e4513cbefa52c0305cc0fbcf0b258676d91f073cd5054c66b89e400ecae8a3640c957acad64d56d644d4b4b00296e7a03cf46aa3c43f8dcd5bcdcfd1401d32c9daebea20c5b849ddc4b564510836f86d6606bca2d2182d67d6b3c353b5ed0a19abad5282d76d0111068f1f2558a8626d22ff6f73a53a3167ef8df431b2d616aac6a4556c03f82575cf493e897f1d1a7d9c297c8ccea", 0xe4, 0x1}, {&(0x7f0000000880)="d2cb36e99a5a2e713ff0aeff6fc97bc5e73c57d204bc993cdb3bd2ca60947e14372c534f66a3e13fcedf5e91c9b5f4756681efce105c8eae0182b1a388b827d771e96c1c9bc21864e47f2be6f791e97ffffc0c2b832e66a26e3a7eb19b6fb0d6a579eb588ebf9a0ad30636e52b3a83321f3a096a5f0cce357feb61fac92027ecf3f5ce4ef8249f24", 0x88, 0x200}, {&(0x7f0000000940)="d3238af302769aaeb3045ef4d66767be26065ef1ba33d30e5c6e77404ac0964c106fcabcf26ad1050e4a21da5de18db7a8060d2706ed726fca06d756ad8822e7e19bd722218eee00", 0x48, 0x40}], 0x200004, &(0x7f0000000a40)={[{'trans=xen,'}, {'measure'}], [{@pcr={'pcr', 0x3d, 0x18}}, {@obj_user={'obj_user', 0x3d, '@\\{--,#})\xf2'}}]}) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="dab145b2d3ca2b442c9a5466", 0xc, 0x7}, {&(0x7f00000002c0)="69a87f72ba9c6bee5c67569f737000d47a7815a1f1c82d523d20a4050a91c746bc8d47debac79b170edb6f41f8fd084bdcd8f6af9056eeb21f0d5e2d767d7a04314a23ab55ac96d7be2e0844ebecdbaa5dfc1ad30ebe658b7d65b3d351a54d0d4abcf412", 0x64, 0x4}, {&(0x7f0000000400)="ec879671b393bee9e15f02586b8fbd546531ca7477f95290ae618b1b847cc6285d3664cb706f5b480ed579cf11c6bb6a8f4534f6c4541730024276e78a92afb11a42fb0cb281327d5b259854b3381eed004e2ef090891b1bbefc98e3edebed29d219769b6b8ee499380e9c9e1e43ab2ef8b2c684fe128a47a624968750a582a741a88300d9424becac82ca358767b9c6d3f023d3e42dd33ea68da4b0f5194bc5009f06b461b4e55477cfde17c99e0143f81a68156974c4972a01d4bb677f5d3ba594de7dff0e1fdb3d02f38db730", 0xce, 0x9}], 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt}, {@measure}]}) 17:07:20 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:20 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getegid() lchown(&(0x7f00000002c0)='./file0\x00', 0xee00, r0) (async) r1 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x9, 0x1, &(0x7f0000000180)=[{&(0x7f0000000080)="84e537363fb15cd6904df94b08c1da67a698370a3fb10f28d47e63d1befd95dd7ba16aa70615c174a4b4d82dcd3a94405b0cee187aab02205afbb66972be5818e6f743d7afe4a4f09666929ad3ba4daef202bdc90b25b595bbd1f0696c3fb92492534fa70556ccd83b2eceb576a38f8b407303a19fac51c86b0f329e0fdd127ad1c042ae2e2b6c588bae051772fcfca001405aaa3a89da7ba4183089f5338af20f21759bdefc1e86b95fcd6a7ffbc0fc3069b497c34ec9ac51897a27f1bc0cc4d8ceb5807535b9251694c2ebd0a48cc406a8d2f45cb7fb28d9b094de985dd721d5a3f5", 0xe3, 0xffffffff}], 0x204000, &(0x7f00000001c0)={[{')^-$*'}, {'staff_u'}], [{@dont_measure}, {@subj_role={'subj_role', 0x3d, ']&@:!\',{\'2'}}, {@dont_measure}, {@smackfstransmute={'smackfstransmute', 0x3d, '9p\x00'}}, {@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/*/@/@}['}}]}) fchownat(r1, &(0x7f0000000280)='./file0\x00', 0xee01, 0xee00, 0x1000) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:20 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0x22}}) 17:07:20 executing program 3: syz_io_uring_setup(0x4298, &(0x7f00000002c0)={0x0, 0x1773, 0x10, 0x2, 0x3d}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000480), &(0x7f00000004c0)) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_io_uring_setup(0x5fb9, &(0x7f0000000340)={0x0, 0x144b, 0x1, 0x3, 0x227}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f00000003c0), &(0x7f0000000400)=0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3ff}, @generic={0x3, 0x9, 0x2, 0x1, 0x8a9d}]}, &(0x7f0000000540)='GPL\x00', 0x1, 0xd1, &(0x7f0000000580)=""/209, 0x40f00, 0x11, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000006c0)={0x4, 0xe, 0x9, 0x4}, 0x10, 0xffffffffffffffff}, 0x80) syz_io_uring_submit(0x0, r1, &(0x7f0000000440)=@IORING_OP_NOP={0x0, 0x1}, 0x4) syz_io_uring_submit(0x0, r1, &(0x7f0000000280)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd=r0, 0x0, 0x0, 0x0, {0x2}}, 0x8001) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:20 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x1b}}, 0x34, 0x0) 17:07:20 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x2}}, 0x34, 0x0) 17:07:20 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x64f}}, 0x34, 0x0) 17:07:20 executing program 3: syz_io_uring_setup(0x4298, &(0x7f00000002c0)={0x0, 0x1773, 0x10, 0x2, 0x3d}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000480), &(0x7f00000004c0)) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_io_uring_setup(0x5fb9, &(0x7f0000000340)={0x0, 0x144b, 0x1, 0x3, 0x227}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f00000003c0), &(0x7f0000000400)=0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3ff}, @generic={0x3, 0x9, 0x2, 0x1, 0x8a9d}]}, &(0x7f0000000540)='GPL\x00', 0x1, 0xd1, &(0x7f0000000580)=""/209, 0x40f00, 0x11, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000006c0)={0x4, 0xe, 0x9, 0x4}, 0x10, 0xffffffffffffffff}, 0x80) syz_io_uring_submit(0x0, r1, &(0x7f0000000440)=@IORING_OP_NOP={0x0, 0x1}, 0x4) syz_io_uring_submit(0x0, r1, &(0x7f0000000280)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd=r0, 0x0, 0x0, 0x0, {0x2}}, 0x8001) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) syz_io_uring_setup(0x4298, &(0x7f00000002c0)={0x0, 0x1773, 0x10, 0x2, 0x3d}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000480), &(0x7f00000004c0)) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) syz_io_uring_setup(0x5fb9, &(0x7f0000000340)={0x0, 0x144b, 0x1, 0x3, 0x227}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f00000003c0), &(0x7f0000000400)) (async) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3ff}, @generic={0x3, 0x9, 0x2, 0x1, 0x8a9d}]}, &(0x7f0000000540)='GPL\x00', 0x1, 0xd1, &(0x7f0000000580)=""/209, 0x40f00, 0x11, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000006c0)={0x4, 0xe, 0x9, 0x4}, 0x10, 0xffffffffffffffff}, 0x80) (async) syz_io_uring_submit(0x0, r1, &(0x7f0000000440)=@IORING_OP_NOP={0x0, 0x1}, 0x4) (async) syz_io_uring_submit(0x0, r1, &(0x7f0000000280)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd=r0, 0x0, 0x0, 0x0, {0x2}}, 0x8001) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) 17:07:20 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x7af}}, 0x34, 0x0) 17:07:20 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0x25}}) [ 1424.655148][T10069] loop0: detected capacity change from 0 to 264192 [ 1424.673409][T10069] nfs: Unknown parameter ')^-$*' [ 1424.682416][T10074] loop4: detected capacity change from 0 to 2 [ 1424.688625][T10074] nfs: Unknown parameter 'trans' [ 1424.692137][T10071] 9pnet: Could not find request transport: xen 17:07:20 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x4}}, 0x34, 0x0) [ 1424.719768][T10069] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1424.740242][T10074] tmpfs: Bad value for 'nr_inodes' 17:07:20 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="dab145b2d3ca2b442c9a5466", 0xc, 0x7}, {&(0x7f00000002c0)="69a87f72ba9c6bee5c67569f737000d47a7815a1f1c82d523d20a4050a91c746bc8d47debac79b170edb6f41f8fd084bdcd8f6af9056eeb21f0d5e2d767d7a04314a23ab55ac96d7be2e0844ebecdbaa5dfc1ad30ebe658b7d65b3d351a54d0d4abcf412", 0x64, 0x4}, {&(0x7f0000000400)="ec879671b393bee9e15f02586b8fbd546531ca7477f95290ae618b1b847cc6285d3664cb706f5b480ed579cf11c6bb6a8f4534f6c4541730024276e78a92afb11a42fb0cb281327d5b259854b3381eed004e2ef090891b1bbefc98e3edebed29d219769b6b8ee499380e9c9e1e43ab2ef8b2c684fe128a47a624968750a582a741a88300d9424becac82ca358767b9c6d3f023d3e42dd33ea68da4b0f5194bc5009f06b461b4e55477cfde17c99e0143f81a68156974c4972a01d4bb677f5d3ba594de7dff0e1fdb3d02f38db730", 0xce, 0x9}], 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt}, {@measure}]}) 17:07:20 executing program 3: syz_io_uring_setup(0x4298, &(0x7f00000002c0)={0x0, 0x1773, 0x10, 0x2, 0x3d}, &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000000480), &(0x7f00000004c0)) (async) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) syz_io_uring_setup(0x5fb9, &(0x7f0000000340)={0x0, 0x144b, 0x1, 0x3, 0x227}, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff1000/0xf000)=nil, &(0x7f00000003c0), &(0x7f0000000400)=0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000700)=@bpf_lsm={0x1d, 0x6, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x7}, [@initr0={0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x3ff}, @generic={0x3, 0x9, 0x2, 0x1, 0x8a9d}]}, &(0x7f0000000540)='GPL\x00', 0x1, 0xd1, &(0x7f0000000580)=""/209, 0x40f00, 0x11, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000006c0)={0x4, 0xe, 0x9, 0x4}, 0x10, 0xffffffffffffffff}, 0x80) (async) syz_io_uring_submit(0x0, r1, &(0x7f0000000440)=@IORING_OP_NOP={0x0, 0x1}, 0x4) syz_io_uring_submit(0x0, r1, &(0x7f0000000280)=@IORING_OP_POLL_ADD={0x6, 0x1, 0x0, @fd=r0, 0x0, 0x0, 0x0, {0x2}}, 0x8001) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:20 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:20 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getegid() lchown(&(0x7f00000002c0)='./file0\x00', 0xee00, r0) r1 = syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x9, 0x1, &(0x7f0000000180)=[{&(0x7f0000000080)="84e537363fb15cd6904df94b08c1da67a698370a3fb10f28d47e63d1befd95dd7ba16aa70615c174a4b4d82dcd3a94405b0cee187aab02205afbb66972be5818e6f743d7afe4a4f09666929ad3ba4daef202bdc90b25b595bbd1f0696c3fb92492534fa70556ccd83b2eceb576a38f8b407303a19fac51c86b0f329e0fdd127ad1c042ae2e2b6c588bae051772fcfca001405aaa3a89da7ba4183089f5338af20f21759bdefc1e86b95fcd6a7ffbc0fc3069b497c34ec9ac51897a27f1bc0cc4d8ceb5807535b9251694c2ebd0a48cc406a8d2f45cb7fb28d9b094de985dd721d5a3f5", 0xe3, 0xffffffff}], 0x204000, &(0x7f00000001c0)={[{')^-$*'}, {'staff_u'}], [{@dont_measure}, {@subj_role={'subj_role', 0x3d, ']&@:!\',{\'2'}}, {@dont_measure}, {@smackfstransmute={'smackfstransmute', 0x3d, '9p\x00'}}, {@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/*/@/@}['}}]}) fchownat(r1, &(0x7f0000000280)='./file0\x00', 0xee01, 0xee00, 0x1000) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) getegid() (async) lchown(&(0x7f00000002c0)='./file0\x00', 0xee00, r0) (async) syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x9, 0x1, &(0x7f0000000180)=[{&(0x7f0000000080)="84e537363fb15cd6904df94b08c1da67a698370a3fb10f28d47e63d1befd95dd7ba16aa70615c174a4b4d82dcd3a94405b0cee187aab02205afbb66972be5818e6f743d7afe4a4f09666929ad3ba4daef202bdc90b25b595bbd1f0696c3fb92492534fa70556ccd83b2eceb576a38f8b407303a19fac51c86b0f329e0fdd127ad1c042ae2e2b6c588bae051772fcfca001405aaa3a89da7ba4183089f5338af20f21759bdefc1e86b95fcd6a7ffbc0fc3069b497c34ec9ac51897a27f1bc0cc4d8ceb5807535b9251694c2ebd0a48cc406a8d2f45cb7fb28d9b094de985dd721d5a3f5", 0xe3, 0xffffffff}], 0x204000, &(0x7f00000001c0)={[{')^-$*'}, {'staff_u'}], [{@dont_measure}, {@subj_role={'subj_role', 0x3d, ']&@:!\',{\'2'}}, {@dont_measure}, {@smackfstransmute={'smackfstransmute', 0x3d, '9p\x00'}}, {@dont_appraise}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@smackfstransmute={'smackfstransmute', 0x3d, '/*/@/@}['}}]}) (async) fchownat(r1, &(0x7f0000000280)='./file0\x00', 0xee01, 0xee00, 0x1000) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async) 17:07:20 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0x48}}) 17:07:20 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x6}}, 0x34, 0x0) [ 1424.766340][T10089] 9pnet: Could not find request transport: xen [ 1424.789112][T10102] loop0: detected capacity change from 0 to 264192 17:07:20 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x2}}, 0x34, 0x0) 17:07:20 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x8}}, 0x34, 0x0) 17:07:20 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x4}}, 0x34, 0x0) [ 1424.816086][T10102] nfs: Unknown parameter ')^-$*' [ 1424.816726][T10104] tmpfs: Bad value for 'nr_inodes' [ 1424.851721][T10102] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:20 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x6}}, 0x34, 0x0) 17:07:20 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0xc}}, 0x34, 0x0) [ 1424.866990][T10107] 9pnet: Could not find request transport: xen 17:07:20 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0x4c}}) 17:07:20 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="dab145b2d3ca2b442c9a5466", 0xc, 0x7}, {&(0x7f00000002c0)="69a87f72ba9c6bee5c67569f737000d47a7815a1f1c82d523d20a4050a91c746bc8d47debac79b170edb6f41f8fd084bdcd8f6af9056eeb21f0d5e2d767d7a04314a23ab55ac96d7be2e0844ebecdbaa5dfc1ad30ebe658b7d65b3d351a54d0d4abcf412", 0x64, 0x4}, {&(0x7f0000000400)="ec879671b393bee9e15f02586b8fbd546531ca7477f95290ae618b1b847cc6285d3664cb706f5b480ed579cf11c6bb6a8f4534f6c4541730024276e78a92afb11a42fb0cb281327d5b259854b3381eed004e2ef090891b1bbefc98e3edebed29d219769b6b8ee499380e9c9e1e43ab2ef8b2c684fe128a47a624968750a582a741a88300d9424becac82ca358767b9c6d3f023d3e42dd33ea68da4b0f5194bc5009f06b461b4e55477cfde17c99e0143f81a68156974c4972a01d4bb677f5d3ba594de7dff0e1fdb3d02f38db730", 0xce, 0x9}], 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt}, {@measure}]}) 17:07:20 executing program 3: sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3ff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1ff}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x100}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x6a}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}]}, 0x54}}, 0x4000) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x28, 0x16, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_FLAGS={0x8}]}, @NFT_MSG_NEWCHAIN={0x28, 0x3, 0xa, 0x0, 0x0, 0x0, {0x2, 0x0, 0x3}, [@NFTA_CHAIN_ID={0x8}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}], {0x14}}, 0x78}, 0x1, 0x0, 0x0, 0x28040}, 0x240040c1) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f00000008c0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x2000000}, 0xffffffffffffff85, &(0x7f0000000880)={&(0x7f0000000a40)=ANY=[@ANYBLOB="87eb1b0146b53af72c58df6d0cb60b7de071db6dd2806c951ba5e4bf5ce1bd89bd67b283e076cda5861ae915fe5add365e43a2de3001fdc6b016b31a72b77e2e6ca91c9854d433ea11bc75b2aac990f6bbc3b20b2c", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf251100000005002f00000000006e0f00000b0089060000"], 0x34}, 0x1, 0x0, 0x0, 0x40040}, 0x20006000) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="4b00eb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001d965ae80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000850000000000000000000000000000000000000000000000000600000000000000000000000022000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000acf9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000356e0000000700000003000000000000000000000000000000000000000000000069e6c12fb36cd7af29685ea42bd33238fc737713bafd4273ac53ac7f9f60dacee54d8be6c2568e3636573940cecf1ef232cdd43174ead66ea2779d5b3779ae2671eeab639d05d332fbac0000000000"]}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000200)) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000940), r1) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400480}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044004}, 0x4) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82307201, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000ac0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000bc0)={&(0x7f0000000840), 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x4c, r4, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x57b}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x4}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8001}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r5) setsockopt$TIPC_GROUP_LEAVE(r5, 0x10f, 0x88) [ 1424.902301][T10117] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1424.902425][T10116] loop0: detected capacity change from 0 to 264192 [ 1424.939206][T10125] tmpfs: Bad value for 'nr_inodes' 17:07:21 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x8}}, 0x34, 0x0) 17:07:21 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0xd}}, 0x34, 0x0) 17:07:21 executing program 3: sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3ff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1ff}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x100}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x6a}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}]}, 0x54}}, 0x4000) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x28, 0x16, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_FLAGS={0x8}]}, @NFT_MSG_NEWCHAIN={0x28, 0x3, 0xa, 0x0, 0x0, 0x0, {0x2, 0x0, 0x3}, [@NFTA_CHAIN_ID={0x8}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}], {0x14}}, 0x78}, 0x1, 0x0, 0x0, 0x28040}, 0x240040c1) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f00000008c0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x2000000}, 0xffffffffffffff85, &(0x7f0000000880)={&(0x7f0000000a40)=ANY=[@ANYBLOB="87eb1b0146b53af72c58df6d0cb60b7de071db6dd2806c951ba5e4bf5ce1bd89bd67b283e076cda5861ae915fe5add365e43a2de3001fdc6b016b31a72b77e2e6ca91c9854d433ea11bc75b2aac990f6bbc3b20b2c", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf251100000005002f00000000006e0f00000b0089060000"], 0x34}, 0x1, 0x0, 0x0, 0x40040}, 0x20006000) (async) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="4b00eb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001d965ae80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000850000000000000000000000000000000000000000000000000600000000000000000000000022000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000acf9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000356e0000000700000003000000000000000000000000000000000000000000000069e6c12fb36cd7af29685ea42bd33238fc737713bafd4273ac53ac7f9f60dacee54d8be6c2568e3636573940cecf1ef232cdd43174ead66ea2779d5b3779ae2671eeab639d05d332fbac0000000000"]}) (async) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000200)) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000940), r1) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400480}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044004}, 0x4) (async) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82307201, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000ac0), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000bc0)={&(0x7f0000000840), 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x4c, r4, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x57b}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x4}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8001}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r5) (async) setsockopt$TIPC_GROUP_LEAVE(r5, 0x10f, 0x88) 17:07:21 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0xc}}, 0x34, 0x0) 17:07:21 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000240)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="dab145b2d3ca2b442c9a5466", 0xc, 0x7}, {&(0x7f00000002c0)="69a87f72ba9c6bee5c67569f737000d47a7815a1f1c82d523d20a4050a91c746bc8d47debac79b170edb6f41f8fd084bdcd8f6af9056eeb21f0d5e2d767d7a04314a23ab55ac96d7be2e0844ebecdbaa5dfc1ad30ebe658b7d65b3d351a54d0d4abcf412", 0x64, 0x4}, {&(0x7f0000000400)="ec879671b393bee9e15f02586b8fbd546531ca7477f95290ae618b1b847cc6285d3664cb706f5b480ed579cf11c6bb6a8f4534f6c4541730024276e78a92afb11a42fb0cb281327d5b259854b3381eed004e2ef090891b1bbefc98e3edebed29d219769b6b8ee499380e9c9e1e43ab2ef8b2c684fe128a47a624968750a582a741a88300d9424becac82ca358767b9c6d3f023d3e42dd33ea68da4b0f5194bc5009f06b461b4e55477cfde17c99e0143f81a68156974c4972a01d4bb677f5d3ba594de7dff0e1fdb3d02f38db730", 0xce, 0x9}], 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt}, {@measure}]}) 17:07:21 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0x60}}) 17:07:21 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0xd}}, 0x34, 0x0) [ 1424.948400][T10128] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=48 sclass=netlink_xfrm_socket pid=10128 comm=syz-executor.3 [ 1424.967892][T10122] 9pnet: Could not find request transport: xen [ 1424.972965][T10116] nfs: Unknown parameter ')^-$*' 17:07:21 executing program 3: sendmsg$BATADV_CMD_SET_VLAN(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x54, 0x0, 0x200, 0x70bd27, 0x25dfdbfe, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x3ff}, @BATADV_ATTR_GW_SEL_CLASS={0x8, 0x34, 0x1ff}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x100}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x6a}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x8}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x4}, @BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x4}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}]}, 0x54}}, 0x4000) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async, rerun: 32) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000007c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000740)={{0x14}, [@NFT_MSG_NEWFLOWTABLE={0x28, 0x16, 0xa, 0x3, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x3}, @NFTA_FLOWTABLE_FLAGS={0x8}]}, @NFT_MSG_NEWCHAIN={0x28, 0x3, 0xa, 0x0, 0x0, 0x0, {0x2, 0x0, 0x3}, [@NFTA_CHAIN_ID={0x8}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}], {0x14}}, 0x78}, 0x1, 0x0, 0x0, 0x28040}, 0x240040c1) (async, rerun: 32) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_VLAN(r1, &(0x7f00000008c0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x2000000}, 0xffffffffffffff85, &(0x7f0000000880)={&(0x7f0000000a40)=ANY=[@ANYBLOB="87eb1b0146b53af72c58df6d0cb60b7de071db6dd2806c951ba5e4bf5ce1bd89bd67b283e076cda5861ae915fe5add365e43a2de3001fdc6b016b31a72b77e2e6ca91c9854d433ea11bc75b2aac990f6bbc3b20b2c", @ANYRES16=0x0, @ANYBLOB="02002abd7000fbdbdf251100000005002f00000000006e0f00000b0089060000"], 0x34}, 0x1, 0x0, 0x0, 0x40040}, 0x20006000) (async) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="4b00eb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001d965ae80000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000850000000000000000000000000000000000000000000000000600000000000000000000000022000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000acf9000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000356e0000000700000003000000000000000000000000000000000000000000000069e6c12fb36cd7af29685ea42bd33238fc737713bafd4273ac53ac7f9f60dacee54d8be6c2568e3636573940cecf1ef232cdd43174ead66ea2779d5b3779ae2671eeab639d05d332fbac0000000000"]}) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r2, 0x8933, &(0x7f0000000200)) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000940), r1) sendmsg$BATADV_CMD_GET_MCAST_FLAGS(r0, &(0x7f0000000a00)={&(0x7f0000000900)={0x10, 0x0, 0x0, 0x400480}, 0xc, &(0x7f00000009c0)={&(0x7f0000000980)={0x1c, r3, 0x4, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_VLANID={0x6, 0x28, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4044004}, 0x4) (async) ioctl$VFAT_IOCTL_READDIR_BOTH(r2, 0x82307201, &(0x7f0000000280)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async, rerun: 64) r4 = syz_genetlink_get_family_id$batadv(&(0x7f0000000ac0), 0xffffffffffffffff) (rerun: 64) sendmsg$BATADV_CMD_GET_NEIGHBORS(r1, &(0x7f0000000bc0)={&(0x7f0000000840), 0xc, &(0x7f0000000b80)={&(0x7f0000000b00)={0x4c, r4, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x57b}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x4}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x6}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8001}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) (async, rerun: 32) pipe(&(0x7f0000000000)={0xffffffffffffffff}) (rerun: 32) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r5) (async, rerun: 64) setsockopt$TIPC_GROUP_LEAVE(r5, 0x10f, 0x88) (rerun: 64) 17:07:21 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x24}}, 0x34, 0x0) 17:07:21 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000240)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="dab145b2d3ca2b442c9a5466", 0xc, 0x7}, {&(0x7f00000002c0)="69a87f72ba9c6bee5c67569f737000d47a7815a1f1c82d523d20a4050a91c746bc8d47debac79b170edb6f41f8fd084bdcd8f6af9056eeb21f0d5e2d767d7a04314a23ab55ac96d7be2e0844ebecdbaa5dfc1ad30ebe658b7d65b3d351a54d0d4abcf412", 0x64, 0x4}, {&(0x7f0000000400)="ec879671b393bee9e15f02586b8fbd546531ca7477f95290ae618b1b847cc6285d3664cb706f5b480ed579cf11c6bb6a8f4534f6c4541730024276e78a92afb11a42fb0cb281327d5b259854b3381eed004e2ef090891b1bbefc98e3edebed29d219769b6b8ee499380e9c9e1e43ab2ef8b2c684fe128a47a624968750a582a741a88300d9424becac82ca358767b9c6d3f023d3e42dd33ea68da4b0f5194bc5009f06b461b4e55477cfde17c99e0143f81a68156974c4972a01d4bb677f5d3ba594de7dff0e1fdb3d02f38db730", 0xce, 0x9}], 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt}, {@measure}]}) 17:07:21 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005700"/520]}) 17:07:21 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x281}}, 0x34, 0x0) 17:07:21 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x24}}, 0x34, 0x0) [ 1425.046566][T10142] 9pnet: Could not find request transport: xen 17:07:21 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x600}}, 0x34, 0x0) 17:07:21 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0x68}}) 17:07:21 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005700"/520]}) 17:07:21 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000140)={'trans=xen,', {[{@debug={'debug', 0x3d, 0x9}}, {@access_client}, {@access_uid}, {@cache_none}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@dont_hash}, {@uid_lt={'uid<', r0}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@obj_type={'obj_type', 0x3d, 'rootcontext'}}, {@obj_type={'obj_type', 0x3d, ' ,}\\'}}]}}) 17:07:21 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0xc00}}, 0x34, 0x0) 17:07:21 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000240)='./file0\x00', 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="dab145b2d3ca2b442c9a5466", 0xc, 0x7}, {&(0x7f00000002c0)="69a87f72ba9c6bee5c67569f737000d47a7815a1f1c82d523d20a4050a91c746bc8d47debac79b170edb6f41f8fd084bdcd8f6af9056eeb21f0d5e2d767d7a04314a23ab55ac96d7be2e0844ebecdbaa5dfc1ad30ebe658b7d65b3d351a54d0d4abcf412", 0x64, 0x4}, {&(0x7f0000000400)="ec879671b393bee9e15f02586b8fbd546531ca7477f95290ae618b1b847cc6285d3664cb706f5b480ed579cf11c6bb6a8f4534f6c4541730024276e78a92afb11a42fb0cb281327d5b259854b3381eed004e2ef090891b1bbefc98e3edebed29d219769b6b8ee499380e9c9e1e43ab2ef8b2c684fe128a47a624968750a582a741a88300d9424becac82ca358767b9c6d3f023d3e42dd33ea68da4b0f5194bc5009f06b461b4e55477cfde17c99e0143f81a68156974c4972a01d4bb677f5d3ba594de7dff0e1fdb3d02f38db730", 0xce, 0x9}], 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt}, {@measure}]}) 17:07:21 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x281}}, 0x34, 0x0) 17:07:21 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000140)={'trans=xen,', {[{@debug={'debug', 0x3d, 0x9}}, {@access_client}, {@access_uid}, {@cache_none}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@dont_hash}, {@uid_lt={'uid<', r0}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@obj_type={'obj_type', 0x3d, 'rootcontext'}}, {@obj_type={'obj_type', 0x3d, ' ,}\\'}}]}}) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000140)={'trans=xen,', {[{@debug={'debug', 0x3d, 0x9}}, {@access_client}, {@access_uid}, {@cache_none}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@dont_hash}, {@uid_lt={'uid<', r0}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@obj_type={'obj_type', 0x3d, 'rootcontext'}}, {@obj_type={'obj_type', 0x3d, ' ,}\\'}}]}}) (async) 17:07:21 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x600}}, 0x34, 0x0) 17:07:21 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005700"/520]}) [ 1425.124480][T10166] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:21 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0xd00}}, 0x34, 0x0) 17:07:21 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="200026bd7000fcdbdf25050000000a0009000180c200000200000500330000000000dd6d000000e687c8c0a8e105d05c7a823f89400a0c422831874dcf7434bd351454a9ed1f31a84b608861c67a52a7af7a4410bb27765747cc9302e79c34241adfedc7608bc676"], 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x2000c845) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140), r0) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r3, 0x1, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x24000001) bind$unix(r1, &(0x7f0000000240)=@abs={0x1, 0x0, 0x4e24}, 0x6e) 17:07:21 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), 0x0, 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="dab145b2d3ca2b442c9a5466", 0xc, 0x7}, {&(0x7f00000002c0)="69a87f72ba9c6bee5c67569f737000d47a7815a1f1c82d523d20a4050a91c746bc8d47debac79b170edb6f41f8fd084bdcd8f6af9056eeb21f0d5e2d767d7a04314a23ab55ac96d7be2e0844ebecdbaa5dfc1ad30ebe658b7d65b3d351a54d0d4abcf412", 0x64, 0x4}, {&(0x7f0000000400)="ec879671b393bee9e15f02586b8fbd546531ca7477f95290ae618b1b847cc6285d3664cb706f5b480ed579cf11c6bb6a8f4534f6c4541730024276e78a92afb11a42fb0cb281327d5b259854b3381eed004e2ef090891b1bbefc98e3edebed29d219769b6b8ee499380e9c9e1e43ab2ef8b2c684fe128a47a624968750a582a741a88300d9424becac82ca358767b9c6d3f023d3e42dd33ea68da4b0f5194bc5009f06b461b4e55477cfde17c99e0143f81a68156974c4972a01d4bb677f5d3ba594de7dff0e1fdb3d02f38db730", 0xce, 0x9}], 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt}, {@measure}]}) 17:07:21 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0x6c}}) 17:07:21 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0xc00}}, 0x34, 0x0) 17:07:21 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x1394}}, 0x34, 0x0) 17:07:21 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) (async) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="200026bd7000fcdbdf25050000000a0009000180c200000200000500330000000000dd6d000000e687c8c0a8e105d05c7a823f89400a0c422831874dcf7434bd351454a9ed1f31a84b608861c67a52a7af7a4410bb27765747cc9302e79c34241adfedc7608bc676"], 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x2000c845) (async) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140), r0) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r3, 0x1, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x24000001) (async) bind$unix(r1, &(0x7f0000000240)=@abs={0x1, 0x0, 0x4e24}, 0x6e) [ 1425.189833][T10169] 9pnet: Could not find request transport: xen [ 1425.197694][T10178] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:21 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0xd00}}, 0x34, 0x0) 17:07:21 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x2000}}, 0x34, 0x0) 17:07:21 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getresuid(&(0x7f0000000080), &(0x7f00000000c0), &(0x7f0000000100)=0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000140)={'trans=xen,', {[{@debug={'debug', 0x3d, 0x9}}, {@access_client}, {@access_uid}, {@cache_none}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@dont_hash}, {@uid_lt={'uid<', r0}}, {@fowner_eq={'fowner', 0x3d, r0}}, {@obj_type={'obj_type', 0x3d, 'rootcontext'}}, {@obj_type={'obj_type', 0x3d, ' ,}\\'}}]}}) 17:07:21 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="200026bd7000fcdbdf25050000000a0009000180c200000200000500330000000000dd6d000000e687c8c0a8e105d05c7a823f89400a0c422831874dcf7434bd351454a9ed1f31a84b608861c67a52a7af7a4410bb27765747cc9302e79c34241adfedc7608bc676"], 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x2000c845) socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$batadv(&(0x7f0000000140), r0) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r3, 0x1, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x24000001) bind$unix(r1, &(0x7f0000000240)=@abs={0x1, 0x0, 0x4e24}, 0x6e) pipe(&(0x7f0000000000)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) (async) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f00000000c0)={&(0x7f0000000000), 0xc, &(0x7f0000000080)={&(0x7f00000002c0)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="200026bd7000fcdbdf25050000000a0009000180c200000200000500330000000000dd6d000000e687c8c0a8e105d05c7a823f89400a0c422831874dcf7434bd351454a9ed1f31a84b608861c67a52a7af7a4410bb27765747cc9302e79c34241adfedc7608bc676"], 0x28}, 0x1, 0x0, 0x0, 0x4000}, 0x2000c845) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) socket$nl_generic(0x10, 0x3, 0x10) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000140), r0) (async) sendmsg$BATADV_CMD_GET_GATEWAYS(r2, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r3, 0x1, 0x70bd2a, 0x25dfdbff, {}, [@BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000}, 0x24000001) (async) bind$unix(r1, &(0x7f0000000240)=@abs={0x1, 0x0, 0x4e24}, 0x6e) (async) 17:07:21 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), 0x0, 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="dab145b2d3ca2b442c9a5466", 0xc, 0x7}, {&(0x7f00000002c0)="69a87f72ba9c6bee5c67569f737000d47a7815a1f1c82d523d20a4050a91c746bc8d47debac79b170edb6f41f8fd084bdcd8f6af9056eeb21f0d5e2d767d7a04314a23ab55ac96d7be2e0844ebecdbaa5dfc1ad30ebe658b7d65b3d351a54d0d4abcf412", 0x64, 0x4}, {&(0x7f0000000400)="ec879671b393bee9e15f02586b8fbd546531ca7477f95290ae618b1b847cc6285d3664cb706f5b480ed579cf11c6bb6a8f4534f6c4541730024276e78a92afb11a42fb0cb281327d5b259854b3381eed004e2ef090891b1bbefc98e3edebed29d219769b6b8ee499380e9c9e1e43ab2ef8b2c684fe128a47a624968750a582a741a88300d9424becac82ca358767b9c6d3f023d3e42dd33ea68da4b0f5194bc5009f06b461b4e55477cfde17c99e0143f81a68156974c4972a01d4bb677f5d3ba594de7dff0e1fdb3d02f38db730", 0xce, 0x9}], 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt}, {@measure}]}) 17:07:21 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x1361}}, 0x34, 0x0) 17:07:21 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x2400}}, 0x34, 0x0) 17:07:21 executing program 0: getresuid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000180)) syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x10000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0e62cddea2b2b12325d5fd87419619b17c88f8590b", 0x15, 0x1}], 0x204010, &(0x7f00000001c0)={[{'+@#^-'}, {'trans=xen,'}, {}, {'rootcontext'}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@fsname={'fsname', 0x3d, 'rootcontext'}}, {@euid_lt={'euid<', r0}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) recvmmsg$unix(r1, &(0x7f0000008040)=[{{&(0x7f0000000240), 0x6e, &(0x7f0000001840)=[{&(0x7f00000002c0)=""/195, 0xc3}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/177, 0xb1}, {&(0x7f00000004c0)=""/204, 0xcc}, {&(0x7f00000005c0)=""/148, 0x94}, {&(0x7f0000001780)=""/137, 0x89}], 0x6, &(0x7f00000018c0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}}, {{&(0x7f0000001980)=@abs, 0x6e, &(0x7f0000000680)=[{&(0x7f0000001a00)=""/146, 0x92}, {&(0x7f0000001ac0)=""/173, 0xad}, {&(0x7f0000001b80)=""/201, 0xc9}], 0x3, &(0x7f0000001c80)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}}, {{&(0x7f0000001d00), 0x6e, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x88}}, {{&(0x7f0000001e80)=@abs, 0x6e, &(0x7f0000004000)=[{&(0x7f0000001f00)=""/114, 0x72}, {&(0x7f0000001f80)=""/91, 0x5b}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/4096, 0x1000}], 0x4, &(0x7f0000004040)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{0x0, 0x0, &(0x7f0000005440)=[{&(0x7f0000004080)=""/18, 0x12}, {&(0x7f00000040c0)=""/4096, 0x1000}, {&(0x7f00000050c0)=""/255, 0xff}, {&(0x7f00000051c0)=""/182, 0xb6}, {&(0x7f0000005280)=""/23, 0x17}, {&(0x7f00000052c0)=""/86, 0x56}, {&(0x7f0000005340)=""/16, 0x10}, {&(0x7f0000005380)=""/169, 0xa9}], 0x8}}, {{&(0x7f00000054c0), 0x6e, &(0x7f0000006600)=[{&(0x7f0000005540)=""/120, 0x78}, {&(0x7f00000055c0)=""/28, 0x1c}, {&(0x7f0000005600)=""/4096, 0x1000}], 0x3, &(0x7f0000006640)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f0000006700)=@abs, 0x6e, &(0x7f0000006800)=[{&(0x7f0000006780)=""/116, 0x74}], 0x1, &(0x7f0000006840)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f00000068c0), 0x6e, &(0x7f0000007c80)=[{&(0x7f0000006940)=""/140, 0x8c}, {&(0x7f0000006a00)=""/4096, 0x1000}, {&(0x7f0000007a00)=""/73, 0x49}, {&(0x7f0000007a80)=""/195, 0xc3}, {&(0x7f0000007b80)=""/209, 0xd1}], 0x5, &(0x7f0000007d00)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}}, {{&(0x7f0000007e40)=@abs, 0x6e, &(0x7f0000007fc0)=[{&(0x7f0000007ec0)=""/202, 0xca}], 0x1, &(0x7f0000008000)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}], 0x9, 0x20, &(0x7f0000008280)={0x77359400}) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) [ 1425.283624][T10206] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1425.284189][T10192] 9pnet: Could not find request transport: xen 17:07:21 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0x74}}) 17:07:21 executing program 3: pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getpeername(r0, &(0x7f0000000000)=@hci, &(0x7f0000000080)=0x80) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000e3ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bee0c8a500000000"]}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000004c0)={{0x0, 0x0, 0x1fa90733, 0x401, 0x1, 0x8, 0x9, 0x6, 0xa5, 0x5e1, 0x2, 0x4, 0x6, 0xf411, 0x7f}}) 17:07:21 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x2000}}, 0x34, 0x0) 17:07:21 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x3f00}}, 0x34, 0x0) 17:07:21 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x2400}}, 0x34, 0x0) 17:07:21 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), 0x0, 0x5, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="dab145b2d3ca2b442c9a5466", 0xc, 0x7}, {&(0x7f00000002c0)="69a87f72ba9c6bee5c67569f737000d47a7815a1f1c82d523d20a4050a91c746bc8d47debac79b170edb6f41f8fd084bdcd8f6af9056eeb21f0d5e2d767d7a04314a23ab55ac96d7be2e0844ebecdbaa5dfc1ad30ebe658b7d65b3d351a54d0d4abcf412", 0x64, 0x4}, {&(0x7f0000000400)="ec879671b393bee9e15f02586b8fbd546531ca7477f95290ae618b1b847cc6285d3664cb706f5b480ed579cf11c6bb6a8f4534f6c4541730024276e78a92afb11a42fb0cb281327d5b259854b3381eed004e2ef090891b1bbefc98e3edebed29d219769b6b8ee499380e9c9e1e43ab2ef8b2c684fe128a47a624968750a582a741a88300d9424becac82ca358767b9c6d3f023d3e42dd33ea68da4b0f5194bc5009f06b461b4e55477cfde17c99e0143f81a68156974c4972a01d4bb677f5d3ba594de7dff0e1fdb3d02f38db730", 0xce, 0x9}], 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt}, {@measure}]}) 17:07:21 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x4000}}, 0x34, 0x0) 17:07:21 executing program 3: pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getpeername(r0, &(0x7f0000000000)=@hci, &(0x7f0000000080)=0x80) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000e3ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bee0c8a500000000"]}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000004c0)={{0x0, 0x0, 0x1fa90733, 0x401, 0x1, 0x8, 0x9, 0x6, 0xa5, 0x5e1, 0x2, 0x4, 0x6, 0xf411, 0x7f}}) pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) getpeername(r0, &(0x7f0000000000)=@hci, &(0x7f0000000080)=0x80) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000e3ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bee0c8a500000000"]}) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) (async) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000004c0)={{0x0, 0x0, 0x1fa90733, 0x401, 0x1, 0x8, 0x9, 0x6, 0xa5, 0x5e1, 0x2, 0x4, 0x6, 0xf411, 0x7f}}) (async) 17:07:21 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [], 0x7a}}) 17:07:21 executing program 3: pivot_root(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getpeername(r0, &(0x7f0000000000)=@hci, &(0x7f0000000080)=0x80) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000ffff00000000000000000000000000000000000000000000000000000000000000000000000000000000e3ffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bee0c8a500000000"]}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f00000004c0)={{0x0, 0x0, 0x1fa90733, 0x401, 0x1, 0x8, 0x9, 0x6, 0xa5, 0x5e1, 0x2, 0x4, 0x6, 0xf411, 0x7f}}) 17:07:21 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x3f00}}, 0x34, 0x0) [ 1425.363879][T10231] loop0: detected capacity change from 0 to 128 [ 1425.374519][T10229] 9pnet: Could not find request transport: xen [ 1425.399837][T10231] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 17:07:21 executing program 0: getresuid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000180)) syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x10000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0e62cddea2b2b12325d5fd87419619b17c88f8590b", 0x15, 0x1}], 0x204010, &(0x7f00000001c0)={[{'+@#^-'}, {'trans=xen,'}, {}, {'rootcontext'}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@fsname={'fsname', 0x3d, 'rootcontext'}}, {@euid_lt={'euid<', r0}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) (async) recvmmsg$unix(r1, &(0x7f0000008040)=[{{&(0x7f0000000240), 0x6e, &(0x7f0000001840)=[{&(0x7f00000002c0)=""/195, 0xc3}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/177, 0xb1}, {&(0x7f00000004c0)=""/204, 0xcc}, {&(0x7f00000005c0)=""/148, 0x94}, {&(0x7f0000001780)=""/137, 0x89}], 0x6, &(0x7f00000018c0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}}, {{&(0x7f0000001980)=@abs, 0x6e, &(0x7f0000000680)=[{&(0x7f0000001a00)=""/146, 0x92}, {&(0x7f0000001ac0)=""/173, 0xad}, {&(0x7f0000001b80)=""/201, 0xc9}], 0x3, &(0x7f0000001c80)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}}, {{&(0x7f0000001d00), 0x6e, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x88}}, {{&(0x7f0000001e80)=@abs, 0x6e, &(0x7f0000004000)=[{&(0x7f0000001f00)=""/114, 0x72}, {&(0x7f0000001f80)=""/91, 0x5b}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/4096, 0x1000}], 0x4, &(0x7f0000004040)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{0x0, 0x0, &(0x7f0000005440)=[{&(0x7f0000004080)=""/18, 0x12}, {&(0x7f00000040c0)=""/4096, 0x1000}, {&(0x7f00000050c0)=""/255, 0xff}, {&(0x7f00000051c0)=""/182, 0xb6}, {&(0x7f0000005280)=""/23, 0x17}, {&(0x7f00000052c0)=""/86, 0x56}, {&(0x7f0000005340)=""/16, 0x10}, {&(0x7f0000005380)=""/169, 0xa9}], 0x8}}, {{&(0x7f00000054c0), 0x6e, &(0x7f0000006600)=[{&(0x7f0000005540)=""/120, 0x78}, {&(0x7f00000055c0)=""/28, 0x1c}, {&(0x7f0000005600)=""/4096, 0x1000}], 0x3, &(0x7f0000006640)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f0000006700)=@abs, 0x6e, &(0x7f0000006800)=[{&(0x7f0000006780)=""/116, 0x74}], 0x1, &(0x7f0000006840)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f00000068c0), 0x6e, &(0x7f0000007c80)=[{&(0x7f0000006940)=""/140, 0x8c}, {&(0x7f0000006a00)=""/4096, 0x1000}, {&(0x7f0000007a00)=""/73, 0x49}, {&(0x7f0000007a80)=""/195, 0xc3}, {&(0x7f0000007b80)=""/209, 0xd1}], 0x5, &(0x7f0000007d00)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}}, {{&(0x7f0000007e40)=@abs, 0x6e, &(0x7f0000007fc0)=[{&(0x7f0000007ec0)=""/202, 0xca}], 0x1, &(0x7f0000008000)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}], 0x9, 0x20, &(0x7f0000008280)={0x77359400}) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:21 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x3, &(0x7f0000000340)=[{&(0x7f0000000280)="dab145b2d3ca2b442c9a5466", 0xc, 0x7}, {&(0x7f00000002c0)="69a87f72ba9c6bee5c67569f737000d47a7815a1f1c82d523d20a4050a91c746bc8d47debac79b170edb6f41f8fd084bdcd8f6af9056eeb21f0d5e2d767d7a04314a23ab55ac96d7be2e0844ebecdbaa5dfc1ad30ebe658b7d65b3d351a54d0d4abcf412", 0x64, 0x4}, {&(0x7f0000000400)="ec879671b393bee9e15f02586b8fbd546531ca7477f95290ae618b1b847cc6285d3664cb706f5b480ed579cf11c6bb6a8f4534f6c4541730024276e78a92afb11a42fb0cb281327d5b259854b3381eed004e2ef090891b1bbefc98e3edebed29d219769b6b8ee499380e9c9e1e43ab2ef8b2c684fe128a47a624968750a582a741a88300d9424becac82ca358767b9c6d3f023d3e42dd33ea68da4b0f5194bc5009f06b461b4e55477cfde17c99e0143f81a68156974c4972a01d4bb677f5d3ba594de7dff0e1fdb3d02f38db730", 0xce, 0x9}], 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt}, {@measure}]}) 17:07:21 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000"/520]}) 17:07:21 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x8100}}, 0x34, 0x0) 17:07:21 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x4000}}, 0x34, 0x0) 17:07:21 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x8102}}, 0x34, 0x0) 17:07:21 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000"/520]}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000"/520]}) (async) 17:07:21 executing program 2: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:07:21 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x6113}}, 0x34, 0x0) [ 1425.454717][T10231] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1425.463146][T10250] 9pnet: Could not find request transport: xen [ 1425.488653][T10266] tmpfs: Bad value for 'nr_inodes' 17:07:21 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000"/520]}) 17:07:21 executing program 2: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) (async) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:07:21 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x9413}}, 0x34, 0x0) [ 1425.515041][T10269] loop0: detected capacity change from 0 to 128 [ 1425.550982][T10269] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 17:07:21 executing program 0: getresuid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000180)) syz_mount_image$nfs4(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x10000, 0x1, &(0x7f00000000c0)=[{&(0x7f0000000080)="0e62cddea2b2b12325d5fd87419619b17c88f8590b", 0x15, 0x1}], 0x204010, &(0x7f00000001c0)={[{'+@#^-'}, {'trans=xen,'}, {}, {'rootcontext'}], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@func={'func', 0x3d, 'FILE_CHECK'}}, {@fsname={'fsname', 0x3d, 'rootcontext'}}, {@euid_lt={'euid<', r0}}, {@context={'context', 0x3d, 'sysadm_u'}}]}) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) pipe(&(0x7f0000000000)={0xffffffffffffffff}) (rerun: 64) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) (async) recvmmsg$unix(r1, &(0x7f0000008040)=[{{&(0x7f0000000240), 0x6e, &(0x7f0000001840)=[{&(0x7f00000002c0)=""/195, 0xc3}, {&(0x7f0000000780)=""/4096, 0x1000}, {&(0x7f0000000400)=""/177, 0xb1}, {&(0x7f00000004c0)=""/204, 0xcc}, {&(0x7f00000005c0)=""/148, 0x94}, {&(0x7f0000001780)=""/137, 0x89}], 0x6, &(0x7f00000018c0)=[@rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x88}}, {{&(0x7f0000001980)=@abs, 0x6e, &(0x7f0000000680)=[{&(0x7f0000001a00)=""/146, 0x92}, {&(0x7f0000001ac0)=""/173, 0xad}, {&(0x7f0000001b80)=""/201, 0xc9}], 0x3, &(0x7f0000001c80)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}}, {{&(0x7f0000001d00), 0x6e, &(0x7f0000001d80), 0x0, &(0x7f0000001dc0)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x88}}, {{&(0x7f0000001e80)=@abs, 0x6e, &(0x7f0000004000)=[{&(0x7f0000001f00)=""/114, 0x72}, {&(0x7f0000001f80)=""/91, 0x5b}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/4096, 0x1000}], 0x4, &(0x7f0000004040)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}, {{0x0, 0x0, &(0x7f0000005440)=[{&(0x7f0000004080)=""/18, 0x12}, {&(0x7f00000040c0)=""/4096, 0x1000}, {&(0x7f00000050c0)=""/255, 0xff}, {&(0x7f00000051c0)=""/182, 0xb6}, {&(0x7f0000005280)=""/23, 0x17}, {&(0x7f00000052c0)=""/86, 0x56}, {&(0x7f0000005340)=""/16, 0x10}, {&(0x7f0000005380)=""/169, 0xa9}], 0x8}}, {{&(0x7f00000054c0), 0x6e, &(0x7f0000006600)=[{&(0x7f0000005540)=""/120, 0x78}, {&(0x7f00000055c0)=""/28, 0x1c}, {&(0x7f0000005600)=""/4096, 0x1000}], 0x3, &(0x7f0000006640)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f0000006700)=@abs, 0x6e, &(0x7f0000006800)=[{&(0x7f0000006780)=""/116, 0x74}], 0x1, &(0x7f0000006840)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x80}}, {{&(0x7f00000068c0), 0x6e, &(0x7f0000007c80)=[{&(0x7f0000006940)=""/140, 0x8c}, {&(0x7f0000006a00)=""/4096, 0x1000}, {&(0x7f0000007a00)=""/73, 0x49}, {&(0x7f0000007a80)=""/195, 0xc3}, {&(0x7f0000007b80)=""/209, 0xd1}], 0x5, &(0x7f0000007d00)=[@cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}}, {{&(0x7f0000007e40)=@abs, 0x6e, &(0x7f0000007fc0)=[{&(0x7f0000007ec0)=""/202, 0xca}], 0x1, &(0x7f0000008000)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}}], 0x9, 0x20, &(0x7f0000008280)={0x77359400}) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:21 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}, {@huge_never}], [{@euid_gt}, {@measure}]}) 17:07:21 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x15a3}]}, 0x34}}, 0x40) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a596000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0057075cae6000000000000000000000000000000000000000000000000000000000000000000000000000000004111d6ace44c27ff0000000000cf725bb463999a57ab9a4974bf1c48dcad33f5e43e4c036fa5bb4c775584bf1281cd02a1d12882be08475f06995bec000a45e33563ff769b65fdd3a30c47daf84c474b7094e593576c69533c"]}) 17:07:21 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x8100}}, 0x34, 0x0) 17:07:21 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0xff00}}, 0x34, 0x0) 17:07:21 executing program 2: ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) (async) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:07:21 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0xff01}}, 0x34, 0x0) 17:07:21 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7472616e733d78656e2c756e616d653d7472616e96b8b0733d78656e2c2c00"]) 17:07:21 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x15a3}]}, 0x34}}, 0x40) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a596000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0057075cae6000000000000000000000000000000000000000000000000000000000000000000000000000000004111d6ace44c27ff0000000000cf725bb463999a57ab9a4974bf1c48dcad33f5e43e4c036fa5bb4c775584bf1281cd02a1d12882be08475f06995bec000a45e33563ff769b65fdd3a30c47daf84c474b7094e593576c69533c"]}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) pipe(&(0x7f0000000000)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x15a3}]}, 0x34}}, 0x40) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a596000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0057075cae6000000000000000000000000000000000000000000000000000000000000000000000000000000004111d6ace44c27ff0000000000cf725bb463999a57ab9a4974bf1c48dcad33f5e43e4c036fa5bb4c775584bf1281cd02a1d12882be08475f06995bec000a45e33563ff769b65fdd3a30c47daf84c474b7094e593576c69533c"]}) (async) 17:07:21 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x8102}}, 0x34, 0x0) [ 1425.640593][T10298] tmpfs: Bad value for 'nr_inodes' 17:07:21 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:07:21 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0xff00}}, 0x34, 0x0) [ 1425.667111][T10303] loop0: detected capacity change from 0 to 128 [ 1425.693948][T10303] SELinux: security_context_str_to_sid (sysadm_u) failed with errno=-22 17:07:21 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000000)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@subj_user={'subj_user', 0x3d, '/'}}]}}) mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0xc010, &(0x7f00000000c0)={[{@subsystem='rdma'}, {@cpuset_v2_mode}, {@cpuset_v2_mode}]}) 17:07:21 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:21 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x15a3}]}, 0x34}}, 0x40) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a596000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0057075cae6000000000000000000000000000000000000000000000000000000000000000000000000000000004111d6ace44c27ff0000000000cf725bb463999a57ab9a4974bf1c48dcad33f5e43e4c036fa5bb4c775584bf1281cd02a1d12882be08475f06995bec000a45e33563ff769b65fdd3a30c47daf84c474b7094e593576c69533c"]}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) pipe(&(0x7f0000000000)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) (async) sendmsg$BATADV_CMD_SET_VLAN(r1, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, r2, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8}, @BATADV_ATTR_VLANID={0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x15a3}]}, 0x34}}, 0x40) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f00000004c0)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a596000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c0057075cae6000000000000000000000000000000000000000000000000000000000000000000000000000000004111d6ace44c27ff0000000000cf725bb463999a57ab9a4974bf1c48dcad33f5e43e4c036fa5bb4c775584bf1281cd02a1d12882be08475f06995bec000a45e33563ff769b65fdd3a30c47daf84c474b7094e593576c69533c"]}) (async) 17:07:21 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:07:21 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0xff01}}, 0x34, 0x0) 17:07:21 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7472616e733d78656e2c756e616d653d7472616e96b8b0733d78656e2c2c00"]) 17:07:21 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000]}}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$IPSET_CMD_RENAME(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000001540)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001580)={0x40, 0x5, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) open_tree(0xffffffffffffffff, &(0x7f0000001740)='./file0\x00', 0x100) sendmsg$IPCTNL_MSG_TIMEOUT_GET(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000001640), 0xc, &(0x7f00000016c0)={&(0x7f0000001680)={0x40, 0x1, 0x8, 0x201, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x4432}, @CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000000}, 0x8082) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000001500)={'wlan1\x00', &(0x7f00000014c0)=@ethtool_cmd={0x3c, 0x3, 0x1907, 0x81, 0x5f, 0xfc, 0xff, 0x3, 0x1f, 0x3, 0x60bc40e8, 0x8001, 0xfff7, 0x4, 0xff, 0x6, [0x4, 0x81]}}) syz_mount_image$nfs4(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x3, 0x3, &(0x7f0000001400)=[{&(0x7f0000000300)="38e0af2c188a227b54730a44f7b47647d4a001601a32a8298457f898da94dcd5e53891498067bb72c39baaf60c915e7337b104062f1fc2289870f2c8a7a3161b5b20409e83af7a41584c0ccc6a352b9dbdf778", 0x53, 0xb729}, {&(0x7f0000000380)="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", 0x1000, 0x1}, {&(0x7f0000001380)="9b7498c76df4a613c64f24e9fe3b4baea929009e71316cc72e2a0eb559abd6301ba2baed515fe8ba82038c24a62335c357bce483eaa66cd3ae8320661059d08567f27b32703ac030ef933a800d61354e6302a8ccba82c4288700cbe6486182732f80b4c6286d6bc2f042f78cf81f8def2213", 0x72, 0x6}], 0x840414, &(0x7f0000001480)={[{'#@:D'}, {'\''}, {'dummy0\x00'}, {}, {'dummy0\x00'}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@hash}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}) 17:07:21 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:07:21 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x2}}, 0x34, 0x0) 17:07:21 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) [ 1425.723838][T10307] 9pnet: Could not find request transport: xen [ 1425.753885][T10320] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:21 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x2}}, 0x34, 0x0) 17:07:21 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x4}}, 0x34, 0x0) 17:07:21 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000000)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@subj_user={'subj_user', 0x3d, '/'}}]}}) (async, rerun: 32) mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0xc010, &(0x7f00000000c0)={[{@subsystem='rdma'}, {@cpuset_v2_mode}, {@cpuset_v2_mode}]}) 17:07:21 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7472616e733d78656e2c756e616d653d7472616e96b8b0733d78656e2c2c00"]) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7472616e733d78656e2c756e616d653d7472616e96b8b0733d78656e2c2c00"]) (async) 17:07:21 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x4}}, 0x34, 0x0) 17:07:21 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}, {@huge_always}], [{@euid_gt}, {@measure}]}) 17:07:21 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x6}}, 0x34, 0x0) [ 1425.808240][T10345] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 1425.828133][T10328] 9pnet: Could not find request transport: xen [ 1425.832292][T10342] loop3: detected capacity change from 0 to 183 17:07:21 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000000)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@subj_user={'subj_user', 0x3d, '/'}}]}}) mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0xc010, &(0x7f00000000c0)={[{@subsystem='rdma'}, {@cpuset_v2_mode}, {@cpuset_v2_mode}]}) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000000)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@subj_user={'subj_user', 0x3d, '/'}}]}}) (async) mount$cgroup(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0xc010, &(0x7f00000000c0)={[{@subsystem='rdma'}, {@cpuset_v2_mode}, {@cpuset_v2_mode}]}) (async) 17:07:21 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000]}}) (async) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$IPSET_CMD_RENAME(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000001540)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001580)={0x40, 0x5, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x1) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) (async) open_tree(0xffffffffffffffff, &(0x7f0000001740)='./file0\x00', 0x100) (async) sendmsg$IPCTNL_MSG_TIMEOUT_GET(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000001640), 0xc, &(0x7f00000016c0)={&(0x7f0000001680)={0x40, 0x1, 0x8, 0x201, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x4432}, @CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000000}, 0x8082) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000001500)={'wlan1\x00', &(0x7f00000014c0)=@ethtool_cmd={0x3c, 0x3, 0x1907, 0x81, 0x5f, 0xfc, 0xff, 0x3, 0x1f, 0x3, 0x60bc40e8, 0x8001, 0xfff7, 0x4, 0xff, 0x6, [0x4, 0x81]}}) syz_mount_image$nfs4(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x3, 0x3, &(0x7f0000001400)=[{&(0x7f0000000300)="38e0af2c188a227b54730a44f7b47647d4a001601a32a8298457f898da94dcd5e53891498067bb72c39baaf60c915e7337b104062f1fc2289870f2c8a7a3161b5b20409e83af7a41584c0ccc6a352b9dbdf778", 0x53, 0xb729}, {&(0x7f0000000380)="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", 0x1000, 0x1}, {&(0x7f0000001380)="9b7498c76df4a613c64f24e9fe3b4baea929009e71316cc72e2a0eb559abd6301ba2baed515fe8ba82038c24a62335c357bce483eaa66cd3ae8320661059d08567f27b32703ac030ef933a800d61354e6302a8ccba82c4288700cbe6486182732f80b4c6286d6bc2f042f78cf81f8def2213", 0x72, 0x6}], 0x840414, &(0x7f0000001480)={[{'#@:D'}, {'\''}, {'dummy0\x00'}, {}, {'dummy0\x00'}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@hash}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}) 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x8}}, 0x34, 0x0) 17:07:22 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x6}}, 0x34, 0x0) 17:07:22 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}, {@huge_advise}], [{@euid_gt}, {@measure}]}) [ 1425.897315][T10361] tmpfs: Bad value for 'nr_inodes' [ 1425.898493][T10355] 9pnet: Could not find request transport: xen [ 1425.932928][T10363] 9pnet: Could not find request transport: xen 17:07:22 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="747261e61579357e8a883d740600000000000000a707e80000000000"]) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000000c0)={"b980ae35be0703f3802e844958f59d76", 0x0, 0x0, {0x4, 0x3}, {0x5, 0x5}, 0x186, [0x9261911, 0x20000000, 0x4bbe, 0x100, 0x4d, 0xffffffffffffff7f, 0x1ff, 0x80000001, 0x752, 0x7ff, 0x800, 0x3, 0x10000, 0x401, 0x7, 0x7]}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r2) linkat(r0, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x400) 17:07:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000]}}) (async) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$IPSET_CMD_RENAME(0xffffffffffffffff, &(0x7f0000001600)={&(0x7f0000001540)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000015c0)={&(0x7f0000001580)={0x40, 0x5, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0x1}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x840}, 0x1) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) (async) open_tree(0xffffffffffffffff, &(0x7f0000001740)='./file0\x00', 0x100) sendmsg$IPCTNL_MSG_TIMEOUT_GET(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000001640), 0xc, &(0x7f00000016c0)={&(0x7f0000001680)={0x40, 0x1, 0x8, 0x201, 0x0, 0x0, {}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x4432}, @CTA_TIMEOUT_DATA={0x1c, 0x4, 0x0, 0x1, @icmpv6=[@CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x9}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x8}, @CTA_TIMEOUT_ICMPV6_TIMEOUT={0x8, 0x1, 0x1, 0x0, 0x6}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}]}, 0x40}, 0x1, 0x0, 0x0, 0x20000000}, 0x8082) (async) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000001500)={'wlan1\x00', &(0x7f00000014c0)=@ethtool_cmd={0x3c, 0x3, 0x1907, 0x81, 0x5f, 0xfc, 0xff, 0x3, 0x1f, 0x3, 0x60bc40e8, 0x8001, 0xfff7, 0x4, 0xff, 0x6, [0x4, 0x81]}}) syz_mount_image$nfs4(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x3, 0x3, &(0x7f0000001400)=[{&(0x7f0000000300)="38e0af2c188a227b54730a44f7b47647d4a001601a32a8298457f898da94dcd5e53891498067bb72c39baaf60c915e7337b104062f1fc2289870f2c8a7a3161b5b20409e83af7a41584c0ccc6a352b9dbdf778", 0x53, 0xb729}, {&(0x7f0000000380)="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", 0x1000, 0x1}, {&(0x7f0000001380)="9b7498c76df4a613c64f24e9fe3b4baea929009e71316cc72e2a0eb559abd6301ba2baed515fe8ba82038c24a62335c357bce483eaa66cd3ae8320661059d08567f27b32703ac030ef933a800d61354e6302a8ccba82c4288700cbe6486182732f80b4c6286d6bc2f042f78cf81f8def2213", 0x72, 0x6}], 0x840414, &(0x7f0000001480)={[{'#@:D'}, {'\''}, {'dummy0\x00'}, {}, {'dummy0\x00'}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@hash}, {@func={'func', 0x3d, 'PATH_CHECK'}}]}) 17:07:22 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x8}}, 0x34, 0x0) 17:07:22 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="747261e61579357e8a883d740600000000000000a707e80000000000"]) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000000c0)={"b980ae35be0703f3802e844958f59d76", 0x0, 0x0, {0x4, 0x3}, {0x5, 0x5}, 0x186, [0x9261911, 0x20000000, 0x4bbe, 0x100, 0x4d, 0xffffffffffffff7f, 0x1ff, 0x80000001, 0x752, 0x7ff, 0x800, 0x3, 0x10000, 0x401, 0x7, 0x7]}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r2) linkat(r0, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x400) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="747261e61579357e8a883d740600000000000000a707e80000000000"]) (async) pipe(&(0x7f0000000000)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) (async) pipe(&(0x7f0000000000)) (async) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000000c0)={"b980ae35be0703f3802e844958f59d76", 0x0, 0x0, {0x4, 0x3}, {0x5, 0x5}, 0x186, [0x9261911, 0x20000000, 0x4bbe, 0x100, 0x4d, 0xffffffffffffff7f, 0x1ff, 0x80000001, 0x752, 0x7ff, 0x800, 0x3, 0x10000, 0x401, 0x7, 0x7]}) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r2) (async) linkat(r0, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x400) (async) 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xc}}, 0x34, 0x0) [ 1425.954178][T10371] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 [ 1425.975414][T10380] tmpfs: Bad value for 'nr_inodes' 17:07:22 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x0, 0x34, 0x31, 0x67]}}], [{@euid_gt}, {@measure}]}) 17:07:22 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="747261e61579357e8a883d740600000000000000a707e80000000000"]) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) ioctl$BTRFS_IOC_SET_RECEIVED_SUBVOL(r1, 0xc0c89425, &(0x7f00000000c0)={"b980ae35be0703f3802e844958f59d76", 0x0, 0x0, {0x4, 0x3}, {0x5, 0x5}, 0x186, [0x9261911, 0x20000000, 0x4bbe, 0x100, 0x4d, 0xffffffffffffff7f, 0x1ff, 0x80000001, 0x752, 0x7ff, 0x800, 0x3, 0x10000, 0x401, 0x7, 0x7]}) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r2) (async) linkat(r0, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000080)='./file0\x00', 0x400) 17:07:22 executing program 0: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x2, 0x8, 0x801, 0x0, 0x0, {0x3, 0x0, 0x6}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88f5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008415) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="74726167733d78656e2c726f6f7400106e746578743d73746166665f752c00"]) 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xd}}, 0x34, 0x0) [ 1425.999063][T10388] SELinux: security_context_str_to_sid (unconfined_u) failed with errno=-22 17:07:22 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xc}}, 0x34, 0x0) 17:07:22 executing program 0: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x2, 0x8, 0x801, 0x0, 0x0, {0x3, 0x0, 0x6}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88f5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008415) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="74726167733d78656e2c726f6f7400106e746578743d73746166665f752c00"]) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) (async) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x2, 0x8, 0x801, 0x0, 0x0, {0x3, 0x0, 0x6}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88f5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008415) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="74726167733d78656e2c726f6f7400106e746578743d73746166665f752c00"]) (async) 17:07:22 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xd}}, 0x34, 0x0) 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x24}}, 0x34, 0x0) [ 1426.048910][T10404] tmpfs: Bad value for 'nr_inodes' [ 1426.064035][T10386] loop3: detected capacity change from 0 to 183 17:07:22 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000040)) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getresuid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f0000000400)) fchownat(r0, &(0x7f0000000280)='./file0\x00', r1, 0xffffffffffffffff, 0x1000) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000440), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tr-;\x02=xen,'}}]}}) 17:07:22 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}, {@size={'size', 0x3d, [0x37]}}], [{@euid_gt}, {@measure}]}) 17:07:22 executing program 0: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x7}}, './file0\x00'}) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r1, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, 0x2, 0x8, 0x801, 0x0, 0x0, {0x3, 0x0, 0x6}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88f5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008415) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="74726167733d78656e2c726f6f7400106e746578743d73746166665f752c00"]) 17:07:22 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x24}}, 0x34, 0x0) 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x281}}, 0x34, 0x0) 17:07:22 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}, {@nr_inodes={'nr_inodes', 0x3d, [0x6d, 0x65, 0x70, 0x39]}}], [{@euid_gt}, {@measure}]}) 17:07:22 executing program 0: ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000040)) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:22 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x281}}, 0x34, 0x0) 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x600}}, 0x34, 0x0) [ 1426.146161][T10426] tmpfs: Bad value for 'nr_inodes' [ 1426.164280][T10428] 9pnet: Could not find request transport: xen 17:07:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e923ffbc3b3fa449f9fcb8a6a300000000000000000000000000000000000000902c71713e82cf8243a655533c1b000000000000000000000000000000000000000000000000000000000000001e6900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffffffffffff0000000000000000"]}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xabd}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x7bb}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x4080) pipe2$watch_queue(&(0x7f0000000200), 0x80) 17:07:22 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}], [{@euid_gt}, {@measure}]}) 17:07:22 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x600}}, 0x34, 0x0) 17:07:22 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000040)) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) getresuid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f0000000400)) fchownat(r0, &(0x7f0000000280)='./file0\x00', r1, 0xffffffffffffffff, 0x1000) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000440), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tr-;\x02=xen,'}}]}}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000040)) (async) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) pipe(&(0x7f0000000240)) (async) getresuid(&(0x7f0000000340), &(0x7f0000000380), &(0x7f0000000400)) (async) fchownat(r0, &(0x7f0000000280)='./file0\x00', r1, 0xffffffffffffffff, 0x1000) (async) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000440), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tr-;\x02=xen,'}}]}}) (async) 17:07:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e923ffbc3b3fa449f9fcb8a6a300000000000000000000000000000000000000902c71713e82cf8243a655533c1b000000000000000000000000000000000000000000000000000000000000001e6900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffffffffffff0000000000000000"]}) (async, rerun: 64) pipe(&(0x7f0000000000)={0xffffffffffffffff}) (rerun: 64) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) (async) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xabd}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x7bb}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x4080) (async) pipe2$watch_queue(&(0x7f0000000200), 0x80) 17:07:22 executing program 0: ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000040)) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000040)) (async) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async) 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xc00}}, 0x34, 0x0) 17:07:22 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xc00}}, 0x34, 0x0) 17:07:22 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[], [{@euid_gt}, {@measure}]}) [ 1426.193855][T10436] tmpfs: Bad value for 'nr_inodes' [ 1426.197917][T10439] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1426.228220][T10444] tmpfs: Unknown parameter 'euid>00000000000000000000' 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xd00}}, 0x34, 0x0) 17:07:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e923ffbc3b3fa449f9fcb8a6a300000000000000000000000000000000000000902c71713e82cf8243a655533c1b000000000000000000000000000000000000000000000000000000000000001e6900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffffffffffff0000000000000000"]}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xabd}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x7bb}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x4080) pipe2$watch_queue(&(0x7f0000000200), 0x80) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e923ffbc3b3fa449f9fcb8a6a300000000000000000000000000000000000000902c71713e82cf8243a655533c1b000000000000000000000000000000000000000000000000000000000000001e6900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f6ffffffffffffff0000000000000000"]}) (async) pipe(&(0x7f0000000000)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) (async) sendmsg$BATADV_CMD_GET_MESH(r1, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x3c, 0x0, 0x1, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MASK={0x8, 0x2c, 0x5}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0xabd}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x7bb}, @BATADV_ATTR_MULTICAST_FORCEFLOOD_ENABLED={0x5, 0x37, 0x1}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0x4080) (async) pipe2$watch_queue(&(0x7f0000000200), 0x80) (async) 17:07:22 executing program 2: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000040)) (async) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) (async) getresuid(&(0x7f0000000340)=0x0, &(0x7f0000000380), &(0x7f0000000400)) fchownat(r0, &(0x7f0000000280)='./file0\x00', r1, 0xffffffffffffffff, 0x1000) (async) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000440), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'tr-;\x02=xen,'}}]}}) 17:07:22 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xd00}}, 0x34, 0x0) 17:07:22 executing program 0: ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xffffffffffffffff}}, './file0\x00'}) ioctl$SECCOMP_IOCTL_NOTIF_ID_VALID(r0, 0x40082102, &(0x7f0000000040)) (async, rerun: 64) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x1394}}, 0x34, 0x0) 17:07:22 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[], [{@euid_gt}, {@measure}]}) 17:07:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005c8800"/520]}) llistxattr(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000340)=""/80, 0x50) 17:07:22 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7485d8af81d5a219b72c756e616d653d7472616e73432af495c6f18466dc13996d0ed9a8015222"]) [ 1426.267855][T10453] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1426.279212][T10450] 9pnet: Could not find request transport: xen [ 1426.296691][T10468] tmpfs: Unknown parameter 'euid>00000000000000000000' 17:07:22 executing program 0: r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000100)='./file0\x00', 0x103, 0x0, 0x0, 0x2260818, 0x0) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f0000000140)) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x101, 0x3, &(0x7f0000000280)=[{&(0x7f00000001c0), 0x0, 0x3}, {&(0x7f0000000200)="d1416de6c26d33719cb16f2aa686f10c39fb", 0x12, 0x7fffffffffffffff}, {&(0x7f0000000240)="d99becba60a89d7799", 0x9, 0x1}], 0x800, &(0x7f0000000300)={[{@fat=@check_normal}, {@fat=@showexec}, {@fat=@flush}, {@dots}, {@fat=@codepage={'codepage', 0x3d, '866'}}, {@fat=@dos1xfloppy}], [{@dont_measure}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) fchownat(r0, &(0x7f0000000000)='./file0\x00', r1, 0xee01, 0x100) clock_gettime(0x0, &(0x7f0000004000)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003e00)=[{{&(0x7f0000000380), 0x6e, &(0x7f0000000500)=[{&(0x7f0000000400)=""/117, 0x75}, {&(0x7f0000000480)=""/122, 0x7a}, {&(0x7f00000001c0)}], 0x3, &(0x7f0000000540)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x70}}, {{&(0x7f00000005c0), 0x6e, &(0x7f0000001a40)=[{&(0x7f0000000640)=""/208, 0xd0}, {&(0x7f0000000740)=""/80, 0x50}, {&(0x7f00000007c0)=""/15, 0xf}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/30, 0x1e}, {&(0x7f0000001840)=""/133, 0x85}, {&(0x7f0000001900)=""/40, 0x28}, {&(0x7f0000001940)=""/250, 0xfa}], 0x8, &(0x7f0000001ac0)}}, {{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000001b00)=""/28, 0x1c}, {&(0x7f0000001b40)=""/27, 0x1b}], 0x2, &(0x7f0000001bc0)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xe0}}, {{&(0x7f0000001cc0), 0x6e, &(0x7f0000003180)=[{&(0x7f0000001d40)=""/100, 0x64}, {&(0x7f0000001dc0)=""/238, 0xee}, {&(0x7f0000001ec0)=""/197, 0xc5}, {&(0x7f0000001fc0)=""/42, 0x2a}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/29, 0x1d}, {&(0x7f0000003040)=""/88, 0x58}, {&(0x7f00000030c0)=""/114, 0x72}, {&(0x7f0000003140)=""/26, 0x1a}], 0x9, &(0x7f0000003240)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000003280), 0x6e, &(0x7f0000003600)=[{&(0x7f0000003300)=""/116, 0x74}, {&(0x7f0000003380)=""/126, 0x7e}, {&(0x7f0000003400)=""/142, 0x8e}, {&(0x7f00000034c0)=""/39, 0x27}, {&(0x7f0000003500)=""/217, 0xd9}], 0x5, &(0x7f0000003680)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xc0}}, {{0x0, 0x0, &(0x7f00000038c0)=[{&(0x7f0000003740)=""/68, 0x44}, {&(0x7f00000037c0)=""/206, 0xce}], 0x2}}, {{&(0x7f0000003900)=@abs, 0x6e, &(0x7f0000003ac0)=[{&(0x7f0000003980)=""/202, 0xca}, {&(0x7f0000003a80)=""/21, 0x15}], 0x2, &(0x7f0000003b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x98}}, {{&(0x7f0000003bc0)=@abs, 0x6e, &(0x7f0000003d40)=[{&(0x7f0000003c40)=""/54, 0x36}, {&(0x7f0000003c80)=""/130, 0x82}], 0x2, &(0x7f0000003d80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}}], 0x8, 0x40000140, &(0x7f0000004040)={r2, r3+60000000}) getsockname$unix(r4, &(0x7f0000004080)=@abs, &(0x7f00000001c0)=0x6e) 17:07:22 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x1361}}, 0x34, 0x0) 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x2000}}, 0x34, 0x0) 17:07:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005c8800"/520]}) llistxattr(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000340)=""/80, 0x50) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005c8800"/520]}) (async) llistxattr(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000340)=""/80, 0x50) (async) 17:07:22 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7485d8af81d5a219b72c756e616d653d7472616e73432af495c6f18466dc13996d0ed9a8015222"]) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7485d8af81d5a219b72c756e616d653d7472616e73432af495c6f18466dc13996d0ed9a8015222"]) (async) [ 1426.346669][T10486] tmpfs: Unknown parameter 'euid>00000000000000000000' [ 1426.382960][T10499] loop0: detected capacity change from 0 to 8191 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x2400}}, 0x34, 0x0) 17:07:22 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x2000}}, 0x34, 0x0) 17:07:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005c8800"/520]}) (async) llistxattr(&(0x7f00000002c0)='./file0/file0\x00', &(0x7f0000000340)=""/80, 0x50) 17:07:22 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x1000, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="7485d8af81d5a219b72c756e616d653d7472616e73432af495c6f18466dc13996d0ed9a8015222"]) 17:07:22 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[], [{@euid_gt}, {@measure}]}) 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x3f00}}, 0x34, 0x0) 17:07:22 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x2400}}, 0x34, 0x0) [ 1426.398684][T10499] SELinux: security_context_str_to_sid (user_u) failed with errno=-22 17:07:22 executing program 0: r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000100)='./file0\x00', 0x103, 0x0, 0x0, 0x2260818, 0x0) (async) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f0000000140)) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x101, 0x3, &(0x7f0000000280)=[{&(0x7f00000001c0), 0x0, 0x3}, {&(0x7f0000000200)="d1416de6c26d33719cb16f2aa686f10c39fb", 0x12, 0x7fffffffffffffff}, {&(0x7f0000000240)="d99becba60a89d7799", 0x9, 0x1}], 0x800, &(0x7f0000000300)={[{@fat=@check_normal}, {@fat=@showexec}, {@fat=@flush}, {@dots}, {@fat=@codepage={'codepage', 0x3d, '866'}}, {@fat=@dos1xfloppy}], [{@dont_measure}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) (async) fchownat(r0, &(0x7f0000000000)='./file0\x00', r1, 0xee01, 0x100) (async) clock_gettime(0x0, &(0x7f0000004000)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003e00)=[{{&(0x7f0000000380), 0x6e, &(0x7f0000000500)=[{&(0x7f0000000400)=""/117, 0x75}, {&(0x7f0000000480)=""/122, 0x7a}, {&(0x7f00000001c0)}], 0x3, &(0x7f0000000540)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x70}}, {{&(0x7f00000005c0), 0x6e, &(0x7f0000001a40)=[{&(0x7f0000000640)=""/208, 0xd0}, {&(0x7f0000000740)=""/80, 0x50}, {&(0x7f00000007c0)=""/15, 0xf}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/30, 0x1e}, {&(0x7f0000001840)=""/133, 0x85}, {&(0x7f0000001900)=""/40, 0x28}, {&(0x7f0000001940)=""/250, 0xfa}], 0x8, &(0x7f0000001ac0)}}, {{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000001b00)=""/28, 0x1c}, {&(0x7f0000001b40)=""/27, 0x1b}], 0x2, &(0x7f0000001bc0)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xe0}}, {{&(0x7f0000001cc0), 0x6e, &(0x7f0000003180)=[{&(0x7f0000001d40)=""/100, 0x64}, {&(0x7f0000001dc0)=""/238, 0xee}, {&(0x7f0000001ec0)=""/197, 0xc5}, {&(0x7f0000001fc0)=""/42, 0x2a}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/29, 0x1d}, {&(0x7f0000003040)=""/88, 0x58}, {&(0x7f00000030c0)=""/114, 0x72}, {&(0x7f0000003140)=""/26, 0x1a}], 0x9, &(0x7f0000003240)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000003280), 0x6e, &(0x7f0000003600)=[{&(0x7f0000003300)=""/116, 0x74}, {&(0x7f0000003380)=""/126, 0x7e}, {&(0x7f0000003400)=""/142, 0x8e}, {&(0x7f00000034c0)=""/39, 0x27}, {&(0x7f0000003500)=""/217, 0xd9}], 0x5, &(0x7f0000003680)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xc0}}, {{0x0, 0x0, &(0x7f00000038c0)=[{&(0x7f0000003740)=""/68, 0x44}, {&(0x7f00000037c0)=""/206, 0xce}], 0x2}}, {{&(0x7f0000003900)=@abs, 0x6e, &(0x7f0000003ac0)=[{&(0x7f0000003980)=""/202, 0xca}, {&(0x7f0000003a80)=""/21, 0x15}], 0x2, &(0x7f0000003b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x98}}, {{&(0x7f0000003bc0)=@abs, 0x6e, &(0x7f0000003d40)=[{&(0x7f0000003c40)=""/54, 0x36}, {&(0x7f0000003c80)=""/130, 0x82}], 0x2, &(0x7f0000003d80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}}], 0x8, 0x40000140, &(0x7f0000004040)={r2, r3+60000000}) getsockname$unix(r4, &(0x7f0000004080)=@abs, &(0x7f00000001c0)=0x6e) 17:07:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400]}}) 17:07:22 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300), 0x930a9, &(0x7f0000000080)={'trans=xen,', {[{@version_u}]}}) 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x4000}}, 0x34, 0x0) 17:07:22 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300), 0x930a9, &(0x7f0000000080)={'trans=xen,', {[{@version_u}]}}) 17:07:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400]}}) 17:07:22 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x3f00}}, 0x34, 0x0) 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x8100}}, 0x34, 0x0) 17:07:22 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes}], [{@euid_gt}, {@measure}]}) 17:07:22 executing program 0: r0 = syz_mount_image$nfs4(0x0, &(0x7f0000000100)='./file0\x00', 0x103, 0x0, 0x0, 0x2260818, 0x0) getresuid(&(0x7f0000000040)=0x0, &(0x7f0000000080), &(0x7f0000000140)) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x101, 0x3, &(0x7f0000000280)=[{&(0x7f00000001c0), 0x0, 0x3}, {&(0x7f0000000200)="d1416de6c26d33719cb16f2aa686f10c39fb", 0x12, 0x7fffffffffffffff}, {&(0x7f0000000240)="d99becba60a89d7799", 0x9, 0x1}], 0x800, &(0x7f0000000300)={[{@fat=@check_normal}, {@fat=@showexec}, {@fat=@flush}, {@dots}, {@fat=@codepage={'codepage', 0x3d, '866'}}, {@fat=@dos1xfloppy}], [{@dont_measure}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) fchownat(r0, &(0x7f0000000000)='./file0\x00', r1, 0xee01, 0x100) clock_gettime(0x0, &(0x7f0000004000)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003e00)=[{{&(0x7f0000000380), 0x6e, &(0x7f0000000500)=[{&(0x7f0000000400)=""/117, 0x75}, {&(0x7f0000000480)=""/122, 0x7a}, {&(0x7f00000001c0)}], 0x3, &(0x7f0000000540)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x70}}, {{&(0x7f00000005c0), 0x6e, &(0x7f0000001a40)=[{&(0x7f0000000640)=""/208, 0xd0}, {&(0x7f0000000740)=""/80, 0x50}, {&(0x7f00000007c0)=""/15, 0xf}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/30, 0x1e}, {&(0x7f0000001840)=""/133, 0x85}, {&(0x7f0000001900)=""/40, 0x28}, {&(0x7f0000001940)=""/250, 0xfa}], 0x8, &(0x7f0000001ac0)}}, {{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000001b00)=""/28, 0x1c}, {&(0x7f0000001b40)=""/27, 0x1b}], 0x2, &(0x7f0000001bc0)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xe0}}, {{&(0x7f0000001cc0), 0x6e, &(0x7f0000003180)=[{&(0x7f0000001d40)=""/100, 0x64}, {&(0x7f0000001dc0)=""/238, 0xee}, {&(0x7f0000001ec0)=""/197, 0xc5}, {&(0x7f0000001fc0)=""/42, 0x2a}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/29, 0x1d}, {&(0x7f0000003040)=""/88, 0x58}, {&(0x7f00000030c0)=""/114, 0x72}, {&(0x7f0000003140)=""/26, 0x1a}], 0x9, &(0x7f0000003240)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000003280), 0x6e, &(0x7f0000003600)=[{&(0x7f0000003300)=""/116, 0x74}, {&(0x7f0000003380)=""/126, 0x7e}, {&(0x7f0000003400)=""/142, 0x8e}, {&(0x7f00000034c0)=""/39, 0x27}, {&(0x7f0000003500)=""/217, 0xd9}], 0x5, &(0x7f0000003680)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xc0}}, {{0x0, 0x0, &(0x7f00000038c0)=[{&(0x7f0000003740)=""/68, 0x44}, {&(0x7f00000037c0)=""/206, 0xce}], 0x2}}, {{&(0x7f0000003900)=@abs, 0x6e, &(0x7f0000003ac0)=[{&(0x7f0000003980)=""/202, 0xca}, {&(0x7f0000003a80)=""/21, 0x15}], 0x2, &(0x7f0000003b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x98}}, {{&(0x7f0000003bc0)=@abs, 0x6e, &(0x7f0000003d40)=[{&(0x7f0000003c40)=""/54, 0x36}, {&(0x7f0000003c80)=""/130, 0x82}], 0x2, &(0x7f0000003d80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}}], 0x8, 0x40000140, &(0x7f0000004040)={r2, r3+60000000}) getsockname$unix(r4, &(0x7f0000004080)=@abs, &(0x7f00000001c0)=0x6e) syz_mount_image$nfs4(0x0, &(0x7f0000000100)='./file0\x00', 0x103, 0x0, 0x0, 0x2260818, 0x0) (async) getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f0000000140)) (async) syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000180)='./file0\x00', 0x101, 0x3, &(0x7f0000000280)=[{&(0x7f00000001c0), 0x0, 0x3}, {&(0x7f0000000200)="d1416de6c26d33719cb16f2aa686f10c39fb", 0x12, 0x7fffffffffffffff}, {&(0x7f0000000240)="d99becba60a89d7799", 0x9, 0x1}], 0x800, &(0x7f0000000300)={[{@fat=@check_normal}, {@fat=@showexec}, {@fat=@flush}, {@dots}, {@fat=@codepage={'codepage', 0x3d, '866'}}, {@fat=@dos1xfloppy}], [{@dont_measure}, {@dont_appraise}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}) (async) fchownat(r0, &(0x7f0000000000)='./file0\x00', r1, 0xee01, 0x100) (async) clock_gettime(0x0, &(0x7f0000004000)) (async) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003e00)=[{{&(0x7f0000000380), 0x6e, &(0x7f0000000500)=[{&(0x7f0000000400)=""/117, 0x75}, {&(0x7f0000000480)=""/122, 0x7a}, {&(0x7f00000001c0)}], 0x3, &(0x7f0000000540)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x70}}, {{&(0x7f00000005c0), 0x6e, &(0x7f0000001a40)=[{&(0x7f0000000640)=""/208, 0xd0}, {&(0x7f0000000740)=""/80, 0x50}, {&(0x7f00000007c0)=""/15, 0xf}, {&(0x7f0000000800)=""/4096, 0x1000}, {&(0x7f0000001800)=""/30, 0x1e}, {&(0x7f0000001840)=""/133, 0x85}, {&(0x7f0000001900)=""/40, 0x28}, {&(0x7f0000001940)=""/250, 0xfa}], 0x8, &(0x7f0000001ac0)}}, {{0x0, 0x0, &(0x7f0000001b80)=[{&(0x7f0000001b00)=""/28, 0x1c}, {&(0x7f0000001b40)=""/27, 0x1b}], 0x2, &(0x7f0000001bc0)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xe0}}, {{&(0x7f0000001cc0), 0x6e, &(0x7f0000003180)=[{&(0x7f0000001d40)=""/100, 0x64}, {&(0x7f0000001dc0)=""/238, 0xee}, {&(0x7f0000001ec0)=""/197, 0xc5}, {&(0x7f0000001fc0)=""/42, 0x2a}, {&(0x7f0000002000)=""/4096, 0x1000}, {&(0x7f0000003000)=""/29, 0x1d}, {&(0x7f0000003040)=""/88, 0x58}, {&(0x7f00000030c0)=""/114, 0x72}, {&(0x7f0000003140)=""/26, 0x1a}], 0x9, &(0x7f0000003240)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000003280), 0x6e, &(0x7f0000003600)=[{&(0x7f0000003300)=""/116, 0x74}, {&(0x7f0000003380)=""/126, 0x7e}, {&(0x7f0000003400)=""/142, 0x8e}, {&(0x7f00000034c0)=""/39, 0x27}, {&(0x7f0000003500)=""/217, 0xd9}], 0x5, &(0x7f0000003680)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0xc0}}, {{0x0, 0x0, &(0x7f00000038c0)=[{&(0x7f0000003740)=""/68, 0x44}, {&(0x7f00000037c0)=""/206, 0xce}], 0x2}}, {{&(0x7f0000003900)=@abs, 0x6e, &(0x7f0000003ac0)=[{&(0x7f0000003980)=""/202, 0xca}, {&(0x7f0000003a80)=""/21, 0x15}], 0x2, &(0x7f0000003b00)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x98}}, {{&(0x7f0000003bc0)=@abs, 0x6e, &(0x7f0000003d40)=[{&(0x7f0000003c40)=""/54, 0x36}, {&(0x7f0000003c80)=""/130, 0x82}], 0x2, &(0x7f0000003d80)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x70}}], 0x8, 0x40000140, &(0x7f0000004040)={r2, r3+60000000}) (async) getsockname$unix(r4, &(0x7f0000004080)=@abs, &(0x7f00000001c0)=0x6e) (async) [ 1426.453943][T10521] tmpfs: Unknown parameter 'euid>00000000000000000000' [ 1426.483605][T10531] loop0: detected capacity change from 0 to 8191 17:07:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_genetlink_get_family_id$batadv(&(0x7f0000000280), 0xffffffffffffffff) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400]}}) 17:07:22 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x4000}}, 0x34, 0x0) 17:07:22 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000300), 0x930a9, &(0x7f0000000080)={'trans=xen,', {[{@version_u}]}}) 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x8102}}, 0x34, 0x0) 17:07:22 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes}], [{@euid_gt}, {@measure}]}) 17:07:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) getpeername(r1, &(0x7f0000000340)=@x25={0x9, @remote}, &(0x7f00000003c0)=0x80) open_tree(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x9000) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'hsr0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='K\x00'/520]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400), 0x200, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x10, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 17:07:22 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x200000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:22 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x6113}}, 0x34, 0x0) [ 1426.546733][T10547] tmpfs: Bad value for 'nr_inodes' [ 1426.553989][T10546] loop0: detected capacity change from 0 to 8191 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x9413}}, 0x34, 0x0) 17:07:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) getpeername(r1, &(0x7f0000000340)=@x25={0x9, @remote}, &(0x7f00000003c0)=0x80) open_tree(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x9000) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'hsr0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='K\x00'/520]}) (async) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400), 0x200, 0x0) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x10, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 17:07:22 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes}], [{@euid_gt}, {@measure}]}) [ 1426.594617][T10559] tmpfs: Bad value for 'nr_inodes' [ 1426.602429][T10546] SELinux: security_context_str_to_sid (user_u) failed with errno=-22 17:07:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) getpeername(r1, &(0x7f0000000340)=@x25={0x9, @remote}, &(0x7f00000003c0)=0x80) open_tree(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x9000) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'hsr0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB='K\x00'/520]}) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000400), 0x200, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x10, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 17:07:22 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x8100}}, 0x34, 0x0) 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xff00}}, 0x34, 0x0) 17:07:22 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x200000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x200000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) (async) 17:07:22 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x10, &(0x7f0000000480)=ANY=[@ANYBLOB="c74877b541217177b6747261ee733d78656e2c610a55296234f5fb0c353ec4960484fda3ccc88a9b0674", @ANYRESDEC=0x0, @ANYBLOB=',dfltgid=', @ANYRESHEX=0xee00, @ANYBLOB=',privport,cache=none,fsname=,\x00']) syz_mount_image$nfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x3, &(0x7f0000000340)=[{&(0x7f0000000100)="73a258becbd1d34525fe3f347f0f97af98b0fca66f40648a8612996ee33e2b20c75514a29e7341e07f8be59a33be9dc86ce6df5c2b531c55d3e07723bde4fec715ab7f42b2f133525ba2e14699b168cc80ad8ee4008145aeec476e602264d6fb2ca538851176a2b63ded6cd9546e62cccedccafaf804519e89e58a40fd78834227153ba66fce9950e97f0ff1036ff4dbfef69ccb74f519af00b723509d4cc732f7dcfb3b4ddd87a6aa75699d074379634694", 0xb2, 0x1}, {&(0x7f00000001c0)="315d95b2066cedf0ac0eb0e5492228e403d98ff740a24dfd961795c0612fcbffb6fa89f706f450654a74c9946dd892379b5c43fdd2c6b2842f7005b49b69a0b32d2c351d06866abedfd8a17bbda9b2f13e87d83295051327c3e7d35547d198f3d6d8553ac6b983e7c794e45fd3dbec4b57074cbeebc73affcd647ce7bdaac865f08d0e5688b9b91372bf4c43b7cc382f6bfcea1c4182", 0x96, 0xfffffffffffffffd}, {&(0x7f0000000280)="e410a02fcd455a160ea36ec904a982d56f336923baff40d10f5486c3aa26a190156068effa5fa437c4581551c6fc775c962dede1b27e1b521d64c90d16783f86671cae303a258aee88f59148e1c0b1c3370396f4ede0bb5392a0fff2831da2060401a1a38e647ca9d977297873640345a36312a653444873d038715a78e0a25cc6ee57a8d8849dfce45f02e1344985f544e9e5a178cfd28dbaef1b3b219c4317f23571567df44f471974ccd91f", 0xad, 0x9}], 0x4000, &(0x7f0000000400)={[{'^@%*'}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0x66, 0x66, 0x35, 0x64, 0x30, 0x37, 0x65], 0x2d, [0x36, 0x34, 0x34, 0x62], 0x2d, [0x997b7b6164699436, 0x33, 0x34, 0x37], 0x2d, [0x65, 0x66, 0x38, 0x62], 0x2d, [0x38, 0x35, 0x64, 0x30, 0x39, 0x61, 0x39, 0x37]}}}, {@smackfsdef}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) 17:07:22 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x0]}}], [{@euid_gt}, {@measure}]}) 17:07:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000280)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) [ 1426.636090][T10564] 9pnet: Could not find request transport: xen [ 1426.646299][T10575] tmpfs: Bad value for 'nr_inodes' 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xff01}}, 0x34, 0x0) 17:07:22 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x8102}}, 0x34, 0x0) 17:07:22 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x0]}}], [{@euid_gt}, {@measure}]}) 17:07:22 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xff00}}, 0x34, 0x0) [ 1426.701240][T10592] tmpfs: Bad value for 'nr_inodes' [ 1426.707614][T10595] loop0: detected capacity change from 0 to 264192 [ 1426.722877][T10595] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x40000}}, 0x34, 0x0) 17:07:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async, rerun: 32) r1 = socket$unix(0x1, 0x5, 0x0) (rerun: 32) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000280)) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:22 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x0]}}], [{@euid_gt}, {@measure}]}) 17:07:22 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xff01}}, 0x34, 0x0) [ 1426.752434][T10596] 9pnet: Could not find request transport: xen [ 1426.752455][T10605] tmpfs: Bad value for 'nr_inodes' [ 1426.779841][ T1437] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1426.789008][ T1437] Buffer I/O error on dev loop0, logical block 0, async page read [ 1426.790807][T10614] 9pnet: Could not find request transport: xen 17:07:22 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x200000, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:22 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x10, &(0x7f0000000480)=ANY=[@ANYBLOB="c74877b541217177b6747261ee733d78656e2c610a55296234f5fb0c353ec4960484fda3ccc88a9b0674", @ANYRESDEC=0x0, @ANYBLOB=',dfltgid=', @ANYRESHEX=0xee00, @ANYBLOB=',privport,cache=none,fsname=,\x00']) syz_mount_image$nfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x3, &(0x7f0000000340)=[{&(0x7f0000000100)="73a258becbd1d34525fe3f347f0f97af98b0fca66f40648a8612996ee33e2b20c75514a29e7341e07f8be59a33be9dc86ce6df5c2b531c55d3e07723bde4fec715ab7f42b2f133525ba2e14699b168cc80ad8ee4008145aeec476e602264d6fb2ca538851176a2b63ded6cd9546e62cccedccafaf804519e89e58a40fd78834227153ba66fce9950e97f0ff1036ff4dbfef69ccb74f519af00b723509d4cc732f7dcfb3b4ddd87a6aa75699d074379634694", 0xb2, 0x1}, {&(0x7f00000001c0)="315d95b2066cedf0ac0eb0e5492228e403d98ff740a24dfd961795c0612fcbffb6fa89f706f450654a74c9946dd892379b5c43fdd2c6b2842f7005b49b69a0b32d2c351d06866abedfd8a17bbda9b2f13e87d83295051327c3e7d35547d198f3d6d8553ac6b983e7c794e45fd3dbec4b57074cbeebc73affcd647ce7bdaac865f08d0e5688b9b91372bf4c43b7cc382f6bfcea1c4182", 0x96, 0xfffffffffffffffd}, {&(0x7f0000000280)="e410a02fcd455a160ea36ec904a982d56f336923baff40d10f5486c3aa26a190156068effa5fa437c4581551c6fc775c962dede1b27e1b521d64c90d16783f86671cae303a258aee88f59148e1c0b1c3370396f4ede0bb5392a0fff2831da2060401a1a38e647ca9d977297873640345a36312a653444873d038715a78e0a25cc6ee57a8d8849dfce45f02e1344985f544e9e5a178cfd28dbaef1b3b219c4317f23571567df44f471974ccd91f", 0xad, 0x9}], 0x4000, &(0x7f0000000400)={[{'^@%*'}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0x66, 0x66, 0x35, 0x64, 0x30, 0x37, 0x65], 0x2d, [0x36, 0x34, 0x34, 0x62], 0x2d, [0x997b7b6164699436, 0x33, 0x34, 0x37], 0x2d, [0x65, 0x66, 0x38, 0x62], 0x2d, [0x38, 0x35, 0x64, 0x30, 0x39, 0x61, 0x39, 0x37]}}}, {@smackfsdef}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x10, &(0x7f0000000480)=ANY=[@ANYBLOB="c74877b541217177b6747261ee733d78656e2c610a55296234f5fb0c353ec4960484fda3ccc88a9b0674", @ANYRESDEC=0x0, @ANYBLOB=',dfltgid=', @ANYRESHEX=0xee00, @ANYBLOB=',privport,cache=none,fsname=,\x00']) (async) syz_mount_image$nfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x3, &(0x7f0000000340)=[{&(0x7f0000000100)="73a258becbd1d34525fe3f347f0f97af98b0fca66f40648a8612996ee33e2b20c75514a29e7341e07f8be59a33be9dc86ce6df5c2b531c55d3e07723bde4fec715ab7f42b2f133525ba2e14699b168cc80ad8ee4008145aeec476e602264d6fb2ca538851176a2b63ded6cd9546e62cccedccafaf804519e89e58a40fd78834227153ba66fce9950e97f0ff1036ff4dbfef69ccb74f519af00b723509d4cc732f7dcfb3b4ddd87a6aa75699d074379634694", 0xb2, 0x1}, {&(0x7f00000001c0)="315d95b2066cedf0ac0eb0e5492228e403d98ff740a24dfd961795c0612fcbffb6fa89f706f450654a74c9946dd892379b5c43fdd2c6b2842f7005b49b69a0b32d2c351d06866abedfd8a17bbda9b2f13e87d83295051327c3e7d35547d198f3d6d8553ac6b983e7c794e45fd3dbec4b57074cbeebc73affcd647ce7bdaac865f08d0e5688b9b91372bf4c43b7cc382f6bfcea1c4182", 0x96, 0xfffffffffffffffd}, {&(0x7f0000000280)="e410a02fcd455a160ea36ec904a982d56f336923baff40d10f5486c3aa26a190156068effa5fa437c4581551c6fc775c962dede1b27e1b521d64c90d16783f86671cae303a258aee88f59148e1c0b1c3370396f4ede0bb5392a0fff2831da2060401a1a38e647ca9d977297873640345a36312a653444873d038715a78e0a25cc6ee57a8d8849dfce45f02e1344985f544e9e5a178cfd28dbaef1b3b219c4317f23571567df44f471974ccd91f", 0xad, 0x9}], 0x4000, &(0x7f0000000400)={[{'^@%*'}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0x66, 0x66, 0x35, 0x64, 0x30, 0x37, 0x65], 0x2d, [0x36, 0x34, 0x34, 0x62], 0x2d, [0x997b7b6164699436, 0x33, 0x34, 0x37], 0x2d, [0x65, 0x66, 0x38, 0x62], 0x2d, [0x38, 0x35, 0x64, 0x30, 0x39, 0x61, 0x39, 0x37]}}}, {@smackfsdef}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) (async) 17:07:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$unix(0x1, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000280)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) socket$unix(0x1, 0x5, 0x0) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000280)) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) 17:07:22 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}], [{@euid_gt}]}) 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x400000}}, 0x34, 0x0) 17:07:22 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x40000}}, 0x34, 0x0) 17:07:22 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) acct(&(0x7f0000000040)='./file0\x00') mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000080)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@subj_user={'subj_user', 0x3d, '\x96^^'}}]}}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) accept$unix(r0, &(0x7f0000000140), &(0x7f0000000000)=0x6e) 17:07:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}) [ 1426.796878][ T1437] loop0: unable to read partition table [ 1426.812967][T10618] tmpfs: Bad value for 'nr_inodes' [ 1426.818770][ T1437] loop0: partition table beyond EOD, truncated 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x800000}}, 0x34, 0x0) 17:07:22 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x1000000}}, 0x34, 0x0) 17:07:22 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}) (async) 17:07:22 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x400000}}, 0x34, 0x0) 17:07:22 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) acct(&(0x7f0000000040)='./file0\x00') (async) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000080)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@subj_user={'subj_user', 0x3d, '\x96^^'}}]}}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) (async) accept$unix(r0, &(0x7f0000000140), &(0x7f0000000000)=0x6e) 17:07:23 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 17:07:23 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x10, &(0x7f0000000480)=ANY=[@ANYBLOB="c74877b541217177b6747261ee733d78656e2c610a55296234f5fb0c353ec4960484fda3ccc88a9b0674", @ANYRESDEC=0x0, @ANYBLOB=',dfltgid=', @ANYRESHEX=0xee00, @ANYBLOB=',privport,cache=none,fsname=,\x00']) syz_mount_image$nfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x3, &(0x7f0000000340)=[{&(0x7f0000000100)="73a258becbd1d34525fe3f347f0f97af98b0fca66f40648a8612996ee33e2b20c75514a29e7341e07f8be59a33be9dc86ce6df5c2b531c55d3e07723bde4fec715ab7f42b2f133525ba2e14699b168cc80ad8ee4008145aeec476e602264d6fb2ca538851176a2b63ded6cd9546e62cccedccafaf804519e89e58a40fd78834227153ba66fce9950e97f0ff1036ff4dbfef69ccb74f519af00b723509d4cc732f7dcfb3b4ddd87a6aa75699d074379634694", 0xb2, 0x1}, {&(0x7f00000001c0)="315d95b2066cedf0ac0eb0e5492228e403d98ff740a24dfd961795c0612fcbffb6fa89f706f450654a74c9946dd892379b5c43fdd2c6b2842f7005b49b69a0b32d2c351d06866abedfd8a17bbda9b2f13e87d83295051327c3e7d35547d198f3d6d8553ac6b983e7c794e45fd3dbec4b57074cbeebc73affcd647ce7bdaac865f08d0e5688b9b91372bf4c43b7cc382f6bfcea1c4182", 0x96, 0xfffffffffffffffd}, {&(0x7f0000000280)="e410a02fcd455a160ea36ec904a982d56f336923baff40d10f5486c3aa26a190156068effa5fa437c4581551c6fc775c962dede1b27e1b521d64c90d16783f86671cae303a258aee88f59148e1c0b1c3370396f4ede0bb5392a0fff2831da2060401a1a38e647ca9d977297873640345a36312a653444873d038715a78e0a25cc6ee57a8d8849dfce45f02e1344985f544e9e5a178cfd28dbaef1b3b219c4317f23571567df44f471974ccd91f", 0xad, 0x9}], 0x4000, &(0x7f0000000400)={[{'^@%*'}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0x66, 0x66, 0x35, 0x64, 0x30, 0x37, 0x65], 0x2d, [0x36, 0x34, 0x34, 0x62], 0x2d, [0x997b7b6164699436, 0x33, 0x34, 0x37], 0x2d, [0x65, 0x66, 0x38, 0x62], 0x2d, [0x38, 0x35, 0x64, 0x30, 0x39, 0x61, 0x39, 0x37]}}}, {@smackfsdef}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x10, &(0x7f0000000480)=ANY=[@ANYBLOB="c74877b541217177b6747261ee733d78656e2c610a55296234f5fb0c353ec4960484fda3ccc88a9b0674", @ANYRESDEC=0x0, @ANYBLOB=',dfltgid=', @ANYRESHEX=0xee00, @ANYBLOB=',privport,cache=none,fsname=,\x00']) (async) syz_mount_image$nfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x3, &(0x7f0000000340)=[{&(0x7f0000000100)="73a258becbd1d34525fe3f347f0f97af98b0fca66f40648a8612996ee33e2b20c75514a29e7341e07f8be59a33be9dc86ce6df5c2b531c55d3e07723bde4fec715ab7f42b2f133525ba2e14699b168cc80ad8ee4008145aeec476e602264d6fb2ca538851176a2b63ded6cd9546e62cccedccafaf804519e89e58a40fd78834227153ba66fce9950e97f0ff1036ff4dbfef69ccb74f519af00b723509d4cc732f7dcfb3b4ddd87a6aa75699d074379634694", 0xb2, 0x1}, {&(0x7f00000001c0)="315d95b2066cedf0ac0eb0e5492228e403d98ff740a24dfd961795c0612fcbffb6fa89f706f450654a74c9946dd892379b5c43fdd2c6b2842f7005b49b69a0b32d2c351d06866abedfd8a17bbda9b2f13e87d83295051327c3e7d35547d198f3d6d8553ac6b983e7c794e45fd3dbec4b57074cbeebc73affcd647ce7bdaac865f08d0e5688b9b91372bf4c43b7cc382f6bfcea1c4182", 0x96, 0xfffffffffffffffd}, {&(0x7f0000000280)="e410a02fcd455a160ea36ec904a982d56f336923baff40d10f5486c3aa26a190156068effa5fa437c4581551c6fc775c962dede1b27e1b521d64c90d16783f86671cae303a258aee88f59148e1c0b1c3370396f4ede0bb5392a0fff2831da2060401a1a38e647ca9d977297873640345a36312a653444873d038715a78e0a25cc6ee57a8d8849dfce45f02e1344985f544e9e5a178cfd28dbaef1b3b219c4317f23571567df44f471974ccd91f", 0xad, 0x9}], 0x4000, &(0x7f0000000400)={[{'^@%*'}], [{@fsuuid={'fsuuid', 0x3d, {[0x32, 0x66, 0x66, 0x35, 0x64, 0x30, 0x37, 0x65], 0x2d, [0x36, 0x34, 0x34, 0x62], 0x2d, [0x997b7b6164699436, 0x33, 0x34, 0x37], 0x2d, [0x65, 0x66, 0x38, 0x62], 0x2d, [0x38, 0x35, 0x64, 0x30, 0x39, 0x61, 0x39, 0x37]}}}, {@smackfsdef}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}) (async) 17:07:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}}) [ 1426.861464][T10632] loop0: detected capacity change from 0 to 264192 [ 1426.869166][T10634] tmpfs: Unknown parameter 'euid>00000000000000000000' [ 1426.879972][T10632] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1426.899335][T10637] 9pnet: Could not find request transport: xen 17:07:23 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x2000000}}, 0x34, 0x0) 17:07:23 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 17:07:23 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x800000}}, 0x34, 0x0) 17:07:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000300)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000340)={'syztnl2\x00', 0x0, 0x80, 0x10, 0xfa, 0x7, {{0x2b, 0x4, 0x0, 0x7, 0xac, 0x66, 0x0, 0x0, 0x29, 0x0, @rand_addr=0x64010100, @rand_addr=0x64010102, {[@timestamp_addr={0x44, 0x14, 0xbc, 0x1, 0x8, [{@empty, 0x1}, {@dev={0xac, 0x14, 0x14, 0x38}, 0x3}]}, @generic={0x83, 0x11, "a9c2614803019e9887560a6ad974bd"}, @cipso={0x86, 0x5a, 0x1, [{0x6, 0x8, "db5047e17df5"}, {0x2, 0x10, "3170a64318fb3fad99af5f45e084"}, {0x6, 0x12, "68e2289328ad866d002dfaceb5acdd66"}, {0x1, 0x8, "fc968e8e6c5a"}, {0x2, 0x3, "d6"}, {0x6, 0x4, "5bff"}, {0x7, 0x12, "f91d8c52392f50df3e948782b2284722"}, {0x5, 0x9, "0d76d5a5ad1980"}]}, @end, @lsrr={0x83, 0x7, 0xa7, [@broadcast]}, @end, @generic={0x44, 0xa, "3b2c04b7f52530d3"}, @ra={0x94, 0x4}]}}}}}) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)=0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000700)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000006c0)={&(0x7f0000000540)=@acquire={0x148, 0x17, 0x100, 0x70bd29, 0x25dfdbff, {{@in=@dev={0xac, 0x14, 0x14, 0xf}, 0x4d6, 0x6c}, @in=@private=0xa010100, {@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in6=@private2, 0x4e22, 0x18, 0x4e24, 0x5, 0x0, 0x80, 0xa0, 0x87, r1, 0xee00}, {{@in=@rand_addr=0x64010100, @in=@loopback, 0x4e21, 0xff, 0x4e22, 0x0, 0x2, 0xa0, 0x20, 0x0, r2, r3}, {0xfffffffffffff000, 0x8, 0x7, 0xed, 0x0, 0x3f, 0x3, 0xfffffffffffff9c3}, {0x0, 0x0, 0x1, 0x7}, 0x5c, 0x6e6bb8, 0x2, 0x0, 0x2, 0x1}, 0x7fff, 0x6, 0x5, 0x70bd27}, [@coaddr={0x14, 0xe, @in=@empty}, @mark={0xc, 0x15, {0x35075a, 0x1000}}]}, 0x148}, 0x1, 0x0, 0x0, 0x4}, 0x400c810) bind$tipc(0xffffffffffffffff, &(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x2, {0x42, 0x2, 0x2}}, 0x10) accept4$tipc(0xffffffffffffffff, &(0x7f0000000740)=@name, &(0x7f0000000780)=0x10, 0x800) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:23 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x4000000}}, 0x34, 0x0) [ 1426.952168][T10657] loop0: detected capacity change from 0 to 264192 [ 1426.958791][ T24] audit: type=1400 audit(1662311243.003:473): avc: denied { mount } for pid=10652 comm="syz-executor.4" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 17:07:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000300)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000340)={'syztnl2\x00', 0x0, 0x80, 0x10, 0xfa, 0x7, {{0x2b, 0x4, 0x0, 0x7, 0xac, 0x66, 0x0, 0x0, 0x29, 0x0, @rand_addr=0x64010100, @rand_addr=0x64010102, {[@timestamp_addr={0x44, 0x14, 0xbc, 0x1, 0x8, [{@empty, 0x1}, {@dev={0xac, 0x14, 0x14, 0x38}, 0x3}]}, @generic={0x83, 0x11, "a9c2614803019e9887560a6ad974bd"}, @cipso={0x86, 0x5a, 0x1, [{0x6, 0x8, "db5047e17df5"}, {0x2, 0x10, "3170a64318fb3fad99af5f45e084"}, {0x6, 0x12, "68e2289328ad866d002dfaceb5acdd66"}, {0x1, 0x8, "fc968e8e6c5a"}, {0x2, 0x3, "d6"}, {0x6, 0x4, "5bff"}, {0x7, 0x12, "f91d8c52392f50df3e948782b2284722"}, {0x5, 0x9, "0d76d5a5ad1980"}]}, @end, @lsrr={0x83, 0x7, 0xa7, [@broadcast]}, @end, @generic={0x44, 0xa, "3b2c04b7f52530d3"}, @ra={0x94, 0x4}]}}}}}) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)=0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000700)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000006c0)={&(0x7f0000000540)=@acquire={0x148, 0x17, 0x100, 0x70bd29, 0x25dfdbff, {{@in=@dev={0xac, 0x14, 0x14, 0xf}, 0x4d6, 0x6c}, @in=@private=0xa010100, {@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in6=@private2, 0x4e22, 0x18, 0x4e24, 0x5, 0x0, 0x80, 0xa0, 0x87, r1, 0xee00}, {{@in=@rand_addr=0x64010100, @in=@loopback, 0x4e21, 0xff, 0x4e22, 0x0, 0x2, 0xa0, 0x20, 0x0, r2, r3}, {0xfffffffffffff000, 0x8, 0x7, 0xed, 0x0, 0x3f, 0x3, 0xfffffffffffff9c3}, {0x0, 0x0, 0x1, 0x7}, 0x5c, 0x6e6bb8, 0x2, 0x0, 0x2, 0x1}, 0x7fff, 0x6, 0x5, 0x70bd27}, [@coaddr={0x14, 0xe, @in=@empty}, @mark={0xc, 0x15, {0x35075a, 0x1000}}]}, 0x148}, 0x1, 0x0, 0x0, 0x4}, 0x400c810) bind$tipc(0xffffffffffffffff, &(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x2, {0x42, 0x2, 0x2}}, 0x10) accept4$tipc(0xffffffffffffffff, &(0x7f0000000740)=@name, &(0x7f0000000780)=0x10, 0x800) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000300)) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000340)={'syztnl2\x00', 0x0, 0x80, 0x10, 0xfa, 0x7, {{0x2b, 0x4, 0x0, 0x7, 0xac, 0x66, 0x0, 0x0, 0x29, 0x0, @rand_addr=0x64010100, @rand_addr=0x64010102, {[@timestamp_addr={0x44, 0x14, 0xbc, 0x1, 0x8, [{@empty, 0x1}, {@dev={0xac, 0x14, 0x14, 0x38}, 0x3}]}, @generic={0x83, 0x11, "a9c2614803019e9887560a6ad974bd"}, @cipso={0x86, 0x5a, 0x1, [{0x6, 0x8, "db5047e17df5"}, {0x2, 0x10, "3170a64318fb3fad99af5f45e084"}, {0x6, 0x12, "68e2289328ad866d002dfaceb5acdd66"}, {0x1, 0x8, "fc968e8e6c5a"}, {0x2, 0x3, "d6"}, {0x6, 0x4, "5bff"}, {0x7, 0x12, "f91d8c52392f50df3e948782b2284722"}, {0x5, 0x9, "0d76d5a5ad1980"}]}, @end, @lsrr={0x83, 0x7, 0xa7, [@broadcast]}, @end, @generic={0x44, 0xa, "3b2c04b7f52530d3"}, @ra={0x94, 0x4}]}}}}}) (async) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) (async) sendmsg$nl_xfrm(r0, &(0x7f0000000700)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000006c0)={&(0x7f0000000540)=@acquire={0x148, 0x17, 0x100, 0x70bd29, 0x25dfdbff, {{@in=@dev={0xac, 0x14, 0x14, 0xf}, 0x4d6, 0x6c}, @in=@private=0xa010100, {@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in6=@private2, 0x4e22, 0x18, 0x4e24, 0x5, 0x0, 0x80, 0xa0, 0x87, r1, 0xee00}, {{@in=@rand_addr=0x64010100, @in=@loopback, 0x4e21, 0xff, 0x4e22, 0x0, 0x2, 0xa0, 0x20, 0x0, r2, r3}, {0xfffffffffffff000, 0x8, 0x7, 0xed, 0x0, 0x3f, 0x3, 0xfffffffffffff9c3}, {0x0, 0x0, 0x1, 0x7}, 0x5c, 0x6e6bb8, 0x2, 0x0, 0x2, 0x1}, 0x7fff, 0x6, 0x5, 0x70bd27}, [@coaddr={0x14, 0xe, @in=@empty}, @mark={0xc, 0x15, {0x35075a, 0x1000}}]}, 0x148}, 0x1, 0x0, 0x0, 0x4}, 0x400c810) (async) bind$tipc(0xffffffffffffffff, &(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x2, {0x42, 0x2, 0x2}}, 0x10) (async) accept4$tipc(0xffffffffffffffff, &(0x7f0000000740)=@name, &(0x7f0000000780)=0x10, 0x800) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) 17:07:23 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 17:07:23 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x1000000}}, 0x34, 0x0) [ 1426.999177][T10657] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1427.011769][T10659] 9pnet: Could not find request transport: xen 17:07:23 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) acct(&(0x7f0000000040)='./file0\x00') (async) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000080)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee00}}, {@fowner_lt={'fowner<', 0xffffffffffffffff}}, {@uid_eq={'uid', 0x3d, 0xffffffffffffffff}}, {@fsmagic={'fsmagic', 0x3d, 0x5}}, {@subj_user={'subj_user', 0x3d, '\x96^^'}}]}}) (async, rerun: 32) pipe(&(0x7f0000000000)={0xffffffffffffffff}) (rerun: 32) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) (async) accept$unix(r0, &(0x7f0000000140), &(0x7f0000000000)=0x6e) 17:07:23 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x6000000}}, 0x34, 0x0) [ 1427.033452][ T24] audit: type=1400 audit(1662311243.003:474): avc: denied { unmount } for pid=1853 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1427.092455][T10693] 9pnet: Could not find request transport: xen [ 1427.100150][T10687] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1427.106389][T10693] 9pnet: Could not find request transport: xen [ 1427.109370][T10687] Buffer I/O error on dev loop0, logical block 0, async page read [ 1427.109401][T10687] loop0: unable to read partition table [ 1427.109632][T10687] loop0: partition table beyond EOD, [ 1427.124263][T10693] 9pnet: Could not find request transport: xen 17:07:23 executing program 0: sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f00000000c0)={0x3c, 0x0, 0x20, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xfff}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc000}, 0x24040084) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getegid() mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000140)={'trans=xen,', {[{@nodevmap}, {@uname={'uname', 0x3d, '-\xcb\xda\xb4\xa9\xa8\xb1\xd8\x01\x00\x00\x00\x00\x00\x00\x00\xcc\xa2\xbe\xdfF\x15\xfd\x96X\x16\xcf\x06N>\x880'}}, {@dfltuid}, {@dfltgid={'dfltgid', 0x3d, r0}}, {@version_L}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:23 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 17:07:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000300)={'batadv0\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000340)={'syztnl2\x00', 0x0, 0x80, 0x10, 0xfa, 0x7, {{0x2b, 0x4, 0x0, 0x7, 0xac, 0x66, 0x0, 0x0, 0x29, 0x0, @rand_addr=0x64010100, @rand_addr=0x64010102, {[@timestamp_addr={0x44, 0x14, 0xbc, 0x1, 0x8, [{@empty, 0x1}, {@dev={0xac, 0x14, 0x14, 0x38}, 0x3}]}, @generic={0x83, 0x11, "a9c2614803019e9887560a6ad974bd"}, @cipso={0x86, 0x5a, 0x1, [{0x6, 0x8, "db5047e17df5"}, {0x2, 0x10, "3170a64318fb3fad99af5f45e084"}, {0x6, 0x12, "68e2289328ad866d002dfaceb5acdd66"}, {0x1, 0x8, "fc968e8e6c5a"}, {0x2, 0x3, "d6"}, {0x6, 0x4, "5bff"}, {0x7, 0x12, "f91d8c52392f50df3e948782b2284722"}, {0x5, 0x9, "0d76d5a5ad1980"}]}, @end, @lsrr={0x83, 0x7, 0xa7, [@broadcast]}, @end, @generic={0x44, 0xa, "3b2c04b7f52530d3"}, @ra={0x94, 0x4}]}}}}}) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)=0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000700)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000006c0)={&(0x7f0000000540)=@acquire={0x148, 0x17, 0x100, 0x70bd29, 0x25dfdbff, {{@in=@dev={0xac, 0x14, 0x14, 0xf}, 0x4d6, 0x6c}, @in=@private=0xa010100, {@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in6=@private2, 0x4e22, 0x18, 0x4e24, 0x5, 0x0, 0x80, 0xa0, 0x87, r1, 0xee00}, {{@in=@rand_addr=0x64010100, @in=@loopback, 0x4e21, 0xff, 0x4e22, 0x0, 0x2, 0xa0, 0x20, 0x0, r2, r3}, {0xfffffffffffff000, 0x8, 0x7, 0xed, 0x0, 0x3f, 0x3, 0xfffffffffffff9c3}, {0x0, 0x0, 0x1, 0x7}, 0x5c, 0x6e6bb8, 0x2, 0x0, 0x2, 0x1}, 0x7fff, 0x6, 0x5, 0x70bd27}, [@coaddr={0x14, 0xe, @in=@empty}, @mark={0xc, 0x15, {0x35075a, 0x1000}}]}, 0x148}, 0x1, 0x0, 0x0, 0x4}, 0x400c810) bind$tipc(0xffffffffffffffff, &(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x2, {0x42, 0x2, 0x2}}, 0x10) accept4$tipc(0xffffffffffffffff, &(0x7f0000000740)=@name, &(0x7f0000000780)=0x10, 0x800) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000300)) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000340)={'syztnl2\x00', 0x0, 0x80, 0x10, 0xfa, 0x7, {{0x2b, 0x4, 0x0, 0x7, 0xac, 0x66, 0x0, 0x0, 0x29, 0x0, @rand_addr=0x64010100, @rand_addr=0x64010102, {[@timestamp_addr={0x44, 0x14, 0xbc, 0x1, 0x8, [{@empty, 0x1}, {@dev={0xac, 0x14, 0x14, 0x38}, 0x3}]}, @generic={0x83, 0x11, "a9c2614803019e9887560a6ad974bd"}, @cipso={0x86, 0x5a, 0x1, [{0x6, 0x8, "db5047e17df5"}, {0x2, 0x10, "3170a64318fb3fad99af5f45e084"}, {0x6, 0x12, "68e2289328ad866d002dfaceb5acdd66"}, {0x1, 0x8, "fc968e8e6c5a"}, {0x2, 0x3, "d6"}, {0x6, 0x4, "5bff"}, {0x7, 0x12, "f91d8c52392f50df3e948782b2284722"}, {0x5, 0x9, "0d76d5a5ad1980"}]}, @end, @lsrr={0x83, 0x7, 0xa7, [@broadcast]}, @end, @generic={0x44, 0xa, "3b2c04b7f52530d3"}, @ra={0x94, 0x4}]}}}}}) (async) getresuid(&(0x7f0000000480), &(0x7f00000004c0), &(0x7f0000000500)) (async) sendmsg$nl_xfrm(r0, &(0x7f0000000700)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000006c0)={&(0x7f0000000540)=@acquire={0x148, 0x17, 0x100, 0x70bd29, 0x25dfdbff, {{@in=@dev={0xac, 0x14, 0x14, 0xf}, 0x4d6, 0x6c}, @in=@private=0xa010100, {@in6=@private0={0xfc, 0x0, '\x00', 0x1}, @in6=@private2, 0x4e22, 0x18, 0x4e24, 0x5, 0x0, 0x80, 0xa0, 0x87, r1, 0xee00}, {{@in=@rand_addr=0x64010100, @in=@loopback, 0x4e21, 0xff, 0x4e22, 0x0, 0x2, 0xa0, 0x20, 0x0, r2, r3}, {0xfffffffffffff000, 0x8, 0x7, 0xed, 0x0, 0x3f, 0x3, 0xfffffffffffff9c3}, {0x0, 0x0, 0x1, 0x7}, 0x5c, 0x6e6bb8, 0x2, 0x0, 0x2, 0x1}, 0x7fff, 0x6, 0x5, 0x70bd27}, [@coaddr={0x14, 0xe, @in=@empty}, @mark={0xc, 0x15, {0x35075a, 0x1000}}]}, 0x148}, 0x1, 0x0, 0x0, 0x4}, 0x400c810) (async) bind$tipc(0xffffffffffffffff, &(0x7f0000000280)=@nameseq={0x1e, 0x1, 0x2, {0x42, 0x2, 0x2}}, 0x10) (async) accept4$tipc(0xffffffffffffffff, &(0x7f0000000740)=@name, &(0x7f0000000780)=0x10, 0x800) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) 17:07:23 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x8000000}}, 0x34, 0x0) 17:07:23 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x2000000}}, 0x34, 0x0) 17:07:23 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x4000000}}, 0x34, 0x0) [ 1427.129070][T10687] truncated [ 1427.134571][T10687] loop0: detected capacity change from 0 to 264192 [ 1427.140754][ T1437] I/O error, dev loop0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1427.143906][T10687] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1427.150249][ T1437] Buffer I/O error on dev loop0, logical block 0, async page read [ 1427.166282][T10693] 9pnet: Could not find request transport: xen 17:07:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000002e890db70000000000000000000000000000005e9c000000000000000000000000007cdf0cddeee05b7103e129c65f00"/510]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000480)={{r1, 0xfffffffffffffffe, 0x8, 0xffff, 0x7, 0x3, 0x3, 0x3, 0xbe7d, 0xd1bb, 0x3, 0x6d3a, 0x8000, 0x80000000, 0x3}}) 17:07:23 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 17:07:23 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xc000000}}, 0x34, 0x0) 17:07:23 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x6000000}}, 0x34, 0x0) [ 1427.211673][T10693] 9pnet: Could not find request transport: xen [ 1427.264550][T10716] 9pnet: Could not find request transport: xen [ 1427.271562][T10693] 9pnet: Could not find request transport: xen [ 1427.299607][T10693] 9pnet: Could not find request transport: xen [ 1427.342875][T10693] 9pnet: Could not find request transport: xen [ 1427.384708][T10693] 9pnet: Could not find request transport: xen [ 1427.402355][T10693] 9pnet: Could not find request transport: xen [ 1427.416032][T10693] 9pnet: Could not find request transport: xen [ 1427.428468][T10693] 9pnet: Could not find request transport: xen [ 1427.440987][T10693] 9pnet: Could not find request transport: xen [ 1427.453402][T10693] 9pnet: Could not find request transport: xen [ 1427.465262][T10693] 9pnet: Could not find request transport: xen [ 1427.477547][T10693] 9pnet: Could not find request transport: xen [ 1427.489386][T10693] 9pnet: Could not find request transport: xen [ 1427.502582][T10693] 9pnet: Could not find request transport: xen [ 1427.514997][T10693] 9pnet: Could not find request transport: xen [ 1427.527220][T10693] 9pnet: Could not find request transport: xen [ 1427.539373][T10693] 9pnet: Could not find request transport: xen [ 1427.551400][T10693] 9pnet: Could not find request transport: xen [ 1427.563366][T10693] 9pnet: Could not find request transport: xen [ 1427.575706][T10693] 9pnet: Could not find request transport: xen [ 1427.587988][T10693] 9pnet: Could not find request transport: xen [ 1427.600255][T10693] 9pnet: Could not find request transport: xen [ 1427.612702][T10693] 9pnet: Could not find request transport: xen [ 1427.625192][T10693] 9pnet: Could not find request transport: xen [ 1427.637407][T10693] 9pnet: Could not find request transport: xen [ 1427.650173][T10693] 9pnet: Could not find request transport: xen [ 1427.662664][T10693] 9pnet: Could not find request transport: xen [ 1427.674702][T10693] 9pnet: Could not find request transport: xen 17:07:23 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 17:07:23 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xd000000}}, 0x34, 0x0) 17:07:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000002e890db70000000000000000000000000000005e9c000000000000000000000000007cdf0cddeee05b7103e129c65f00"/510]}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000480)={{r1, 0xfffffffffffffffe, 0x8, 0xffff, 0x7, 0x3, 0x3, 0x3, 0xbe7d, 0xd1bb, 0x3, 0x6d3a, 0x8000, 0x80000000, 0x3}}) 17:07:23 executing program 0: sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f00000000c0)={0x3c, 0x0, 0x20, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xfff}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc000}, 0x24040084) (async) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = getegid() mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000140)={'trans=xen,', {[{@nodevmap}, {@uname={'uname', 0x3d, '-\xcb\xda\xb4\xa9\xa8\xb1\xd8\x01\x00\x00\x00\x00\x00\x00\x00\xcc\xa2\xbe\xdfF\x15\xfd\x96X\x16\xcf\x06N>\x880'}}, {@dfltuid}, {@dfltgid={'dfltgid', 0x3d, r0}}, {@version_L}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:23 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x8000000}}, 0x34, 0x0) 17:07:23 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x20000000}}, 0x34, 0x0) 17:07:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000002e890db70000000000000000000000000000005e9c000000000000000000000000007cdf0cddeee05b7103e129c65f00"/510]}) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, &(0x7f0000000480)={{r1, 0xfffffffffffffffe, 0x8, 0xffff, 0x7, 0x3, 0x3, 0x3, 0xbe7d, 0xd1bb, 0x3, 0x6d3a, 0x8000, 0x80000000, 0x3}}) [ 1427.688441][T10693] 9pnet: Could not find request transport: xen 17:07:23 executing program 0: sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f00000000c0)={0x3c, 0x0, 0x20, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xfff}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc000}, 0x24040084) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = getegid() mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000140)={'trans=xen,', {[{@nodevmap}, {@uname={'uname', 0x3d, '-\xcb\xda\xb4\xa9\xa8\xb1\xd8\x01\x00\x00\x00\x00\x00\x00\x00\xcc\xa2\xbe\xdfF\x15\xfd\x96X\x16\xcf\x06N>\x880'}}, {@dfltuid}, {@dfltgid={'dfltgid', 0x3d, r0}}, {@version_L}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000040)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000080)={&(0x7f00000000c0)={0x3c, 0x0, 0x20, 0x70bd2c, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x5}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0xfff}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}]}, 0x3c}, 0x1, 0x0, 0x0, 0xc000}, 0x24040084) (async) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) getegid() (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000140)={'trans=xen,', {[{@nodevmap}, {@uname={'uname', 0x3d, '-\xcb\xda\xb4\xa9\xa8\xb1\xd8\x01\x00\x00\x00\x00\x00\x00\x00\xcc\xa2\xbe\xdfF\x15\xfd\x96X\x16\xcf\x06N>\x880'}}, {@dfltuid}, {@dfltgid={'dfltgid', 0x3d, r0}}, {@version_L}], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async) 17:07:23 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xc000000}}, 0x34, 0x0) 17:07:23 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 17:07:23 executing program 2: r0 = getegid() fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, r0, 0x1000) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:23 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x24000000}}, 0x34, 0x0) 17:07:23 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xd000000}}, 0x34, 0x0) 17:07:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r1, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, 0x2, 0x8, 0x101, 0x0, 0x0, {0xa, 0x0, 0x4}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x3}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88f7}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000020}, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:23 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 17:07:23 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x3f000000}}, 0x34, 0x0) 17:07:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r1, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, 0x2, 0x8, 0x101, 0x0, 0x0, {0xa, 0x0, 0x4}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x3}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88f7}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000020}, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) pipe(&(0x7f0000000000)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) (async) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r1, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, 0x2, 0x8, 0x101, 0x0, 0x0, {0xa, 0x0, 0x4}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x3}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88f7}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000020}, 0x10) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) 17:07:23 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x20000000}}, 0x34, 0x0) 17:07:23 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) [ 1427.796174][T10779] 9pnet: Could not find request transport: xen [ 1427.812974][T10776] 9pnet: Could not find request transport: xen 17:07:23 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r1, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, 0x2, 0x8, 0x101, 0x0, 0x0, {0xa, 0x0, 0x4}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x3}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88f7}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000020}, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) pipe(&(0x7f0000000000)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) (async) sendmsg$IPCTNL_MSG_TIMEOUT_DELETE(r1, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x5c, 0x2, 0x8, 0x101, 0x0, 0x0, {0xa, 0x0, 0x4}, [@CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}, @CTA_TIMEOUT_DATA={0x2c, 0x4, 0x0, 0x1, @gre=[@CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x7}, @CTA_TIMEOUT_GRE_UNREPLIED={0x8, 0x1, 0x1, 0x0, 0x3}]}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x1}, @CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x88f7}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000020}, 0x10) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) 17:07:23 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x81000000}}, 0x34, 0x0) 17:07:23 executing program 2: r0 = getegid() fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, r0, 0x1000) (async) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:23 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x24000000}}, 0x34, 0x0) 17:07:23 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 17:07:23 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x81020000}}, 0x34, 0x0) 17:07:23 executing program 3: gettid() r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b0000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000061b7000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000098256d32e975e27520f56a65d2e92e06f8b30a8f554cc873c96aff2249c7b08ad202819c33c41f9cdcf63ed29a806bd78b5344fa8ad9236d52d459163e7aa925215bbc802f3a877bf3818b552da35998251d6c78877afd3cc317d872aa08dc094b49611640e537e5b45f4379357ac139659c0ed3d5c572d2ea2840d6a7a0e0f824480f3d4d7b7bf6f7a41cac28787d36fec0ab8a282c1d192111c78522827a8c"]}) 17:07:23 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:07:23 executing program 3: gettid() (async) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b0000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000061b7000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000098256d32e975e27520f56a65d2e92e06f8b30a8f554cc873c96aff2249c7b08ad202819c33c41f9cdcf63ed29a806bd78b5344fa8ad9236d52d459163e7aa925215bbc802f3a877bf3818b552da35998251d6c78877afd3cc317d872aa08dc094b49611640e537e5b45f4379357ac139659c0ed3d5c572d2ea2840d6a7a0e0f824480f3d4d7b7bf6f7a41cac28787d36fec0ab8a282c1d192111c78522827a8c"]}) 17:07:23 executing program 2: r0 = getegid() fchownat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, r0, 0x1000) (async) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) 17:07:23 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x8bffffff}}, 0x34, 0x0) 17:07:23 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x3f000000}}, 0x34, 0x0) 17:07:24 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1427.906250][T10811] 9pnet: Could not find request transport: xen 17:07:24 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="e26d310bb56c1814ab3e1704e37233fa8491b7fd3eacab22ee1b6b5378f9d57c69a424e8b5ec09b38659766ab7739799f96c274d718134caaff3cbf076c7d7c854ef21a39a3ac430837f81225dcd854163d40ed43511a2e90f298773f157e8a7162db25c9bf339cd2cd893f760f2aa2421b7bc2b7530", 0x76, 0x8}, {&(0x7f0000000100)="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", 0xff, 0x60}], 0x800824, &(0x7f0000000240)={[{@mode={'mode', 0x3d, 0x100000001}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x38, 0x78, 0x74, 0x36]}}, {@mpol={'mpol', 0x3d, {'default', '=relative', @val={0x3a, [0x38, 0x31, 0x39]}}}}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x2d, 0x2c]}}}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@seclabel}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@obj_type={'obj_type', 0x3d, 'trans=xen,'}}]}) getresuid(&(0x7f0000000380)=0x0, &(0x7f0000000400), &(0x7f0000000440)) setxattr$security_capability(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340), &(0x7f0000000480)=@v3={0x3000000, [{0x3, 0x6}, {0x10001, 0x3}], r0}, 0x18, 0x2) 17:07:24 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x8cffffff}}, 0x34, 0x0) 17:07:24 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 17:07:24 executing program 2: sendmsg$IPSET_CMD_RENAME(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x34, 0x5, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x20004081) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='\x00', &(0x7f0000000000), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7472616e733d78656e2c756e616d653d7472616e733d78656e2c2c0014c0e394a1d7338f4eaf093c3bd156a7997de10e4940e26ccd4921479d042746c2ecfef67c41a115f2788a2605f19a0c1b89c053737689df6982dfd723b753c2f74903c88b3d05b368953c7444a7039ff11dfa5f2b7bc1c41bdd5d55da8822a3313640b47762ee279236d1d8"]) 17:07:24 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x61130000}}, 0x34, 0x0) 17:07:24 executing program 3: gettid() (async) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b0000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fdffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000061b7000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000098256d32e975e27520f56a65d2e92e06f8b30a8f554cc873c96aff2249c7b08ad202819c33c41f9cdcf63ed29a806bd78b5344fa8ad9236d52d459163e7aa925215bbc802f3a877bf3818b552da35998251d6c78877afd3cc317d872aa08dc094b49611640e537e5b45f4379357ac139659c0ed3d5c572d2ea2840d6a7a0e0f824480f3d4d7b7bf6f7a41cac28787d36fec0ab8a282c1d192111c78522827a8c"]}) 17:07:24 executing program 2: sendmsg$IPSET_CMD_RENAME(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x34, 0x5, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x20004081) (async) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000002c0)='\x00', &(0x7f0000000000), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7472616e733d78656e2c756e616d653d7472616e733d78656e2c2c0014c0e394a1d7338f4eaf093c3bd156a7997de10e4940e26ccd4921479d042746c2ecfef67c41a115f2788a2605f19a0c1b89c053737689df6982dfd723b753c2f74903c88b3d05b368953c7444a7039ff11dfa5f2b7bc1c41bdd5d55da8822a3313640b47762ee279236d1d8"]) 17:07:24 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x81000000}}, 0x34, 0x0) 17:07:24 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x94130000}}, 0x34, 0x0) 17:07:24 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)) 17:07:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000f5ff0000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000086735d28b9df36dfebaf3497b67c7fef129852954f0782bca4fb37cc8975f81e010992ddc4a7962fa17af8c2090cda238e921da650d2821c0000000000000000"]}) [ 1427.974638][T10842] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:24 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="e26d310bb56c1814ab3e1704e37233fa8491b7fd3eacab22ee1b6b5378f9d57c69a424e8b5ec09b38659766ab7739799f96c274d718134caaff3cbf076c7d7c854ef21a39a3ac430837f81225dcd854163d40ed43511a2e90f298773f157e8a7162db25c9bf339cd2cd893f760f2aa2421b7bc2b7530", 0x76, 0x8}, {&(0x7f0000000100)="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", 0xff, 0x60}], 0x800824, &(0x7f0000000240)={[{@mode={'mode', 0x3d, 0x100000001}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x38, 0x78, 0x74, 0x36]}}, {@mpol={'mpol', 0x3d, {'default', '=relative', @val={0x3a, [0x38, 0x31, 0x39]}}}}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x2d, 0x2c]}}}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@seclabel}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@obj_type={'obj_type', 0x3d, 'trans=xen,'}}]}) getresuid(&(0x7f0000000380)=0x0, &(0x7f0000000400), &(0x7f0000000440)) setxattr$security_capability(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340), &(0x7f0000000480)=@v3={0x3000000, [{0x3, 0x6}, {0x10001, 0x3}], r0}, 0x18, 0x2) 17:07:24 executing program 2: sendmsg$IPSET_CMD_RENAME(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x34, 0x5, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x20004081) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='\x00', &(0x7f0000000000), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7472616e733d78656e2c756e616d653d7472616e733d78656e2c2c0014c0e394a1d7338f4eaf093c3bd156a7997de10e4940e26ccd4921479d042746c2ecfef67c41a115f2788a2605f19a0c1b89c053737689df6982dfd723b753c2f74903c88b3d05b368953c7444a7039ff11dfa5f2b7bc1c41bdd5d55da8822a3313640b47762ee279236d1d8"]) sendmsg$IPSET_CMD_RENAME(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)={0x34, 0x5, 0x6, 0x5, 0x0, 0x0, {0x1, 0x0, 0x4}, [@IPSET_ATTR_SETNAME2={0x9, 0x3, 'syz0\x00'}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz2\x00'}]}, 0x34}, 0x1, 0x0, 0x0, 0x40010}, 0x20004081) (async) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000002c0)='\x00', &(0x7f0000000000), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7472616e733d78656e2c756e616d653d7472616e733d78656e2c2c0014c0e394a1d7338f4eaf093c3bd156a7997de10e4940e26ccd4921479d042746c2ecfef67c41a115f2788a2605f19a0c1b89c053737689df6982dfd723b753c2f74903c88b3d05b368953c7444a7039ff11dfa5f2b7bc1c41bdd5d55da8822a3313640b47762ee279236d1d8"]) (async) 17:07:24 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xe4ffffff}}, 0x34, 0x0) 17:07:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000f5ff0000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000086735d28b9df36dfebaf3497b67c7fef129852954f0782bca4fb37cc8975f81e010992ddc4a7962fa17af8c2090cda238e921da650d2821c0000000000000000"]}) 17:07:24 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x81020000}}, 0x34, 0x0) 17:07:24 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)) 17:07:24 executing program 2: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) connect(r1, &(0x7f0000000040)=@pppoe={0x18, 0x0, {0xa, @local, 'bridge0\x00'}}, 0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0/file0\x00'}, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) connect$nfc_raw(r2, &(0x7f0000000100)={0x27, 0x0, 0x2, 0x4}, 0x10) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7472616e73cc7a7eeef002d5634bce99ce42e890c33d78656e2c756e616d653d747261"]) 17:07:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000004000000000000000000000000000000000000000000000000000000000000000f5ff0000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000086735d28b9df36dfebaf3497b67c7fef129852954f0782bca4fb37cc8975f81e010992ddc4a7962fa17af8c2090cda238e921da650d2821c0000000000000000"]}) 17:07:24 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x8bffffff}}, 0x34, 0x0) 17:07:24 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xf6ffffff}}, 0x34, 0x0) 17:07:24 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)) 17:07:24 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xfbffffff}}, 0x34, 0x0) [ 1428.067981][T10872] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:24 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async, rerun: 64) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x1, 0x2, &(0x7f0000000200)=[{&(0x7f0000000080)="e26d310bb56c1814ab3e1704e37233fa8491b7fd3eacab22ee1b6b5378f9d57c69a424e8b5ec09b38659766ab7739799f96c274d718134caaff3cbf076c7d7c854ef21a39a3ac430837f81225dcd854163d40ed43511a2e90f298773f157e8a7162db25c9bf339cd2cd893f760f2aa2421b7bc2b7530", 0x76, 0x8}, {&(0x7f0000000100)="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", 0xff, 0x60}], 0x800824, &(0x7f0000000240)={[{@mode={'mode', 0x3d, 0x100000001}}, {@nr_blocks={'nr_blocks', 0x3d, [0x70, 0x38, 0x78, 0x74, 0x36]}}, {@mpol={'mpol', 0x3d, {'default', '=relative', @val={0x3a, [0x38, 0x31, 0x39]}}}}, {@uid={'uid', 0x3d, 0xffffffffffffffff}}, {@mpol={'mpol', 0x3d, {'bind', '=relative', @val={0x3a, [0x2d, 0x2c]}}}}], [{@fscontext={'fscontext', 0x3d, 'unconfined_u'}}, {@seclabel}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@obj_type={'obj_type', 0x3d, 'trans=xen,'}}]}) (async, rerun: 64) getresuid(&(0x7f0000000380)=0x0, &(0x7f0000000400), &(0x7f0000000440)) setxattr$security_capability(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340), &(0x7f0000000480)=@v3={0x3000000, [{0x3, 0x6}, {0x10001, 0x3}], r0}, 0x18, 0x2) 17:07:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005f9632a9934a391016a700"/530]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000000)) 17:07:24 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0x8cffffff}}, 0x34, 0x0) 17:07:24 executing program 2: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) connect(r1, &(0x7f0000000040)=@pppoe={0x18, 0x0, {0xa, @local, 'bridge0\x00'}}, 0x80) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0/file0\x00'}, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) connect$nfc_raw(r2, &(0x7f0000000100)={0x27, 0x0, 0x2, 0x4}, 0x10) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7472616e73cc7a7eeef002d5634bce99ce42e890c33d78656e2c756e616d653d747261"]) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) (async) connect(r1, &(0x7f0000000040)=@pppoe={0x18, 0x0, {0xa, @local, 'bridge0\x00'}}, 0x80) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0/file0\x00'}, 0x10) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) (async) connect$nfc_raw(r2, &(0x7f0000000100)={0x27, 0x0, 0x2, 0x4}, 0x10) (async) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7472616e73cc7a7eeef002d5634bce99ce42e890c33d78656e2c756e616d653d747261"]) (async) 17:07:24 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xfeffffff}}, 0x34, 0x0) 17:07:24 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes}]}) 17:07:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005f9632a9934a391016a700"/530]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000000)) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005f9632a9934a391016a700"/530]}) (async) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000000)) (async) 17:07:24 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xe4ffffff}}, 0x34, 0x0) 17:07:24 executing program 2: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) (async, rerun: 64) connect(r1, &(0x7f0000000040)=@pppoe={0x18, 0x0, {0xa, @local, 'bridge0\x00'}}, 0x80) (rerun: 64) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000180)={&(0x7f0000000140)='./file0/file0\x00'}, 0x10) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {r0}}, './file0\x00'}) connect$nfc_raw(r2, &(0x7f0000000100)={0x27, 0x0, 0x2, 0x4}, 0x10) (async) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="7472616e73cc7a7eeef002d5634bce99ce42e890c33d78656e2c756e616d653d747261"]) 17:07:24 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xff000000}}, 0x34, 0x0) 17:07:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005f9632a9934a391016a700"/530]}) ioctl$PPPIOCGIDLE(0xffffffffffffffff, 0x8010743f, &(0x7f0000000000)) 17:07:24 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes}]}) [ 1428.147394][T10897] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.183655][T10916] tmpfs: Bad value for 'nr_inodes' 17:07:24 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='-\x00', 0x2, 0x0) 17:07:24 executing program 2: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000080)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 17:07:24 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xf6ffffff}}, 0x34, 0x0) 17:07:24 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xff010000}}, 0x34, 0x0) 17:07:24 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes}]}) 17:07:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002bb115c6c910e5358019a9f297dd7f16d8c64358522da5b5c5825248003a77a0ea883d223f366c4a04fa6d34b5149ef877d6f8763eb8b91681256ff323c5865fa26"]}) 17:07:24 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xfbffffff}}, 0x34, 0x0) 17:07:24 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xffffff8b}}, 0x34, 0x0) [ 1428.219918][T10929] tmpfs: Bad value for 'nr_inodes' [ 1428.232334][T10931] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:24 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async, rerun: 64) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="747275737450b126cf0600ca3d3d7878b8b80fefe6ee98be166d64909e5d04e1ae4b09f31cec3840dcd442a5ec1ee25ac855abe8f9de5d858fd1000000005e98188d2e97d8242a5a2ec3b991f69e2b398a3d83fce03af93d338684c89f856fa4482c465acf2cc9dbd0115869399b9542bac8800c38749a793e7aa85921c5383acdc2fe977eea41f44059e39a694a289e0dc666d149f0c12daeb16f44fbe02f3a875bf1f3cd2b879a0c7bffffffffffffffffbf11640f30f368eda81ce48494d9db2d69a33b7833e899c704a6783ae94d02ed9f43a777220dcc51c3f3549757cb1c43e97d192e8e5f94445465d72f413385266243cfb4c30d6e8c16d4e165c6a7ffd39710c106d8b1c5e1e6c27c673ac267b75b209ddddb99ebf603bda1c0f4657d8796995d21c1b0dc32cb37e965e09c63c5f62d819b68"], &(0x7f0000000080)='-\x00', 0x2, 0x0) 17:07:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002bb115c6c910e5358019a9f297dd7f16d8c64358522da5b5c5825248003a77a0ea883d223f366c4a04fa6d34b5149ef877d6f8763eb8b91681256ff323c5865fa26"]}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002bb115c6c910e5358019a9f297dd7f16d8c64358522da5b5c5825248003a77a0ea883d223f366c4a04fa6d34b5149ef877d6f8763eb8b91681256ff323c5865fa26"]}) (async) 17:07:24 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xfeffffff}}, 0x34, 0x0) 17:07:24 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x0]}}]}) [ 1428.274364][T10943] tmpfs: Bad value for 'nr_inodes' [ 1428.294050][T10939] 9pnet: Could not find request transport: xen 17:07:24 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xffffff8c}}, 0x34, 0x0) 17:07:24 executing program 2: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) (async) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000080)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 17:07:24 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xff000000}}, 0x34, 0x0) 17:07:24 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002bb115c6c910e5358019a9f297dd7f16d8c64358522da5b5c5825248003a77a0ea883d223f366c4a04fa6d34b5149ef877d6f8763eb8b91681256ff323c5865fa26"]}) 17:07:24 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xffffffe4}}, 0x34, 0x0) 17:07:24 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x0]}}]}) 17:07:24 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xff010000}}, 0x34, 0x0) [ 1428.317825][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.333692][T10959] tmpfs: Bad value for 'nr_inodes' [ 1428.346462][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:24 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) connect$nfc_raw(r0, &(0x7f00000002c0)={0x27, 0x0, 0x0, 0x4}, 0x10) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000280)=0x3) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) [ 1428.388201][T10965] 9pnet: Could not find request transport: xen [ 1428.391062][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.403371][T10975] tmpfs: Bad value for 'nr_inodes' [ 1428.414597][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.429824][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.441882][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.453023][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.461568][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.484260][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.511056][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.527092][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.535691][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.544090][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.552553][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.561360][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.569678][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.577923][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.586354][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.594743][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.603913][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.612561][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.621052][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.629590][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.637949][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.647109][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.655711][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.664233][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.672621][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.681105][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.689415][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.697820][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.706281][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.714696][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.723711][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.732033][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.740508][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.748899][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.757283][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.765601][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.774164][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.782936][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.791351][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.799658][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.808118][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.816542][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.824915][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.833215][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.841505][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.850161][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.858456][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.866765][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.875139][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.883572][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.892932][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.901266][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.909606][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.917948][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.926460][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.935267][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:25 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='-\x00', 0x2, 0x0) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async) lsetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='-\x00', 0x2, 0x0) (async) 17:07:25 executing program 2: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000080)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 17:07:25 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xffffff8b}}, 0x34, 0x0) 17:07:25 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xfffffff6}}, 0x34, 0x0) 17:07:25 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x0]}}]}) 17:07:25 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) connect$nfc_raw(r0, &(0x7f00000002c0)={0x27, 0x0, 0x0, 0x4}, 0x10) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000280)=0x3) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) pipe(&(0x7f0000000000)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) (async) connect$nfc_raw(r0, &(0x7f00000002c0)={0x27, 0x0, 0x0, 0x4}, 0x10) (async) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000280)=0x3) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) [ 1428.943569][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.951916][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.960253][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.968585][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.977031][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1428.985443][T10951] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:25 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x800000, &(0x7f00000000c0)={'trans=xen,', {[], [{@uid_eq}, {@smackfsfloor={'smackfsfloor', 0x3d, 'trans=xen,\x1c\v\xc40\xa1P\xe1fn3$<\xd4\x8cVt\v\x1f\xd3\xf0\xb1:\xedt\xb1\xd3\x17!I15\x195u\x1dAv\xf8\xd1\xd9\xcfc'}}, {@fsname={'fsname', 0x3d, ':*\x18.-,[}:'}}]}}) 17:07:25 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xffffff8c}}, 0x34, 0x0) 17:07:25 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r0) (async, rerun: 32) connect$nfc_raw(r0, &(0x7f00000002c0)={0x27, 0x0, 0x0, 0x4}, 0x10) (rerun: 32) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000280)=0x3) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:25 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xfffffffb}}, 0x34, 0x0) [ 1429.009145][T10992] tmpfs: Bad value for 'nr_inodes' 17:07:25 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xfffffffe}}, 0x34, 0x0) 17:07:25 executing program 4: syz_mount_image$tmpfs(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)={[{@nr_inodes={'nr_inodes', 0x3d, [0x74]}}]}) 17:07:25 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x4, 0x0) 17:07:25 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xffffffe4}}, 0x34, 0x0) 17:07:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000014c0)=ANY=[@ANYBLOB="0900000000000000000000000800000085000000000000009500000000000000950000000000000084107d30533cd70f55"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x80, &(0x7f0000000080)=""/128, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x8, 0x10, &(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x15) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r2) write$cgroup_devices(r2, &(0x7f0000001480)={'c', ' *:* ', 'rm\x00'}, 0x9) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000480)={{r3, 0x1, 0x4, 0xffff, 0x724, 0x81, 0x7, 0x8, 0xed, 0x3aa4, 0x842, 0x5, 0x0, 0x0, 0x101}}) 17:07:25 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x800000, &(0x7f00000000c0)={'trans=xen,', {[], [{@uid_eq}, {@smackfsfloor={'smackfsfloor', 0x3d, 'trans=xen,\x1c\v\xc40\xa1P\xe1fn3$<\xd4\x8cVt\v\x1f\xd3\xf0\xb1:\xedt\xb1\xd3\x17!I15\x195u\x1dAv\xf8\xd1\xd9\xcfc'}}, {@fsname={'fsname', 0x3d, ':*\x18.-,[}:'}}]}}) [ 1429.059904][T11004] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1429.079794][T11008] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1429.101939][T11002] 9pnet: Could not find request transport: xen 17:07:25 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xfffffffe}}, 0x34, 0x0) 17:07:25 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xfffffff6}}, 0x34, 0x0) 17:07:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000014c0)=ANY=[@ANYBLOB="0900000000000000000000000800000085000000000000009500000000000000950000000000000084107d30533cd70f55"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x80, &(0x7f0000000080)=""/128, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x8, 0x10, &(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x15) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}) (async) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r2) (async) write$cgroup_devices(r2, &(0x7f0000001480)={'c', ' *:* ', 'rm\x00'}, 0x9) (async, rerun: 32) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) (async, rerun: 32) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000480)={{r3, 0x1, 0x4, 0xffff, 0x724, 0x81, 0x7, 0x8, 0xed, 0x3aa4, 0x842, 0x5, 0x0, 0x0, 0x101}}) 17:07:25 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x24, 0x0) 17:07:25 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xfffffffe}}, 0x34, 0x0) 17:07:25 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xfffffffb}}, 0x34, 0x0) 17:07:25 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0xfdc, 0x0) 17:07:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000014c0)=ANY=[@ANYBLOB="0900000000000000000000000800000085000000000000009500000000000000950000000000000084107d30533cd70f55"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x80, &(0x7f0000000080)=""/128, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000100), 0x8, 0x10, &(0x7f0000000280), 0x10, 0x0, 0x0, 0x0, &(0x7f00000013c0)=[0x1, 0xffffffffffffffff, 0x1, 0xffffffffffffffff]}, 0x15) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd]}}) (async) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r2) write$cgroup_devices(r2, &(0x7f0000001480)={'c', ' *:* ', 'rm\x00'}, 0x9) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000280)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000480)={{r3, 0x1, 0x4, 0xffff, 0x724, 0x81, 0x7, 0x8, 0xed, 0x3aa4, 0x842, 0x5, 0x0, 0x0, 0x101}}) 17:07:25 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x800000, &(0x7f00000000c0)={'trans=xen,', {[], [{@uid_eq}, {@smackfsfloor={'smackfsfloor', 0x3d, 'trans=xen,\x1c\v\xc40\xa1P\xe1fn3$<\xd4\x8cVt\v\x1f\xd3\xf0\xb1:\xedt\xb1\xd3\x17!I15\x195u\x1dAv\xf8\xd1\xd9\xcfc'}}, {@fsname={'fsname', 0x3d, ':*\x18.-,[}:'}}]}}) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x800000, &(0x7f00000000c0)={'trans=xen,', {[], [{@uid_eq}, {@smackfsfloor={'smackfsfloor', 0x3d, 'trans=xen,\x1c\v\xc40\xa1P\xe1fn3$<\xd4\x8cVt\v\x1f\xd3\xf0\xb1:\xedt\xb1\xd3\x17!I15\x195u\x1dAv\xf8\xd1\xd9\xcfc'}}, {@fsname={'fsname', 0x3d, ':*\x18.-,[}:'}}]}}) (async) 17:07:25 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x24, 0x0) 17:07:25 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) r0 = syz_mount_image$msdos(&(0x7f0000000380), &(0x7f0000000400)='./file0\x00', 0x5, 0x4, &(0x7f0000000640)=[{&(0x7f0000000440)="f416fe0e8008dedf815073f5f7b8ded28989c76f646de1baf752f5788843074acfdddd2ead4b3c3367348b86baaa9d", 0x2f}, {&(0x7f0000000480)="1a7f812fd9cc6e83a04cef0cfc4405177f33e918e1def4622ef18cfcb621c85ddb7ad57d61c4c87d6006edc60b16f0828e334fc644b8245f098a919d7bab4e0cf15850d6b6d4399c7e75a4bf436c56b6110ced15030947a875cae73373c1ae80e772b84a4206d13980cc0624149e9ce41f1391ec45e67b7408c6e396af44017be46a27e397597b0ee4a578c39cfa4402e1e9feb672a115e0a63bcbb032e3fb1c566026e8f24aa1968c893bc4ad842c5e07adba50c90ce8f31a28a6a604550cddc59882d30b630f33ad46cdf2b39a99bf8c1f49b6704353d7080844b61b9f0a19fd40413bbf277f67bd0a9d911e2dd7c2", 0xf0, 0x3}, {&(0x7f0000000580)="c307987d1931fa0000000000000000434043adc02458d61bc6426a73d8a1f5ebd0290f62d77233a02a65263c54125231b486a3c919969b6b12e4e0bf99f587cd79559f75b48ed9d4aede78a011b0501de60ca7a1dc20938284d94dc84e83dbef4de77ec30b187b6a295df1787f870e8508fead168e152da5158e49e97f245c3d4281e12e190ab188fddccbf9b00d24f1204b7c940009c7d7b2c5", 0x9a, 0x7fffffff}, {&(0x7f0000000780)="ca0a21e074dad067a1f40068ba749fbcba0d5dc86a5e341708845f433d119bdf3c1c5986fabb74febd6ecc3d886e60eac9434bd4d29ed5b05da95c443e5840dcfbab01e174391549fbdadb8fabb20cb309cc4425f5963575da68abf443f89248f3a485558693cfa4e066143acdfb19825bfa9d93080aa30a08a13fe67619fd2576d6a65432290b916a1290eb52b29cff1d2660e5f23c7f09e683de9910e91913632c9088fa084dccdc32b5127dcbd5c3257d52e23b2510e246ac2b986a", 0xbd, 0xffffffffffff233b}], 0xa00a0, &(0x7f0000000900)={[{@fat=@nocase}, {@dots}, {@fat=@errors_remount}], [{@smackfsfloor}, {@smackfshat={'smackfshat', 0x3d, 'hbh\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}]}) fchownat(r0, &(0x7f00000008c0)='./file0\x00', 0xee01, 0xffffffffffffffff, 0x1000) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x2b0, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x1e0, 0xffffffff, 0xffffffff, 0x1e0, 0xffffffff, 0x3, &(0x7f0000000000), {[{{@ipv6={@mcast2, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, [0xff000000, 0xffffffff, 0xffffffff, 0xff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 'veth1_to_batadv\x00', 'dvmrp1\x00', {0xff}, {0xff}, 0x32, 0xfa, 0x1, 0x74}, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x1, 0x1}, {0x2, 0x2, 0x3}}}}, {{@uncond, 0x0, 0xf0, 0x110, 0x0, {}, [@common=@hbh={{0x48}, {0xffffffff, 0x2, 0x0, [0x9, 0x0, 0xd2c, 0x2, 0x1f, 0x3, 0x4, 0x401, 0x40, 0x4974, 0x81, 0x9000, 0x7, 0x886, 0x4, 0xa9], 0x9}}]}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x310) [ 1429.197312][T11021] 9pnet: Could not find request transport: xen 17:07:25 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}], {}, {0x20, 0x0, 0xfffffffe}}, 0x34, 0x0) 17:07:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x80800, 0x45) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r2) linkat(r1, &(0x7f00000002c0)='./file0\x00', r2, &(0x7f0000000300)='./file0\x00', 0x400) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:25 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x24, 0x0) 17:07:25 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x1001, 0x0) 17:07:25 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x4, 0x0) [ 1429.258868][T11047] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1429.267622][T11040] 9pnet: Could not find request transport: xen 17:07:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x80800, 0x45) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r2) linkat(r1, &(0x7f00000002c0)='./file0\x00', r2, &(0x7f0000000300)='./file0\x00', 0x400) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:25 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x24, 0x0) 17:07:25 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x7ffffffff000, 0x0) 17:07:25 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x24, 0x0) 17:07:25 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2, 0x9, &(0x7f0000001780)=[{&(0x7f00000000c0)="beab3702fa4d91f1d84102bcd9dd752c55904ceadf081db5cfb77376f55559a469e706a012587347a10cecd7632e261ac07795c35c8756ba0886165cf6b40ce30480fe7ee7372928512c43f4828e15a6a79d79a7d2a9f6dce0c98ff6c33a21194325c1a0a68bb620ff459f3840975d4d93e3e516e32b66479e3d65d8f14ac4c2143a70", 0x83, 0x6}, {&(0x7f0000000400)="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", 0x1000, 0xfe5}, {&(0x7f0000000180)="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", 0xfe, 0x3f}, {&(0x7f0000001400)="435195aa9c84d8ce6f3a545b5d38091d7e6ac5161f099dfcc4ada4461d41d0e57166ce78cff1763b47c8980469525db888e6f9d271c556d5312719fd834381a0a6e83660e4f8759d899502cd327a935f787a3ae7ba115e17b44edaa2459ed1c6c9eee3dbdf1fb330d3759129072b2a53f118b8328f0cc49b28215e1d77ba8eb28bbdf7c4e5d30ef10bfb3a77516391dd1d0bd91297c0c251abcfb9d02a3c9265e83eba76d83f970f5a8a474166488c03d476db01461b0fcdd3ef305493c9520a9ddbe29f29472e2cee28d162db6be26f377cccb8d860241ebd7674842bb74465327c87", 0xe3, 0x7}, {&(0x7f0000000340)="637ad61b2e682869be2967d73a34c7378f0cbf84923cdd1d4d08f59fefaefef2d0d49a447889d516d05d9ae92540a3bcb192d6d809855a7294c0f67b43361b21237415d8ad0294ea33b6c0bcd0d785de0225131a58f3b4a9fe5c903dd06221335c0fac4b4c8982a5d76bb5b5b67438a1a6", 0x71, 0x3}, {&(0x7f0000001500)="16009028d5871e5634f88a20b8bf7b8e727dea82bb670fc587618d8d73c07cbe5f689c9f7eda0544ff3f2755ca149d06ce97c22b23ea29284de2819794d7e7d945393d8ef7552af7a027b21970a1a97ae40dd79f593d6726ebf28da79a57a6", 0x5f, 0x6}, {&(0x7f0000001580)="5edea556966b0079f3284e86c321440a566fa583e6e60cacdd5fda6e6a22f4e85d6d9bcf3494cbd07320c5f28915e0d93137000c7d154b93005e317107a67f6524a0d054930d3ce7310523ca83cd8dd129865c455702955d03f500458703f35041c0c91ed2b6abf5eab6f3822c", 0x6d, 0x1f}, {&(0x7f0000001600)="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", 0xff, 0x3ff}, {&(0x7f0000001700)="ad4310597134e5b067c33e0bdbdd4774f7540d9dd0765b27c1d942cdc636d43871dd2d47b14dbf92b805a7ac75ea5d16ce27e1611fd2dcec8a2e9b4cdc6cb14e6440bb5937b32be75d9a145900c7ff3f3844", 0x52, 0x988}], 0x80484, &(0x7f0000001940)={[{@nr_blocks={'nr_blocks', 0x3d, [0x37, 0x36, 0x34, 0x6d]}}, {@huge_within_size}, {@mpol={'mpol', 0x3d, {'local', '=static', @val={0x3a, [0x36]}}}}, {@mode={'mode', 0x3d, 0x400}}, {@huge_always}, {@size={'size', 0x3d, [0x39, 0x34, 0x74]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x33, 0x6d, 0x67, 0x78, 0x78, 0x70, 0x65]}}], [{@fowner_eq={'fowner', 0x3d, 0xee01}}, {@euid_lt={'euid<', 0xee00}}]}) mount$9p_xen(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=xen,unameAtrans=xen,,\x00']) 17:07:25 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) r0 = syz_mount_image$msdos(&(0x7f0000000380), &(0x7f0000000400)='./file0\x00', 0x5, 0x4, &(0x7f0000000640)=[{&(0x7f0000000440)="f416fe0e8008dedf815073f5f7b8ded28989c76f646de1baf752f5788843074acfdddd2ead4b3c3367348b86baaa9d", 0x2f}, {&(0x7f0000000480)="1a7f812fd9cc6e83a04cef0cfc4405177f33e918e1def4622ef18cfcb621c85ddb7ad57d61c4c87d6006edc60b16f0828e334fc644b8245f098a919d7bab4e0cf15850d6b6d4399c7e75a4bf436c56b6110ced15030947a875cae73373c1ae80e772b84a4206d13980cc0624149e9ce41f1391ec45e67b7408c6e396af44017be46a27e397597b0ee4a578c39cfa4402e1e9feb672a115e0a63bcbb032e3fb1c566026e8f24aa1968c893bc4ad842c5e07adba50c90ce8f31a28a6a604550cddc59882d30b630f33ad46cdf2b39a99bf8c1f49b6704353d7080844b61b9f0a19fd40413bbf277f67bd0a9d911e2dd7c2", 0xf0, 0x3}, {&(0x7f0000000580)="c307987d1931fa0000000000000000434043adc02458d61bc6426a73d8a1f5ebd0290f62d77233a02a65263c54125231b486a3c919969b6b12e4e0bf99f587cd79559f75b48ed9d4aede78a011b0501de60ca7a1dc20938284d94dc84e83dbef4de77ec30b187b6a295df1787f870e8508fead168e152da5158e49e97f245c3d4281e12e190ab188fddccbf9b00d24f1204b7c940009c7d7b2c5", 0x9a, 0x7fffffff}, {&(0x7f0000000780)="ca0a21e074dad067a1f40068ba749fbcba0d5dc86a5e341708845f433d119bdf3c1c5986fabb74febd6ecc3d886e60eac9434bd4d29ed5b05da95c443e5840dcfbab01e174391549fbdadb8fabb20cb309cc4425f5963575da68abf443f89248f3a485558693cfa4e066143acdfb19825bfa9d93080aa30a08a13fe67619fd2576d6a65432290b916a1290eb52b29cff1d2660e5f23c7f09e683de9910e91913632c9088fa084dccdc32b5127dcbd5c3257d52e23b2510e246ac2b986a", 0xbd, 0xffffffffffff233b}], 0xa00a0, &(0x7f0000000900)={[{@fat=@nocase}, {@dots}, {@fat=@errors_remount}], [{@smackfsfloor}, {@smackfshat={'smackfshat', 0x3d, 'hbh\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}]}) fchownat(r0, &(0x7f00000008c0)='./file0\x00', 0xee01, 0xffffffffffffffff, 0x1000) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x2b0, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x1e0, 0xffffffff, 0xffffffff, 0x1e0, 0xffffffff, 0x3, &(0x7f0000000000), {[{{@ipv6={@mcast2, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, [0xff000000, 0xffffffff, 0xffffffff, 0xff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 'veth1_to_batadv\x00', 'dvmrp1\x00', {0xff}, {0xff}, 0x32, 0xfa, 0x1, 0x74}, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x1, 0x1}, {0x2, 0x2, 0x3}}}}, {{@uncond, 0x0, 0xf0, 0x110, 0x0, {}, [@common=@hbh={{0x48}, {0xffffffff, 0x2, 0x0, [0x9, 0x0, 0xd2c, 0x2, 0x1f, 0x3, 0x4, 0x401, 0x40, 0x4974, 0x81, 0x9000, 0x7, 0x886, 0x4, 0xa9], 0x9}}]}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x310) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async) syz_mount_image$msdos(&(0x7f0000000380), &(0x7f0000000400)='./file0\x00', 0x5, 0x4, &(0x7f0000000640)=[{&(0x7f0000000440)="f416fe0e8008dedf815073f5f7b8ded28989c76f646de1baf752f5788843074acfdddd2ead4b3c3367348b86baaa9d", 0x2f}, {&(0x7f0000000480)="1a7f812fd9cc6e83a04cef0cfc4405177f33e918e1def4622ef18cfcb621c85ddb7ad57d61c4c87d6006edc60b16f0828e334fc644b8245f098a919d7bab4e0cf15850d6b6d4399c7e75a4bf436c56b6110ced15030947a875cae73373c1ae80e772b84a4206d13980cc0624149e9ce41f1391ec45e67b7408c6e396af44017be46a27e397597b0ee4a578c39cfa4402e1e9feb672a115e0a63bcbb032e3fb1c566026e8f24aa1968c893bc4ad842c5e07adba50c90ce8f31a28a6a604550cddc59882d30b630f33ad46cdf2b39a99bf8c1f49b6704353d7080844b61b9f0a19fd40413bbf277f67bd0a9d911e2dd7c2", 0xf0, 0x3}, {&(0x7f0000000580)="c307987d1931fa0000000000000000434043adc02458d61bc6426a73d8a1f5ebd0290f62d77233a02a65263c54125231b486a3c919969b6b12e4e0bf99f587cd79559f75b48ed9d4aede78a011b0501de60ca7a1dc20938284d94dc84e83dbef4de77ec30b187b6a295df1787f870e8508fead168e152da5158e49e97f245c3d4281e12e190ab188fddccbf9b00d24f1204b7c940009c7d7b2c5", 0x9a, 0x7fffffff}, {&(0x7f0000000780)="ca0a21e074dad067a1f40068ba749fbcba0d5dc86a5e341708845f433d119bdf3c1c5986fabb74febd6ecc3d886e60eac9434bd4d29ed5b05da95c443e5840dcfbab01e174391549fbdadb8fabb20cb309cc4425f5963575da68abf443f89248f3a485558693cfa4e066143acdfb19825bfa9d93080aa30a08a13fe67619fd2576d6a65432290b916a1290eb52b29cff1d2660e5f23c7f09e683de9910e91913632c9088fa084dccdc32b5127dcbd5c3257d52e23b2510e246ac2b986a", 0xbd, 0xffffffffffff233b}], 0xa00a0, &(0x7f0000000900)={[{@fat=@nocase}, {@dots}, {@fat=@errors_remount}], [{@smackfsfloor}, {@smackfshat={'smackfshat', 0x3d, 'hbh\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}]}) (async) fchownat(r0, &(0x7f00000008c0)='./file0\x00', 0xee01, 0xffffffffffffffff, 0x1000) (async) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x2b0, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x1e0, 0xffffffff, 0xffffffff, 0x1e0, 0xffffffff, 0x3, &(0x7f0000000000), {[{{@ipv6={@mcast2, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, [0xff000000, 0xffffffff, 0xffffffff, 0xff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 'veth1_to_batadv\x00', 'dvmrp1\x00', {0xff}, {0xff}, 0x32, 0xfa, 0x1, 0x74}, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x1, 0x1}, {0x2, 0x2, 0x3}}}}, {{@uncond, 0x0, 0xf0, 0x110, 0x0, {}, [@common=@hbh={{0x48}, {0xffffffff, 0x2, 0x0, [0x9, 0x0, 0xd2c, 0x2, 0x1f, 0x3, 0x4, 0x401, 0x40, 0x4974, 0x81, 0x9000, 0x7, 0x886, 0x4, 0xa9], 0x9}}]}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x310) (async) 17:07:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x80800, 0x45) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r2) (async) linkat(r1, &(0x7f00000002c0)='./file0\x00', r2, &(0x7f0000000300)='./file0\x00', 0x400) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) 17:07:25 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x2) 17:07:25 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x24, 0x0) 17:07:25 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0xfdc, 0x0) [ 1429.299592][T11047] loop0: detected capacity change from 0 to 264192 [ 1429.328123][T11058] 9pnet: Could not find request transport: xen 17:07:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r2) linkat(r1, &(0x7f0000000280)='./file0\x00', r2, &(0x7f00000002c0)='./file0\x00', 0x0) 17:07:25 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x1001, 0x0) 17:07:25 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x24, 0x0) 17:07:25 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x4) 17:07:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r2) (async) linkat(r1, &(0x7f0000000280)='./file0\x00', r2, &(0x7f00000002c0)='./file0\x00', 0x0) 17:07:25 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x7ffffffff000, 0x0) [ 1429.384965][T11080] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1429.386273][T11076] loop2: detected capacity change from 0 to 15 [ 1429.411929][T11080] loop0: detected capacity change from 0 to 264192 17:07:25 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 64) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2, 0x9, &(0x7f0000001780)=[{&(0x7f00000000c0)="beab3702fa4d91f1d84102bcd9dd752c55904ceadf081db5cfb77376f55559a469e706a012587347a10cecd7632e261ac07795c35c8756ba0886165cf6b40ce30480fe7ee7372928512c43f4828e15a6a79d79a7d2a9f6dce0c98ff6c33a21194325c1a0a68bb620ff459f3840975d4d93e3e516e32b66479e3d65d8f14ac4c2143a70", 0x83, 0x6}, {&(0x7f0000000400)="2fe5bf14eeae6157f23d0cece4ee29cc2b935d7a764e4c36128dd3208b398aa9d15323cc3b262ae2a1cda1bacb3da9868139d86bd86a71cbc639ef696a50bdb7096e42037da26bc544c7111fa3537ef398fed3f6200ec2947ebbf30855aea55dd7349e739aaa8b2561ea36a8fb848a48293a0f0bc9b5ff0ae2845b05d741aa29cfcb6d3815f30561349922ad08918b0fafcd7a899defb472dd4edc93548ebb5d6a7ae97e160d608755d5457616a00a4480de61f411ddacd2e8189ce225a7d57ca7c69e635630fdbc81fbecf4d0aead22d155dccc5b8f24966cbb8f626dfdf44d1029e6c60f856411be2f6059c7696009109eafee30d1b95dfa0c1b8647e5479faa863bdb55555a111a8a4d3548de4bcf08d4ff532b0006deee1d364b7410e503d5f7adb9148f7909b06da946e2d7fca12b23b2dc14c824bfffad92d15b1c1e10f4b45e153f65c1e6d6e50ddf1ba43e3269dc85634cafd784fabae452969b2558c3fb2841fac2f494a6f0fd65b35321463523a251d68de1c0b1979ab880d4cd9f616774fc6593b7f57cd5766fc1454578bf2a769cb906bdd8a11bb792d862a6a4c5733931d4d99492f8d8a715b22343e47794dd480e4e1667f84e10024dd1602712cbdef58865db197eb8da2d589c8a4aa2b43593e615dc34bf7b497de5a8efafdeaa3352f9b02071814bc3ac183cb467c3057e406b796c6ab2d188d4a069764ce173ccd509f1484e2157947240506c5efca13b48be59d5599002c2765e990b8fc48b6314f9d29e7f85c0c62d2755da75f99932ced257b43ba956f95f66e21c9cd96cbb0f2aa7ac0ad5e3d9f818f95a84e8e5ff22d753a0325e549a1a0cc28f6d1729f17412ae06cac107a6c940c06851ec21759f8f47f907227910889e3efcf39a58f0de780170838e525166f52a5a4fd939d24d67d65f7d2f6b3fe1c07ffd4fe6022df33f24cb02a0b33b5be657553ea2986a593f966d134eece1fcc457801a18160778f39a7377512ef70b86d71a8a6121d6a8ab8870bd9dd9bdb26e02c559160fec4a87eb7611cde229510e71b89e7d5933d042ae22fdbf5edf183bd39a1fe2ac84954dcb00c240f8479e74aaadf72b4268ddb2b5c33167be3ab91916cd13259a049179bb1656547cf692240bbcdce4a158bea41e680a3a1523332a1ba2eb9edf5f42533669736a0aafc0c9c7ec2c3a895bece1e404a716f16921de6099050a24c154783265babdab8ae3f958929741167c1c75198cf5e7f8521ada26c33e4899da8a2e0950a975ccbff35f9be028174d3504a69dc070302024ad83143a4e03374e12b329bd35633c4b5a85feb1662b6b667aa216a9c5bc8405d1f70caf193acbd9641c342b13044b51954fe69eb53eba67dd06d45a250fece678e054777bf1d61e3c3b627ded9313497ef7b47a84848caca65044c4182d857501b3b5157d12b68a08a9d7411bd66773913c7eb712b3bff593e46432f81150fa9570d5d1c0c20a38f1438dce41e942eb9255a4616fc75a2eeba655f0d6d29dfadc3b14bb9a8618f4516fc48fea55fec23b70de8365f01d20cbbbc0a11c45f3df4f2a3f14cda0075e64dd293226feab64aa714abe95a7466d7fae4e8bf5bc8022e87c05e75723a52b76ee139812b6ae257a6fb49bbdd77b67ade2e244faff6e2b26d57c37ba94d25c60ab52a796530a193ca6dd992334025a2566535b1b8afe57581d156cc8901cdf7828a9e06acd624d4692605d9b3aaf6a69ab153c4d8d14d4f0d34cd9390e2f98e0de7758e9786153dca33aa350b5c42385129adfad58d3f409fdf4036186b280ebca1c4764cb68e15c5809f4b8167c10ca9e17ea8f08b76338e8bc99d028ba38e82d57dc8427095c816c8a5f33e299b2e379b34b6b1ba6f459951bfd787eb4a5b5d61d67beb8fcef084df3b239f4bae837ff91c14f483417fd0f0afd651275b26e96bc82e1148d9153fad737401009e41119a05b9ae438657dc03e5de430abd7e63bc4a5e071b31246f439e1ccf87b63cf94571dd327dae14f9611a03a9c36bdbbe34b56af05ae2ff5eec2a97243f0be3d44b0fabe88bc2bf89d40e2a448f557d258cb0e19c614e150b0b0adaedf0c395591b59ec8631f7d276d569ea535153a9872fcbeb1194d08348bb474f08644343f7d9ee7890a9c0ed6f1dd89a78704d7d7aed0d042e9a42d7a08af5b2fccec2c220273e204e9d13ad96808222e83f0e12cffc92aefdb594db31e8771d88a90973ebd887deb700e813cd6e406510900d5ee45f7a0de7f6425ec0e109f82052b5af6fa9a3594442efea3be6271c5ef7ec2920e40ad97b6bbc5537cc71db125070896d2c9b594320f220129cb98f94b48fa289ee7e244dccfcbba2222ad253e5f977e3c2c9b777d6b8f4e5bb0d468e4edccd294234272d2e916522e1a779057bd02797c85689ba2e4fd5935038f4979a1549b6777d7f869ec679c425cd689eab5750521e3c0ca99e8fd5e559807d0530a8328682ac85576889aecdc091375219dc21c7bb6f7be204573ddb0c36e09c3e2a5e09224353a9323d9b5b38a01beaae22a3d2a0aeb5b4040fc4b8f7477eb4bac6555cbe3deaf663618cc3ac5a45ddeee598c423b17b803b04a21fff8c08007237076b51671f54cc3ea25777a34bb152d85e88925a5f9b1746e23e1127226348516251242ff00fd258a56acb21b8841004961a9f9d0b54f1af4ae0f1697456b5df036eeae4edc9d8f908f8c88ff7a92fd2c74dbe953fdebd12961d5209a2cd9e3156d9ba3ea53746d74dc420ee9c823cd24cc6456728aa7e9e7255d2b808905092b9835fe677c283338f7316c44a0525eb36d3cc212bb31ce6a27dba0400635c19cb1cac6c3327eac2ff1973765004bb6da178085fdf03058d831fe7c44b0acde58a668d166fd6c4f3b62a05935b1f9811fe9918ce2bdf7be1b76f5962e49b301b582083823b2702291adfb3c2257f88501f70b6aab41cfe45e8522d96bd9721887cb8901ed31050be4d6d573e946c43b63ed159c9f7b915a9adb020121bcc0ec0434b85a678e9edfee76d23c413e1361a71899f546e8d137fff25fcfe19e78222d482bd4e8ac0f9ccd133581ee22d6039cadbe6b99beea1fcb677392da097b68eb726c7cc8d26210bd377275a29f5734d90f08d0382e817210333fb3d3d947e660320d12ed29466c3d64ec7adca5900ea0fe62eb929a8b4a3561c3c9658fe94d8651551e06ee8bfd898c4a89c57e66cc40d8dd653e419e0dfa8ba26b9f49ee18896e3bc2f8cfda46ab064b750d9b6dae58d52bd06d08e16aa9706530a3af534d1d876168854ba95e5b5ed2cb2019ff2907d666c903bd9a6e80e645030c75617bad6922d3c022ca6ad03b8f354e8c763434028281bf0d7678e99599437cac28691cf5114ad7329f6a0f4e6504bfcc9eea2a2f3fa4b5a8cf9a2a7eeb49288dea79b673fb77a4ac1fe90439b8032dbf8dd1af6f84438ceb5c59becd0cf502f545477951c33061e582d54443e1a74ef0360050749711767a46d0339e49e49cd6256e59ec5107d135540cc9bde55a3b15d990470a2cddc73d433a1b4d7a83c0480381448eacb0c730291cdac1eac244f88c15c1623ba81cf1bfb55e5face4b69f627b3adb7cc8b9b2af13ea3c998b33c31712e5eec4ae4c9fb9c16b0832cbfe13a598478ed4934d953c1a62dadda9d0f60e06bb5a497324b619138636ff12d256da9bdad19c29fc8169ca60171eaa03582c3b922def20c4f07aa29bcfb8d3e5fb6bcfdb9cd4e97e2c5db1db89efcff4762e4853ad81f307cff1bbe105e4944e72cd536c3368625626ca604726ba0ea02012ec70c2dda7b974917d6f271223dd9fd7149d3971727492f741309341f53bc631a9358eed63abf2401cb0474402630edc3b3508ceffa01459344705db8b23af37cd87f2e197efa26d53fe288cc6f9b33806d972df1489d7da114d50ce68a6964b9f2e02fa466fb24ff5834d53c4ccbf6078882edf047a7e027dedd1d44e840ed33b8a42acb4f73b24bf4629f06d647aa97745f200b2d7920cf62657820f718f214596aa79672dd9e0727c25a44238ba44955811785062afb3a3a0d1c0c59139221b74b837da6b9b8f63550283bdf4f171b5aaceefe7ef9e3625a9e744c66f53aac3a4066d41f26096062240ba927f48c34ccfb515063fb12e4c1ab3d105ad4e9cd52ad2fd6b20f1944b478c29c783029cbf5693969dc983de61b9ff5d61b053d40c1720ba307feb0ae1d6c9d6bea164304e9e47d9c5954a5d4f6a164b03cf02f8076b74ad84a76fae84b2334f03180e28ee40836985440e8c718cb62cba868685e8765db66c00e63198de5a46d05eecdec5f1f2325b2cf187933865f5a2b402c0b1ed1f3f567ec14f351c37b67025aa7c2d27dc497de94b47ee7c2c842c823e0bf08271d0c8f01bcc2743a0db4357751066d4435a409756f5bb3466e8e93bc5d005f893b99442226512024cb57664f3b45df6f081f08d1aae79a0ef8db7810b0456a46f7c3c87a960a22edbb343d914ecf151789abad72e7af8e1ffea8b898d4e7fa619293abd59c5b58319c6a45b88e977a6c6fcf9ed89bcf46265372c20b03e2fed45b35a8e44267a3172d3435c1b23afa8ec09395ddd9de66bc599cb34d0ad84fb203be19487063e554faa9a769c56653ad3d703aa72d0f6aa6d41f0242afa99b01e2a22f9d58cfc989fda09595d9b2221e8d02afef727612b204f829790951353df55de4e6c0e38da7c6758b0913ef5b9bc1edf6ad7f5973bf8c2d9205d77031f08743920579f451609f37de0bb44e46361865a9fca2c1a77120981d9a3153f69ce89caf3e64b7908882bb5a99c3d5833d7983413449f52e3d69b3a84382f3f9fa2a4782bb1daf5a2915cf2322a834949a42153ce93a086fab1eb25d2fb5a839ccbdfc793b8a1f61e86422345cd22a6901f698bea70fc658643de58dd7ea35e2fdea168957ced11f6e6232b1e9166e8fddd2da3f8c46acf617639429607dfc7b6162dfb99f3e3bf2625581813f71c7c3911277a92c3d320f2265458e812728037373ef7f53fbd1783d335c4f2c0ea502c46bbf4a6d83746fcf6008a5d2e69b243dc184f1509d9fd2b02def1e6c7de335b2ca4eb29abbc794e2680375ba898a96a6740c64e195ca8ca8afbdae7484bb787898eb947adc82bfc43c3790465a3bb4219cd8640d0620b74bde3686db86806319c2ab5bb7b7984defd2ae0b8694d2a77732d16f56279bc899947c0e40065571be91f8ec472a0562226bddf303d1a06bb196d116e9bbae327d5f4429ae3622ec6f70c771d8973d55d076f7ee815d31a3a4ab3abad4f83feb13cb9434b91db994eb1ce2e8243f58d00839da43722e80a577919b44c586798ab14b9135782f9314050d0052a14ecc5bf11b0e1a66277c295624be4d358785739b9cab0e0d289194634302c80b133207dba00557531f0d796e0a04a38cc5269b8cf395da680de129e4c16762cb2ef44c3c4cd12c1934cda54960e39722fea11c8f9c0f6d4b10ed27c416aeb391f1006160b7a2004e2e2fcd5b1ac888fd4a961cbd64d1dd79f88c5a31244cb7e67328e2cc43f7af903ccbce6877a7822cab354004656da72f65f07e6965298eeebfab4b44b73671d5b04845f90223fe563b8b76015a49d9a75217e6741730cdc9bb632f63057cee6b022cbfd50c1ff5d69027c5d89bc191a266d07f2d37ec7ef4da167d54c763e7b7bd07b3cf329fae05c39981e5d75cfcfbb6c31af79cce847ecde614996398c0eb10695fc201863becb0b0b4b0135f5afc8", 0x1000, 0xfe5}, {&(0x7f0000000180)="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", 0xfe, 0x3f}, {&(0x7f0000001400)="435195aa9c84d8ce6f3a545b5d38091d7e6ac5161f099dfcc4ada4461d41d0e57166ce78cff1763b47c8980469525db888e6f9d271c556d5312719fd834381a0a6e83660e4f8759d899502cd327a935f787a3ae7ba115e17b44edaa2459ed1c6c9eee3dbdf1fb330d3759129072b2a53f118b8328f0cc49b28215e1d77ba8eb28bbdf7c4e5d30ef10bfb3a77516391dd1d0bd91297c0c251abcfb9d02a3c9265e83eba76d83f970f5a8a474166488c03d476db01461b0fcdd3ef305493c9520a9ddbe29f29472e2cee28d162db6be26f377cccb8d860241ebd7674842bb74465327c87", 0xe3, 0x7}, {&(0x7f0000000340)="637ad61b2e682869be2967d73a34c7378f0cbf84923cdd1d4d08f59fefaefef2d0d49a447889d516d05d9ae92540a3bcb192d6d809855a7294c0f67b43361b21237415d8ad0294ea33b6c0bcd0d785de0225131a58f3b4a9fe5c903dd06221335c0fac4b4c8982a5d76bb5b5b67438a1a6", 0x71, 0x3}, {&(0x7f0000001500)="16009028d5871e5634f88a20b8bf7b8e727dea82bb670fc587618d8d73c07cbe5f689c9f7eda0544ff3f2755ca149d06ce97c22b23ea29284de2819794d7e7d945393d8ef7552af7a027b21970a1a97ae40dd79f593d6726ebf28da79a57a6", 0x5f, 0x6}, {&(0x7f0000001580)="5edea556966b0079f3284e86c321440a566fa583e6e60cacdd5fda6e6a22f4e85d6d9bcf3494cbd07320c5f28915e0d93137000c7d154b93005e317107a67f6524a0d054930d3ce7310523ca83cd8dd129865c455702955d03f500458703f35041c0c91ed2b6abf5eab6f3822c", 0x6d, 0x1f}, {&(0x7f0000001600)="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", 0xff, 0x3ff}, {&(0x7f0000001700)="ad4310597134e5b067c33e0bdbdd4774f7540d9dd0765b27c1d942cdc636d43871dd2d47b14dbf92b805a7ac75ea5d16ce27e1611fd2dcec8a2e9b4cdc6cb14e6440bb5937b32be75d9a145900c7ff3f3844", 0x52, 0x988}], 0x80484, &(0x7f0000001940)={[{@nr_blocks={'nr_blocks', 0x3d, [0x37, 0x36, 0x34, 0x6d]}}, {@huge_within_size}, {@mpol={'mpol', 0x3d, {'local', '=static', @val={0x3a, [0x36]}}}}, {@mode={'mode', 0x3d, 0x400}}, {@huge_always}, {@size={'size', 0x3d, [0x39, 0x34, 0x74]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x33, 0x6d, 0x67, 0x78, 0x78, 0x70, 0x65]}}], [{@fowner_eq={'fowner', 0x3d, 0xee01}}, {@euid_lt={'euid<', 0xee00}}]}) (async, rerun: 64) mount$9p_xen(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=xen,unameAtrans=xen,,\x00']) 17:07:25 executing program 4: lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x24, 0x0) 17:07:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r1) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r2) (async) linkat(r1, &(0x7f0000000280)='./file0\x00', r2, &(0x7f00000002c0)='./file0\x00', 0x0) 17:07:25 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x2) 17:07:25 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x6) 17:07:25 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) r0 = syz_mount_image$msdos(&(0x7f0000000380), &(0x7f0000000400)='./file0\x00', 0x5, 0x4, &(0x7f0000000640)=[{&(0x7f0000000440)="f416fe0e8008dedf815073f5f7b8ded28989c76f646de1baf752f5788843074acfdddd2ead4b3c3367348b86baaa9d", 0x2f}, {&(0x7f0000000480)="1a7f812fd9cc6e83a04cef0cfc4405177f33e918e1def4622ef18cfcb621c85ddb7ad57d61c4c87d6006edc60b16f0828e334fc644b8245f098a919d7bab4e0cf15850d6b6d4399c7e75a4bf436c56b6110ced15030947a875cae73373c1ae80e772b84a4206d13980cc0624149e9ce41f1391ec45e67b7408c6e396af44017be46a27e397597b0ee4a578c39cfa4402e1e9feb672a115e0a63bcbb032e3fb1c566026e8f24aa1968c893bc4ad842c5e07adba50c90ce8f31a28a6a604550cddc59882d30b630f33ad46cdf2b39a99bf8c1f49b6704353d7080844b61b9f0a19fd40413bbf277f67bd0a9d911e2dd7c2", 0xf0, 0x3}, {&(0x7f0000000580)="c307987d1931fa0000000000000000434043adc02458d61bc6426a73d8a1f5ebd0290f62d77233a02a65263c54125231b486a3c919969b6b12e4e0bf99f587cd79559f75b48ed9d4aede78a011b0501de60ca7a1dc20938284d94dc84e83dbef4de77ec30b187b6a295df1787f870e8508fead168e152da5158e49e97f245c3d4281e12e190ab188fddccbf9b00d24f1204b7c940009c7d7b2c5", 0x9a, 0x7fffffff}, {&(0x7f0000000780)="ca0a21e074dad067a1f40068ba749fbcba0d5dc86a5e341708845f433d119bdf3c1c5986fabb74febd6ecc3d886e60eac9434bd4d29ed5b05da95c443e5840dcfbab01e174391549fbdadb8fabb20cb309cc4425f5963575da68abf443f89248f3a485558693cfa4e066143acdfb19825bfa9d93080aa30a08a13fe67619fd2576d6a65432290b916a1290eb52b29cff1d2660e5f23c7f09e683de9910e91913632c9088fa084dccdc32b5127dcbd5c3257d52e23b2510e246ac2b986a", 0xbd, 0xffffffffffff233b}], 0xa00a0, &(0x7f0000000900)={[{@fat=@nocase}, {@dots}, {@fat=@errors_remount}], [{@smackfsfloor}, {@smackfshat={'smackfshat', 0x3d, 'hbh\x00'}}, {@context={'context', 0x3d, 'staff_u'}}, {@mask={'mask', 0x3d, '^MAY_EXEC'}}]}) fchownat(r0, &(0x7f00000008c0)='./file0\x00', 0xee01, 0xffffffffffffffff, 0x1000) (async) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x2b0, 0x0, 0xffffffff, 0xffffffff, 0xd0, 0xffffffff, 0x1e0, 0xffffffff, 0xffffffff, 0x1e0, 0xffffffff, 0x3, &(0x7f0000000000), {[{{@ipv6={@mcast2, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, [0xff000000, 0xffffffff, 0xffffffff, 0xff], [0x0, 0xffffffff, 0xffffffff, 0xffffff00], 'veth1_to_batadv\x00', 'dvmrp1\x00', {0xff}, {0xff}, 0x32, 0xfa, 0x1, 0x74}, 0x0, 0xa8, 0xd0}, @common=@inet=@SET1={0x28, 'SET\x00', 0x1, {{0x1, 0x1}, {0x2, 0x2, 0x3}}}}, {{@uncond, 0x0, 0xf0, 0x110, 0x0, {}, [@common=@hbh={{0x48}, {0xffffffff, 0x2, 0x0, [0x9, 0x0, 0xd2c, 0x2, 0x1f, 0x3, 0x4, 0x401, 0x40, 0x4974, 0x81, 0x9000, 0x7, 0x886, 0x4, 0xa9], 0x9}}]}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x310) 17:07:25 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x4) 17:07:25 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x24, 0x0) 17:07:25 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00'}) [ 1429.461188][T11102] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1429.466103][T11076] 9pnet: Could not find request transport: xen [ 1429.472575][T11103] loop0: detected capacity change from 0 to 264192 17:07:25 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x8) 17:07:25 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x6) 17:07:25 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0xc) [ 1429.517221][T11117] loop2: detected capacity change from 0 to 15 [ 1429.542740][T11127] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1429.575007][T11127] loop0: detected capacity change from 0 to 264192 [ 1429.590139][T11117] loop2: detected capacity change from 0 to 15 [ 1429.593270][ T1437] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1429.605448][ T1437] Buffer I/O error on dev loop2, logical block 0, async page read [ 1429.620219][ T1437] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1429.629399][ T1437] Buffer I/O error on dev loop2, logical block 0, async page read [ 1429.637191][ T1437] loop2: unable to read partition table [ 1429.644286][T11117] loop2: detected capacity change from 0 to 15 [ 1429.650580][ T1437] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1429.659883][ T1437] Buffer I/O error on dev loop2, logical block 0, async page read [ 1429.689592][ T1437] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1429.698732][ T1437] Buffer I/O error on dev loop2, logical block 0, async page read [ 1429.706583][ T1437] loop2: unable to read partition table [ 1429.712865][T11117] loop2: detected capacity change from 0 to 15 [ 1429.716863][ T1437] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1429.728363][ T1437] Buffer I/O error on dev loop2, logical block 0, async page read [ 1429.750169][ T1437] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1429.759442][ T1437] Buffer I/O error on dev loop2, logical block 0, async page read [ 1429.767268][ T1437] loop2: unable to read partition table [ 1429.773551][T11117] loop2: detected capacity change from 0 to 15 [ 1429.777358][ T1437] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1429.788995][ T1437] Buffer I/O error on dev loop2, logical block 0, async page read [ 1429.830373][ T1437] loop2: unable to read partition table [ 1429.836548][T11117] loop2: detected capacity change from 0 to 15 [ 1429.890502][ T2635] loop2: unable to read partition table [ 1429.896158][ T2635] loop2: partition table beyond EOD, truncated [ 1429.904577][T11117] loop2: detected capacity change from 0 to 15 [ 1429.916180][T11117] loop2: detected capacity change from 0 to 15 [ 1429.916555][ T2635] loop2: unable to read partition table [ 1429.943624][T11117] loop2: detected capacity change from 0 to 15 [ 1429.951921][T11117] loop2: detected capacity change from 0 to 15 [ 1429.952346][ T1437] loop2: unable to read partition table [ 1430.001055][T11117] loop2: detected capacity change from 0 to 15 [ 1430.002516][ T2635] loop2: unable to read partition table [ 1430.041167][T11117] loop2: detected capacity change from 0 to 15 [ 1430.042324][ T2635] loop2: unable to read partition table [ 1430.070076][T11117] loop2: detected capacity change from 0 to 15 [ 1430.071864][ T2635] loop2: unable to read partition table [ 1430.090379][T11117] loop2: detected capacity change from 0 to 15 [ 1430.091444][ T2635] loop2: unable to read partition table [ 1430.130009][T11117] loop2: detected capacity change from 0 to 15 [ 1430.169657][ T2635] loop2: unable to read partition table [ 1430.175423][ T2635] loop2: partition table beyond EOD, truncated [ 1430.183896][T11117] loop2: detected capacity change from 0 to 15 [ 1430.185200][ T2635] loop2: unable to read partition table [ 1430.210068][T11117] loop2: detected capacity change from 0 to 15 [ 1430.210116][ T2635] ================================================================== [ 1430.224302][ T2635] BUG: KCSAN: data-race in blkdev_llseek / set_capacity_and_notify [ 1430.232181][ T2635] [ 1430.234497][ T2635] write to 0xffff8881023d6aa0 of 8 bytes by task 11117 on cpu 1: [ 1430.242229][ T2635] set_capacity_and_notify+0x9d/0x1d0 [ 1430.247602][ T2635] loop_set_size+0x2e/0x70 [ 1430.252100][ T2635] loop_configure+0xb1b/0xc30 [ 1430.256770][ T2635] lo_ioctl+0x641/0x1290 [ 1430.261005][ T2635] blkdev_ioctl+0x20e/0x440 [ 1430.265505][ T2635] __se_sys_ioctl+0xcb/0x140 [ 1430.270101][ T2635] __x64_sys_ioctl+0x3f/0x50 [ 1430.274686][ T2635] do_syscall_64+0x2b/0x70 17:07:26 executing program 2: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x2, 0x9, &(0x7f0000001780)=[{&(0x7f00000000c0)="beab3702fa4d91f1d84102bcd9dd752c55904ceadf081db5cfb77376f55559a469e706a012587347a10cecd7632e261ac07795c35c8756ba0886165cf6b40ce30480fe7ee7372928512c43f4828e15a6a79d79a7d2a9f6dce0c98ff6c33a21194325c1a0a68bb620ff459f3840975d4d93e3e516e32b66479e3d65d8f14ac4c2143a70", 0x83, 0x6}, {&(0x7f0000000400)="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", 0x1000, 0xfe5}, {&(0x7f0000000180)="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", 0xfe, 0x3f}, {&(0x7f0000001400)="435195aa9c84d8ce6f3a545b5d38091d7e6ac5161f099dfcc4ada4461d41d0e57166ce78cff1763b47c8980469525db888e6f9d271c556d5312719fd834381a0a6e83660e4f8759d899502cd327a935f787a3ae7ba115e17b44edaa2459ed1c6c9eee3dbdf1fb330d3759129072b2a53f118b8328f0cc49b28215e1d77ba8eb28bbdf7c4e5d30ef10bfb3a77516391dd1d0bd91297c0c251abcfb9d02a3c9265e83eba76d83f970f5a8a474166488c03d476db01461b0fcdd3ef305493c9520a9ddbe29f29472e2cee28d162db6be26f377cccb8d860241ebd7674842bb74465327c87", 0xe3, 0x7}, {&(0x7f0000000340)="637ad61b2e682869be2967d73a34c7378f0cbf84923cdd1d4d08f59fefaefef2d0d49a447889d516d05d9ae92540a3bcb192d6d809855a7294c0f67b43361b21237415d8ad0294ea33b6c0bcd0d785de0225131a58f3b4a9fe5c903dd06221335c0fac4b4c8982a5d76bb5b5b67438a1a6", 0x71, 0x3}, {&(0x7f0000001500)="16009028d5871e5634f88a20b8bf7b8e727dea82bb670fc587618d8d73c07cbe5f689c9f7eda0544ff3f2755ca149d06ce97c22b23ea29284de2819794d7e7d945393d8ef7552af7a027b21970a1a97ae40dd79f593d6726ebf28da79a57a6", 0x5f, 0x6}, {&(0x7f0000001580)="5edea556966b0079f3284e86c321440a566fa583e6e60cacdd5fda6e6a22f4e85d6d9bcf3494cbd07320c5f28915e0d93137000c7d154b93005e317107a67f6524a0d054930d3ce7310523ca83cd8dd129865c455702955d03f500458703f35041c0c91ed2b6abf5eab6f3822c", 0x6d, 0x1f}, {&(0x7f0000001600)="9ad54db1766f3ac28dd60ec4b7d69484fb257fbd413449c2de3a76ddb27a1a2e2f90db185073f08e8325af8cfc04e205d329b71c76350a2e249935c39d523a5a0529254907426e61be032fa8caf0b4eb46fca67690d12df375b0011e428283a9f671fdd367b39038c9ad802bf67f5d14f70c5122c1ff4b9ba6aca30599e5c683df39908d55c32c8bd02cb3f94ff31db8fb8b705ec368429a39a98fbdfb1c11251d8b37eaed335ad1f9962ce1e7f7e777c429b8b771712e2c739fb8173ec60cc7fab30e2d979e3120253b647979665409182009dc5f788d1774535554f4631de518d9c286a54c12b1f97bf9fae838b13971cdd9d0aed8a5ab22b0c6b544f4c5", 0xff, 0x3ff}, {&(0x7f0000001700)="ad4310597134e5b067c33e0bdbdd4774f7540d9dd0765b27c1d942cdc636d43871dd2d47b14dbf92b805a7ac75ea5d16ce27e1611fd2dcec8a2e9b4cdc6cb14e6440bb5937b32be75d9a145900c7ff3f3844", 0x52, 0x988}], 0x80484, &(0x7f0000001940)={[{@nr_blocks={'nr_blocks', 0x3d, [0x37, 0x36, 0x34, 0x6d]}}, {@huge_within_size}, {@mpol={'mpol', 0x3d, {'local', '=static', @val={0x3a, [0x36]}}}}, {@mode={'mode', 0x3d, 0x400}}, {@huge_always}, {@size={'size', 0x3d, [0x39, 0x34, 0x74]}}, {@nr_blocks={'nr_blocks', 0x3d, [0x33, 0x6d, 0x67, 0x78, 0x78, 0x70, 0x65]}}], [{@fowner_eq={'fowner', 0x3d, 0xee01}}, {@euid_lt={'euid<', 0xee00}}]}) mount$9p_xen(0x0, &(0x7f0000000280)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='trans=xen,unameAtrans=xen,,\x00']) 17:07:26 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x24, 0x0) 17:07:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00'}) (async) 17:07:26 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x8) 17:07:26 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0xd) 17:07:26 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@ax25={{0x3, @default}, [@remote, @bcast, @remote, @null, @remote, @remote, @bcast]}, &(0x7f0000000080)=0x80) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:26 executing program 4: syz_mount_image$nfs4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x24, 0x0) 17:07:26 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0xc) [ 1430.279180][ T2635] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1430.285086][ T2635] [ 1430.287410][ T2635] read to 0xffff8881023d6aa0 of 8 bytes by task 2635 on cpu 0: [ 1430.294952][ T2635] blkdev_llseek+0x4c/0x80 [ 1430.299375][ T2635] __x64_sys_lseek+0xdf/0x140 [ 1430.304067][ T2635] do_syscall_64+0x2b/0x70 [ 1430.308499][ T2635] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 1430.314408][ T2635] [ 1430.320376][ T2635] value changed: 0x0000000000000000 -> 0x0000000000001e00 [ 1430.327497][ T2635] 17:07:26 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) [ 1430.329824][ T2635] Reported by Kernel Concurrency Sanitizer on: [ 1430.335979][ T2635] CPU: 0 PID: 2635 Comm: udevd Not tainted 6.0.0-rc3-syzkaller-00363-g7726d4c3e60b-dirty #0 [ 1430.341765][T11143] 9pnet: Could not find request transport: xen [ 1430.346031][ T2635] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/26/2022 [ 1430.346043][ T2635] ================================================================== 17:07:26 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x24) 17:07:26 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000040)={&(0x7f0000000000)='./file0\x00'}, 0x10) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00'}) [ 1430.375440][T11151] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:26 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0xd) 17:07:26 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x281) 17:07:26 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:26 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@ax25={{0x3, @default}, [@remote, @bcast, @remote, @null, @remote, @remote, @bcast]}, &(0x7f0000000080)=0x80) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000200)={'batadv0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x2, &(0x7f00000000c0)=@raw=[@cb_func], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, r2, 0x4, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x7f}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5987}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20008080}, 0x0) 17:07:26 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x24) 17:07:26 executing program 2: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000500)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)=0x0) syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file1\x00', 0x100000000, 0x3, &(0x7f0000000280)=[{&(0x7f0000000080)="660fe8ab6ff18987e175e48fcf09e2e1ed5a371923b8b3c5bcaa4c8ac93a8a8c1647089809626206325eb8e6da1ce4ed39cc7496d9481dfd610e9167482fabec6c5c8e4b2bb8f709311969e29e2d7f4c", 0x50, 0x81}, {&(0x7f0000000100)="68a5cf4579a103eb2288bc2b0ec9c78d1feedaa1f5537d71755d301080cc684d388ef9b913e7282b3c4eb5f9217d8688a1cec4fc3d4ba6d226a4303e0574bfb5f93083b567fb0eb81086b14389bf097ad11d744a53cf4fb813902d16bcb1eca997f7ef45683a4e330f80d3966546e4e79d069e256d456f394c965d2990408444f4bd96d696fb96f08f58f478b9f862514c4380e80af9f91a2f70ea4210499d71d1ec83b2aafbfddd", 0xa8, 0xd19c}, {&(0x7f00000001c0)="8096a810002dc52d9f3407a56554e736eaa35b8f24feb3a94e08681a88fbb5276810af81e124e4d80f648924e0752c7f1dae5556cb661326e399dbd60208ba0751a5457a144ebdae1d08a48237cd65464e4f7be48c75b2bf53551fdba6bcc2a59744b8da47cc54559a371ba8c233c5c0fcb0f4aa1455d48b1fde51ffe1640dcd16215a942a796323a72f29ded4f509f115245e6e6bd5fea2544483b71a7efc3ac4fb4fedeeaa4be08e", 0xa9, 0x5}], 0x208400, &(0x7f0000000400)={[{'.\x9f,\x89:)@:'}, {'\'$%'}, {'%#)/#\xfe/\\#}+'}, {'#\x1b!'}, {'^\\}[^#*'}, {}, {'*!\']%@'}], [{@fowner_gt}, {@fowner_eq={'fowner', 0x3d, r1}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@uid_gt}, {@smackfsdef={'smackfsdef', 0x3d, '%\'%]'}}, {@appraise}, {@smackfsroot}, {@euid_eq}, {@fsname={'fsname', 0x3d, ']'}}, {@fsname={'fsname', 0x3d, '\xab&]^^(\x1d.'}}]}) 17:07:26 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x600) 17:07:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b0000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c73d7f68930a82e2dad53b93e31637000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dfffffff0000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000007ca2d10409b18a1b2d9fcd064efb4f4d1987f4f15ad01e1b26e99e14fe61d2221ee62b86ada03ebe14f99fede6cdacdc77ccd877bfe8ce08b061998e57859091abdda3a2c4beddbf91ce9811600b76cb3944474e557ee1cf6149132e00fbc6eae1d8114f7da8cfe1e1f8679db0e97d7b9d28be323bf4ebe6a6f5a53caa"]}) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000200)={'batadv0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x2, &(0x7f00000000c0)=@raw=[@cb_func], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, r2, 0x4, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x7f}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5987}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20008080}, 0x0) 17:07:26 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:26 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0xc00) 17:07:26 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@ax25={{0x3, @default}, [@remote, @bcast, @remote, @null, @remote, @remote, @bcast]}, &(0x7f0000000080)=0x80) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:26 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:26 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x281) [ 1430.483912][T11171] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:26 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x0) 17:07:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="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"]}) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) (async) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) (async) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000200)={'batadv0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x11, 0x2, &(0x7f00000000c0)=@raw=[@cb_func], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x80) (async) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r1, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x5c, r2, 0x4, 0x70bd25, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x7f}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5987}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5, 0x2a, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x2}]}, 0x5c}, 0x1, 0x0, 0x0, 0x20008080}, 0x0) 17:07:26 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0xd00) 17:07:26 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x600) [ 1430.534922][T11180] loop2: detected capacity change from 0 to 264192 [ 1430.540417][ T2635] loop2: unable to read partition table [ 1430.562585][T11190] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 1430.577175][T11180] nfs: Unknown parameter '.Ÿ' 17:07:26 executing program 2: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000500)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)=0x0) syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file1\x00', 0x100000000, 0x3, &(0x7f0000000280)=[{&(0x7f0000000080)="660fe8ab6ff18987e175e48fcf09e2e1ed5a371923b8b3c5bcaa4c8ac93a8a8c1647089809626206325eb8e6da1ce4ed39cc7496d9481dfd610e9167482fabec6c5c8e4b2bb8f709311969e29e2d7f4c", 0x50, 0x81}, {&(0x7f0000000100)="68a5cf4579a103eb2288bc2b0ec9c78d1feedaa1f5537d71755d301080cc684d388ef9b913e7282b3c4eb5f9217d8688a1cec4fc3d4ba6d226a4303e0574bfb5f93083b567fb0eb81086b14389bf097ad11d744a53cf4fb813902d16bcb1eca997f7ef45683a4e330f80d3966546e4e79d069e256d456f394c965d2990408444f4bd96d696fb96f08f58f478b9f862514c4380e80af9f91a2f70ea4210499d71d1ec83b2aafbfddd", 0xa8, 0xd19c}, {&(0x7f00000001c0)="8096a810002dc52d9f3407a56554e736eaa35b8f24feb3a94e08681a88fbb5276810af81e124e4d80f648924e0752c7f1dae5556cb661326e399dbd60208ba0751a5457a144ebdae1d08a48237cd65464e4f7be48c75b2bf53551fdba6bcc2a59744b8da47cc54559a371ba8c233c5c0fcb0f4aa1455d48b1fde51ffe1640dcd16215a942a796323a72f29ded4f509f115245e6e6bd5fea2544483b71a7efc3ac4fb4fedeeaa4be08e", 0xa9, 0x5}], 0x208400, &(0x7f0000000400)={[{'.\x9f,\x89:)@:'}, {'\'$%'}, {'%#)/#\xfe/\\#}+'}, {'#\x1b!'}, {'^\\}[^#*'}, {}, {'*!\']%@'}], [{@fowner_gt}, {@fowner_eq={'fowner', 0x3d, r1}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@uid_gt}, {@smackfsdef={'smackfsdef', 0x3d, '%\'%]'}}, {@appraise}, {@smackfsroot}, {@euid_eq}, {@fsname={'fsname', 0x3d, ']'}}, {@fsname={'fsname', 0x3d, '\xab&]^^(\x1d.'}}]}) 17:07:26 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x1394) 17:07:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006f353fe9edd4980000000000000000000000000000000000000000000000000000000000000000000000000700000000000000ffe000"/527]}) setxattr$security_evm(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000300)=ANY=[@ANYBLOB="050001000001050200000059"], 0xc, 0x0) utime(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x1, 0x8000000000000001}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 17:07:26 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x104400, &(0x7f0000000000)={'trans=xen,', {[], [{@euid_eq={'euid', 0x3d, 0xee00}}]}}) 17:07:26 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0xc00) 17:07:26 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:26 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006f353fe9edd4980000000000000000000000000000000000000000000000000000000000000000000000000700000000000000ffe000"/527]}) (async) setxattr$security_evm(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000300)=ANY=[@ANYBLOB="050001000001050200000059"], 0xc, 0x0) (async) utime(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x1, 0x8000000000000001}) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) 17:07:26 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x2000) 17:07:26 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x104400, &(0x7f0000000000)={'trans=xen,', {[], [{@euid_eq={'euid', 0x3d, 0xee00}}]}}) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x104400, &(0x7f0000000000)={'trans=xen,', {[], [{@euid_eq={'euid', 0x3d, 0xee00}}]}}) (async) 17:07:26 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0xd00) 17:07:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f00000003c0)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000006f353fe9edd4980000000000000000000000000000000000000000000000000000000000000000000000000700000000000000ffe000"/527]}) setxattr$security_evm(&(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), &(0x7f0000000300)=ANY=[@ANYBLOB="050001000001050200000059"], 0xc, 0x0) utime(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x1, 0x8000000000000001}) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00'}) [ 1430.691719][T11215] loop2: detected capacity change from 0 to 264192 [ 1430.727558][T11215] nfs: Unknown parameter '.Ÿ' 17:07:26 executing program 2: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000500)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)=0x0) syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file1\x00', 0x100000000, 0x3, &(0x7f0000000280)=[{&(0x7f0000000080)="660fe8ab6ff18987e175e48fcf09e2e1ed5a371923b8b3c5bcaa4c8ac93a8a8c1647089809626206325eb8e6da1ce4ed39cc7496d9481dfd610e9167482fabec6c5c8e4b2bb8f709311969e29e2d7f4c", 0x50, 0x81}, {&(0x7f0000000100)="68a5cf4579a103eb2288bc2b0ec9c78d1feedaa1f5537d71755d301080cc684d388ef9b913e7282b3c4eb5f9217d8688a1cec4fc3d4ba6d226a4303e0574bfb5f93083b567fb0eb81086b14389bf097ad11d744a53cf4fb813902d16bcb1eca997f7ef45683a4e330f80d3966546e4e79d069e256d456f394c965d2990408444f4bd96d696fb96f08f58f478b9f862514c4380e80af9f91a2f70ea4210499d71d1ec83b2aafbfddd", 0xa8, 0xd19c}, {&(0x7f00000001c0)="8096a810002dc52d9f3407a56554e736eaa35b8f24feb3a94e08681a88fbb5276810af81e124e4d80f648924e0752c7f1dae5556cb661326e399dbd60208ba0751a5457a144ebdae1d08a48237cd65464e4f7be48c75b2bf53551fdba6bcc2a59744b8da47cc54559a371ba8c233c5c0fcb0f4aa1455d48b1fde51ffe1640dcd16215a942a796323a72f29ded4f509f115245e6e6bd5fea2544483b71a7efc3ac4fb4fedeeaa4be08e", 0xa9, 0x5}], 0x208400, &(0x7f0000000400)={[{'.\x9f,\x89:)@:'}, {'\'$%'}, {'%#)/#\xfe/\\#}+'}, {'#\x1b!'}, {'^\\}[^#*'}, {}, {'*!\']%@'}], [{@fowner_gt}, {@fowner_eq={'fowner', 0x3d, r1}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@uid_gt}, {@smackfsdef={'smackfsdef', 0x3d, '%\'%]'}}, {@appraise}, {@smackfsroot}, {@euid_eq}, {@fsname={'fsname', 0x3d, ']'}}, {@fsname={'fsname', 0x3d, '\xab&]^^(\x1d.'}}]}) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000500)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) (async) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)) (async) syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file1\x00', 0x100000000, 0x3, &(0x7f0000000280)=[{&(0x7f0000000080)="660fe8ab6ff18987e175e48fcf09e2e1ed5a371923b8b3c5bcaa4c8ac93a8a8c1647089809626206325eb8e6da1ce4ed39cc7496d9481dfd610e9167482fabec6c5c8e4b2bb8f709311969e29e2d7f4c", 0x50, 0x81}, {&(0x7f0000000100)="68a5cf4579a103eb2288bc2b0ec9c78d1feedaa1f5537d71755d301080cc684d388ef9b913e7282b3c4eb5f9217d8688a1cec4fc3d4ba6d226a4303e0574bfb5f93083b567fb0eb81086b14389bf097ad11d744a53cf4fb813902d16bcb1eca997f7ef45683a4e330f80d3966546e4e79d069e256d456f394c965d2990408444f4bd96d696fb96f08f58f478b9f862514c4380e80af9f91a2f70ea4210499d71d1ec83b2aafbfddd", 0xa8, 0xd19c}, {&(0x7f00000001c0)="8096a810002dc52d9f3407a56554e736eaa35b8f24feb3a94e08681a88fbb5276810af81e124e4d80f648924e0752c7f1dae5556cb661326e399dbd60208ba0751a5457a144ebdae1d08a48237cd65464e4f7be48c75b2bf53551fdba6bcc2a59744b8da47cc54559a371ba8c233c5c0fcb0f4aa1455d48b1fde51ffe1640dcd16215a942a796323a72f29ded4f509f115245e6e6bd5fea2544483b71a7efc3ac4fb4fedeeaa4be08e", 0xa9, 0x5}], 0x208400, &(0x7f0000000400)={[{'.\x9f,\x89:)@:'}, {'\'$%'}, {'%#)/#\xfe/\\#}+'}, {'#\x1b!'}, {'^\\}[^#*'}, {}, {'*!\']%@'}], [{@fowner_gt}, {@fowner_eq={'fowner', 0x3d, r1}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@uid_gt}, {@smackfsdef={'smackfsdef', 0x3d, '%\'%]'}}, {@appraise}, {@smackfsroot}, {@euid_eq}, {@fsname={'fsname', 0x3d, ']'}}, {@fsname={'fsname', 0x3d, '\xab&]^^(\x1d.'}}]}) (async) 17:07:26 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) 17:07:26 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x1361) 17:07:26 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x104400, &(0x7f0000000000)={'trans=xen,', {[], [{@euid_eq={'euid', 0x3d, 0xee00}}]}}) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x104400, &(0x7f0000000000)={'trans=xen,', {[], [{@euid_eq={'euid', 0x3d, 0xee00}}]}}) (async) 17:07:26 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x2400) 17:07:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009f0b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000059fad999e3db86bd30eee3261e1ff250b9df698dc0e00201bd1b82bdd89e0c1ecbc81b4cdc54aa698f77bb655be5ec89c830042bf1468ef6c00ba1842c69044079ef065f13f34ba0ed0ab4806b2f8d8e0a572d46491efd02bca55c200453a9e83ca0e2e4c431836776fffdaf33b0e392d9808ee736489a169f8b3c1fe525e570df3b106d53c7f7249cc60761a331eec23daad74cc92d8defe5271e53918e2a6167a07d0c37c268592ca2622c200cd7a32eb04f92f3632536db0d771253000000"]}) 17:07:26 executing program 0: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7472616e733d78656e2c726f6f74636f6e746578743d73740466665f752c009ea830044ba7fb486fb74518b4f2e9f909aefa2a7cc7532528fe7074d3e9322fd2421a5e3ff0d49ddcf8934ad8498b3adc566b8e7c40410d93c85ae723b372afb76c2b116301251d9510d7a6443bdd6b5a1a14b0ee731e4232be920456febeaed4e05063a85904052ca8f7392099bdde728dac96b6618959334fa414f04b95f25d95bbc31f2448c949a6444a36a72b7caa1353db"]) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xfff}}, './file0\x00'}) futimesat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {0x77359400}}) 17:07:26 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) 17:07:26 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x3f00) 17:07:26 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x2000) 17:07:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009f0b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000059fad999e3db86bd30eee3261e1ff250b9df698dc0e00201bd1b82bdd89e0c1ecbc81b4cdc54aa698f77bb655be5ec89c830042bf1468ef6c00ba1842c69044079ef065f13f34ba0ed0ab4806b2f8d8e0a572d46491efd02bca55c200453a9e83ca0e2e4c431836776fffdaf33b0e392d9808ee736489a169f8b3c1fe525e570df3b106d53c7f7249cc60761a331eec23daad74cc92d8defe5271e53918e2a6167a07d0c37c268592ca2622c200cd7a32eb04f92f3632536db0d771253000000"]}) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009f0b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000059fad999e3db86bd30eee3261e1ff250b9df698dc0e00201bd1b82bdd89e0c1ecbc81b4cdc54aa698f77bb655be5ec89c830042bf1468ef6c00ba1842c69044079ef065f13f34ba0ed0ab4806b2f8d8e0a572d46491efd02bca55c200453a9e83ca0e2e4c431836776fffdaf33b0e392d9808ee736489a169f8b3c1fe525e570df3b106d53c7f7249cc60761a331eec23daad74cc92d8defe5271e53918e2a6167a07d0c37c268592ca2622c200cd7a32eb04f92f3632536db0d771253000000"]}) (async) 17:07:26 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x4000) [ 1430.818576][T11248] SELinux: security_context_str_to_sid (stff_u) failed with errno=-22 [ 1430.834652][T11251] loop2: detected capacity change from 0 to 264192 [ 1430.857111][T11251] nfs: Unknown parameter '.Ÿ' 17:07:26 executing program 2: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x1ff}) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f00000000c0)) 17:07:26 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) 17:07:26 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x2400) 17:07:26 executing program 0: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7472616e733d78656e2c726f6f74636f6e746578743d73740466665f752c009ea830044ba7fb486fb74518b4f2e9f909aefa2a7cc7532528fe7074d3e9322fd2421a5e3ff0d49ddcf8934ad8498b3adc566b8e7c40410d93c85ae723b372afb76c2b116301251d9510d7a6443bdd6b5a1a14b0ee731e4232be920456febeaed4e05063a85904052ca8f7392099bdde728dac96b6618959334fa414f04b95f25d95bbc31f2448c949a6444a36a72b7caa1353db"]) (async) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xfff}}, './file0\x00'}) futimesat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {0x77359400}}) 17:07:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009f0b00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000059fad999e3db86bd30eee3261e1ff250b9df698dc0e00201bd1b82bdd89e0c1ecbc81b4cdc54aa698f77bb655be5ec89c830042bf1468ef6c00ba1842c69044079ef065f13f34ba0ed0ab4806b2f8d8e0a572d46491efd02bca55c200453a9e83ca0e2e4c431836776fffdaf33b0e392d9808ee736489a169f8b3c1fe525e570df3b106d53c7f7249cc60761a331eec23daad74cc92d8defe5271e53918e2a6167a07d0c37c268592ca2622c200cd7a32eb04f92f3632536db0d771253000000"]}) 17:07:26 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x8100) 17:07:26 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}) 17:07:27 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x8102) 17:07:27 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) 17:07:27 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x3f00) 17:07:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}) 17:07:27 executing program 0: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="7472616e733d78656e2c726f6f74636f6e746578743d73740466665f752c009ea830044ba7fb486fb74518b4f2e9f909aefa2a7cc7532528fe7074d3e9322fd2421a5e3ff0d49ddcf8934ad8498b3adc566b8e7c40410d93c85ae723b372afb76c2b116301251d9510d7a6443bdd6b5a1a14b0ee731e4232be920456febeaed4e05063a85904052ca8f7392099bdde728dac96b6618959334fa414f04b95f25d95bbc31f2448c949a6444a36a72b7caa1353db"]) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0xfff}}, './file0\x00'}) futimesat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={{0x77359400}, {0x77359400}}) [ 1430.920731][T11268] SELinux: security_context_str_to_sid (stff_u) failed with errno=-22 17:07:27 executing program 2: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) (async) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x1ff}) (async) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f00000000c0)) 17:07:27 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}]}, 0x2c, 0x0) 17:07:27 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x4000) 17:07:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}) 17:07:27 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x9413) 17:07:27 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x6113) 17:07:27 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}]}, 0x2c, 0x0) 17:07:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4200}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, r1, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x2}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3f}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="9079254e1178"}]}, 0x50}, 0x1, 0x0, 0x0, 0x44844}, 0x4008000) syz_open_dev$sg(&(0x7f0000000580), 0x7f, 0x0) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r1, 0x300, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}]}, 0x24}}, 0x4000000) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b0000000000000000000000000000000000000000000000000000000000000000000000000000000000b82758d12416f886deea784e0000000000000000000000000000000000000000000000000000000000000000000000000000000000c38493edace78747903200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000032bcc87c4feb7d6300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000140c69762ef5740f9a6b856eb30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bc2fb021206821b2dbdadddb062b5bed6"]}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r2) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000540)={0x3, &(0x7f0000000500)=[{0x20, 0x4, 0x6, 0x1}, {0xa, 0x0, 0xec, 0x7ff}, {0x40, 0x8, 0xff, 0x3}]}) [ 1430.977324][T11275] 9pnet: Could not find request transport: xen [ 1430.998727][T11287] SELinux: security_context_str_to_sid (stff_u) failed with errno=-22 17:07:27 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0xff9, 0x0, 0x0, 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:27 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0xff00) 17:07:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) (async) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4200}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, r1, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x2}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3f}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="9079254e1178"}]}, 0x50}, 0x1, 0x0, 0x0, 0x44844}, 0x4008000) syz_open_dev$sg(&(0x7f0000000580), 0x7f, 0x0) (async) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r1, 0x300, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}]}, 0x24}}, 0x4000000) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b0000000000000000000000000000000000000000000000000000000000000000000000000000000000b82758d12416f886deea784e0000000000000000000000000000000000000000000000000000000000000000000000000000000000c38493edace78747903200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000032bcc87c4feb7d6300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000140c69762ef5740f9a6b856eb30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bc2fb021206821b2dbdadddb062b5bed6"]}) (async) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r2) (async) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000540)={0x3, &(0x7f0000000500)=[{0x20, 0x4, 0x6, 0x1}, {0xa, 0x0, 0xec, 0x7ff}, {0x40, 0x8, 0xff, 0x3}]}) 17:07:27 executing program 2: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) (async) utime(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x0, 0x1ff}) ioctl$SCSI_IOCTL_GET_BUS_NUMBER(r0, 0x5386, &(0x7f00000000c0)) 17:07:27 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}]}, 0x2c, 0x0) 17:07:27 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x8100) 17:07:27 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0xff01) 17:07:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4200}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x50, r1, 0x100, 0x70bd2b, 0x25dfdbff, {}, [@BATADV_ATTR_AP_ISOLATION_ENABLED={0x5}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x2}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x3f}, @BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x3}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5, 0x29, 0x1}, @BATADV_ATTR_ORIG_ADDRESS={0xa, 0x9, @random="9079254e1178"}]}, 0x50}, 0x1, 0x0, 0x0, 0x44844}, 0x4008000) (async) syz_open_dev$sg(&(0x7f0000000580), 0x7f, 0x0) (async, rerun: 32) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, r1, 0x300, 0x70bd25, 0x25dfdbfb, {}, [@BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x6}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x5}]}, 0x24}}, 0x4000000) (async, rerun: 32) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000280)=ANY=[@ANYBLOB="4b0000000000000000000000000000000000000000000000000000000000000000000000000000000000b82758d12416f886deea784e0000000000000000000000000000000000000000000000000000000000000000000000000000000000c38493edace78747903200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000032bcc87c4feb7d6300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000140c69762ef5740f9a6b856eb30000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000bc2fb021206821b2dbdadddb062b5bed6"]}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r2) ioctl$PPPIOCSACTIVE(r2, 0x40107446, &(0x7f0000000540)={0x3, &(0x7f0000000500)=[{0x20, 0x4, 0x6, 0x1}, {0xa, 0x0, 0xec, 0x7ff}, {0x40, 0x8, 0xff, 0x3}]}) [ 1431.039359][T11296] 9pnet: Could not find request transport: xen [ 1431.064245][T11306] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 17:07:27 executing program 4: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000500)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) getresuid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f0000000380)=0x0) syz_mount_image$nfs(&(0x7f0000000000), &(0x7f0000000040)='./file1\x00', 0x100000000, 0x3, &(0x7f0000000280)=[{&(0x7f0000000080)="660fe8ab6ff18987e175e48fcf09e2e1ed5a371923b8b3c5bcaa4c8ac93a8a8c1647089809626206325eb8e6da1ce4ed39cc7496d9481dfd610e9167482fabec6c5c8e4b2bb8f709311969e29e2d7f4c", 0x50, 0x81}, {&(0x7f0000000100)="68a5cf4579a103eb2288bc2b0ec9c78d1feedaa1f5537d71755d301080cc684d388ef9b913e7282b3c4eb5f9217d8688a1cec4fc3d4ba6d226a4303e0574bfb5f93083b567fb0eb81086b14389bf097ad11d744a53cf4fb813902d16bcb1eca997f7ef45683a4e330f80d3966546e4e79d069e256d456f394c965d2990408444f4bd96d696fb96f08f58f478b9f862514c4380e80af9f91a2f70ea4210499d71d1ec83b2aafbfddd", 0xa8, 0xd19c}, {&(0x7f00000001c0)="8096a810002dc52d9f3407a56554e736eaa35b8f24feb3a94e08681a88fbb5276810af81e124e4d80f648924e0752c7f1dae5556cb661326e399dbd60208ba0751a5457a144ebdae1d08a48237cd65464e4f7be48c75b2bf53551fdba6bcc2a59744b8da47cc54559a371ba8c233c5c0fcb0f4aa1455d48b1fde51ffe1640dcd16215a942a796323a72f29ded4f509f115245e6e6bd5fea2544483b71a7efc3ac4fb4fedeeaa4be08e", 0xa9, 0x5}], 0x208400, &(0x7f0000000400)={[{'.\x9f,\x89:)@:'}, {'\'$%'}, {'%#)/#\xfe/\\#}+'}, {'#\x1b!'}, {'^\\}[^#*'}, {}, {'*!\']%@'}], [{@fowner_gt}, {@fowner_eq={'fowner', 0x3d, r1}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@uid_gt}, {@smackfsdef={'smackfsdef', 0x3d, '%\'%]'}}, {@appraise}, {@smackfsroot}, {@euid_eq}, {@fsname={'fsname', 0x3d, ']'}}, {@fsname={'fsname', 0x3d, '\xab&]^^(\x1d.'}}]}) 17:07:27 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x40000) 17:07:27 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0xff9, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) socket$inet_udplite(0x2, 0x2, 0x88) (async, rerun: 32) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:27 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x8102) 17:07:27 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x400000) 17:07:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}) 17:07:27 executing program 2: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = getegid() fchownat(r0, &(0x7f0000001600)='./file1\x00', 0xee01, r1, 0x100) r2 = syz_mount_image$nfs(&(0x7f0000000040), &(0x7f0000000080)='./file0/file0\x00', 0x80, 0x5, &(0x7f0000000340)=[{&(0x7f00000000c0)="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", 0xff}, {&(0x7f0000000400)="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", 0x1000, 0x8}, {&(0x7f00000001c0)="ea9c5f2f006f1ed3e169a430390408584b037e156652839552cc6a56ab28cd67175e9ade216254ff21ea8ae5db93ea09e7430a786a19228fb8f6c6e84740d5c9790c05f12dafcd43078405ee6ac77a798f8ee50340aed81a29c11bb6f96393fab47def2a051b17", 0x67, 0x7}, {&(0x7f0000001400)="00ccab4daa18b3c4bf444e426f2dd74f73e123007d6d671876cd937d6c7e3ba51c2d3d6b222ab0f063e029831d830ef161dcce228d2ab4e59b1c4719d9042f7216810282eaf2f226aef54fe7d7e6a3269241e4bc3a42677479f8a031ecd746ed3e6179fdf7d8f396295cdadd1fc20319fc90a20236724d9e1f091a1d68f8cd615c3b9f7c0a8998a0e56a9ae82db8c224a96851b1070ddcc7d3f85963911979e19fdfd13869f748590a2f758537d8c54d9ec00dbe14a2993f", 0xb8, 0xa3d00000000}, {&(0x7f0000000240)="fd4e848d98f58cac8856dd22731a8698d0005285787296e1da440263c958de426854beb69e1d36e5f9f0fded5d7539ac5e73f9e1d9830260177c9e7d297c381f891a11d627a7", 0x46, 0x3}], 0x80008, &(0x7f00000014c0)=ANY=[@ANYBLOB='9p\x00,9p\x00*},,{\\%&,uname,j\"#-}}\a-,sujj_role=9p\x00,func=BPRM_CPECK,dont_measure,\x00\x00\x00']) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) clock_gettime(0x0, &(0x7f0000001580)={0x0, 0x0}) futimesat(r3, &(0x7f0000001540)='./file0/file1\x00', &(0x7f00000015c0)={{r4, r5/1000+60000}, {0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f0000001640)={{0x1, 0x1, 0x18, r2}, './file0/file1\x00'}) ioctl$PPPIOCSCOMPRESS(r6, 0x4010744d) 17:07:27 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0xff00) 17:07:27 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0xff9, 0x0, 0x0, 0x0, 0x0) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}) [ 1431.166935][T11331] loop4: detected capacity change from 0 to 264192 [ 1431.188028][T11331] nfs: Unknown parameter '.Ÿ' 17:07:27 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x24) 17:07:27 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x800000) 17:07:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op={0x4b, 0xf, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x8000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}}) 17:07:27 executing program 0: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) syz_mount_image$nfs4(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x1000003, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) 17:07:27 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0xff01) 17:07:27 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x1000000) 17:07:27 executing program 0: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) syz_mount_image$nfs4(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x1000003, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) [ 1431.223057][T11346] loop2: detected capacity change from 0 to 264192 17:07:27 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x24) 17:07:27 executing program 2: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = getegid() fchownat(r0, &(0x7f0000001600)='./file1\x00', 0xee01, r1, 0x100) (async) r2 = syz_mount_image$nfs(&(0x7f0000000040), &(0x7f0000000080)='./file0/file0\x00', 0x80, 0x5, &(0x7f0000000340)=[{&(0x7f00000000c0)="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", 0xff}, {&(0x7f0000000400)="518e21db6096373536cd966a07b180a889f8e3451058a8264ff6a715a37a60c46e146c2a6ea20bdaa9686f5176a28f031101808e1939fcebcf7dedb8d063554ae2739c726a982c0d6f5a678961fe5fe2eba289272de57705d27eb0e66ffb3e559d6d8450252dd54eddbc7db009aaa9a37e0ab0fad2e101d44c15fc880e4b01db5c71dca0634b5ca6530edf70ec3e0d4af8320d44a33fde331a3f9c4d8fb5fe204291790a6a5f6999d7fb0a3296f7fb841e5945dbc5ba2775d4f8a52ca449ad453cf6f21a7fe2845792f04ecde47adc669e68cde6470c4c6ce56682fc54ea203cf5fa73c593ffb9845e7cbcda12dc8f9ac2084c76c731716270b24174912693a0d99d2dd0650c5844ac05330dafb30af91f47c31a23ee1ed5d3c004887061b0e19c1bf5e30fd9286368d76667e849b7bfb7af8b93cb6d6fe8d3d1474c49d479d63ab478efd67b55bdb06d74d2451df60f18a1e6f81ff721950cb9119e40aa518098447ccfe3dbc02ba21997e72a3b0a6a6c06c978830a37e83334bb0b33b1783ec6e732af2400fc21eb734f92ae33bd0c6bb35174171b46243e648588d62a50a95af9b14128d12b31418d6a0594ed3cdac7a23c4b4435671dac262606704d4989d2f7d104e6d4eb2fd88b73da8bffd10f112ad17dd6200f8fad867b80ae7adc59a868cd721cfa6e9b2257a46f14a16f543e59c1ff993571a94ffed2329cd35b006897f81380b880ec204c8cee818eaa5559a8b1505b1289ec2f11c4ab1576a9b77cbd11c8ac49a6b7aff1a60214efded3dd82f37100fddff94acbb514b969212ce5bddee611d98907502a6ab42572c1c7d2cf47d48e5459e302c8bb21ee0326479e3a7d478e572c5862a224194fc053da797c8a8d278b021022492e3b628bff797ed830371a8fe4e051a38632aec3b4893f46754ce821eccc9fd82b1ff6047d9f800825bc0d4328b57ea6eee786360c3b4ce321de269fd6fdb0f174da00d342da484cf36279198445d929d72fb119f0c89483f2a4e5e7a83744d41381258dda2e81edca35c833c6639d8cf768bebcc4d58cb6ad70b1fa2e89dabea4342413c1b2e6b7642b5f02ce48a45931682a97577a59ae72becea82d54e4c67930372ed3e64c4cc23133df691bdc7edfa825f2dd481f4aa359d4f8b68c1e31edfbec342cd4ce51488671b9813e7607a6c7f04904e4343133a617833cf9b9929ffbdbb9139b64ff9face1e69906e936d66bd5f8fd458f6155a136ac2dff19662b947a00a2eff56e609a6750ee6ae788b01684194ab7280a6cfca58977b8b298efcf06279aef3eb7364cc73ddf9c3913aa713ced149641660045b32ed8356f90442e92d8b6a580c9b204bae7cb781647d99f150b3daee011c4766db002b77a95350be02958b7afc63216a4e20994aa9467c2b4e29a46e1d262e2500f5705c72215ce930e651ece3ef7d542dc2c6f1745c4392161ee89552303a961c7207b6fca60a1b674212a712bb35992b9d806df57a00430093ee5111dca9951426e17a258fe8d22024b85b1edbcc0544294d8e3c3a0029c5c896a2d8f50e1bce363d03c4939429a4c496d7c2d45b45e976f5d464580208a850f6d431650fbbe6ad2c817ade2ece17fb07a02a12901eadc64dcf1bf693f8459d47f72e9e06197464a39369c9d6a80a645307407f07dd52e90c8e31c4d1542c8ef6cbe858cc4a12121e165f53498746335b2d0bfae8e9cdf873ad894a994efe5b22f220b56da90bcf7edc145833b2a1484bc871149df065291535a00c7e3ce94b397fd25121b3890aea86cd6b35ec732821a4e078e702578c5d6abb5099b04a04ab202f01c1d7418dadc608b1fc40c643b36d648857dc2e50cf9a546fa11bba73cb6ad63cf98413bf01ddbf3d8c5920a38bfd2dc5292cc18a60ba399c1bc4ae7d7d73b5e5e6eba82cc6f9787f8c5165e0e6f2292bbafe48a2b072a6eb164daf1c6a31cefec145d8cec5323bf76b84e5d6b5bb9064783da2786af47f75607debec7cfc4a6fbfefaa069830ddfba5574b02da3d1ba6f511b1984c040dc638eb3848a7a61a7ad070012284a5a821729cf5663546b5e316daa3a270a183c600a9172a8c4142560e43bcadea0a10329249491d5a89e82a6be2a7f27de75725c085475ccacc6f30eee697d0a43ec4ad0ce0b6983f14e3371da59172de8bc1748f04bdbc8c4814f4d419efead3466f0e49b73bb46ca7bb4f5d7044091f124392a34d049131c479abff22dc59c878fda51db3a135eec7de07a747b4bcf9bb143b58da82c50199135bea2a1241d6d2eb96754cbb006a6153333a04be6f1e3b45bc01a2604e76392263b1c7604069bd28b0f68d8fc1c38cfcf487ecd3592cbabc3c4a7c18c427d7883a098c6493f2808458579092a4479bd81664f418e794c46aee257b1fd1b5b33219b2c347eeac109791ffedafdf206a8a75c0c9f6f6f6e90dba2a1aedec3a76abb59f0d87d033fb8fa28428941ecaa653e274bc1a0a6d0600a42ae7d691147917ee43d0474b85d7b13ddddae99a540b4b771e41cfa46ee5f3a5f1297fbd54277dbf712fb7af992ddf1b0bd53808e98832fddea20263885c90f84d38126eb68d6d28f8594fc2d5337a874544954069b2e907ac544be19f78757be2070edab5b1190fcb20529f43c7264a17cbf2b479f211fa5e41b66fac92338546cf4156208963250a8b926c3526ed420cc7e623bbdac18a3fe0183feabe1cd9ccb0f14b2c99c9f688ab9be526ebf848956b2fa4b1559cb166cb16c55e3c2c902cf60e1027fd71bef20d20dfe11d43e73f8b5bf6d3eedeed180b660861430bbdefaf0a1a10ef594bbb9998cc3932e0793f1ff1a397cadb23f34185e2d4a360e0207005011b051603c21ec2a23b3af1b60b65eaa0ce20201d0ff578935f83adfa19162391406e861bf72f64545a07077632f68fb4f41a1a848a24d228511cf3efb422ffc45a2bee31319b4ffc6da88f234196457cf89eb7c90ba05bcdba3c694b0c9c91601cd8f3c7fe3434f0205415726c989f4dffa8f826a55ca3211b053ba55ed5887efc8ee6e6144e2c89b61b907d4c8273bdfddbd8c0a55e84a17e88c9809f016927f83586b0bd0c39e0a8e8633a8d7df6e012faa1714e3d5895a04b1751132830314dd4b176eb891ceda849c291dcd7f668718b30bbc3b07c3f0b26c95599afd9d230064290b4885bcfb58a04023b6f60cd970dd3e1389ef2c576e57f2ae557e4297b2004d4a057e57873590bb880c3145cacf32b7b07daf65776a62927211b47a063f049e2d047d414b3f725add7b8f543fbcae456e5fe166b3d57b1319110d2ca2bafcfb99201f50613d0bf78084831ba7abe0e52ed4ba5acf27e4cba1b182769f6108cfba952fbd1a56b6a3715e636f56b58400219bde893d613fa16abdc45e3656d5879565d0c3c5efa10477a96ee62072f7cc58816a1a4e65703edb56ef12a3b6af4c119f51169e4f9001ed52451c2dae14d3314f8fdd9692e5445318c58aca12bfa6c9190dc9c5cd6952f2d05dcaa235fdf0fc891f8b98febcf19612e2e16f1e4b04b47561cb165e878d62d8fd385bcf1807280ccc8368dd263d0b33cba9d6761046c8cc48429a17f2e149604fca58f17e16bafb72d33a49fe928ae8ed34c5a2ea22d8828aae764ba9d68a28d121b8f42ed51ee46503557bfb5154ce1c306235516afe07eba5f9e2dd0f05182c47a8506c3b30b17f4d9b984c0eff81d595ccf80c1d061affdd0e7f424582ff5c8f59a163d8cf111f65b654365735d39777763f17437217e0232aaed8a2d0d2b8149fd8ff1e29e28755d4942e9c46a6a5b389df550be60c8131f5d658a5573fadbe9c8f324007175b2dba64e340cab76947eabceb93b7749f92e2d7e90b0ddc0da484599529fc934c1f791987be404a584c9390a45e35de52baec520691b9bd4dc2bf2caa55599dc078b3a2f7907d786a7cbbb43b23d8ebabd611ee10ce14eaa2ccd9808d242a9d56a3464b8c0313cd6363a7a309eccf4bca4c57d6731c600a4f754c78ada75ddf467b61e3e0027087c5f5221d1d391da3a1615cf6bb1f074bdaf6a1407364f3ee33431351d48b64835bc3faa99db641ae0806822b53d41a31c79f64feafbc9ab68076487012b556367a62ce5d3f91dd4c526aa429ae14d3c427d734248485a3547e94f9a5c1f1b4defe5bce9cd3983e4933e993e08caf21cac24d5e69c484e0a0675158daa2f956d9b64d20a55fecd636d575847008549f2d26bffd6ebd0c2f95feddf3227953c9d23b43fb5ae02b8fcc57120e1b1dfe68ae3078be8a5dfde09ff9a0205d90e1e7a9d0f1786f79bcf4abb35fc844a3e5e3c395982bd0876c7368c94269f73263e7d9756cdf9927573e37661c70af9e7ed470970599a5940576eed7634b14c7092e42ecbf93977c621dbeab5cd9e87042da6dc020c43b244546ea27093e8333c752d3f4b06db1873c313c30ce5a06321eecb44eb3b479c058b2b381424f80bedebd07658c414f20873f2565f7c1f2469cde28583256fd335e754250a8e69f7a03e2f0f48a0d858e838d8ef97876d6b4c60ae126a7ab3ad8034abe96ce82e0ee8c30f65f8e456a87cb9edf7e75d19b1f24f9b2690fee837d2efdf59b8ccabac83d2837a49cff15b22f2310b9288bccc54a2682e6da1bfa780a0d17212ba73db864a50e61ba581496430a61d1ee777802e72195686d81aaaf80d350d86ec3ab856d9d4c0a7f5416633ee113faab1952034040f47efac574c323eb8a56e035f76edec92cbd2a963d03c9e3c8a9c4b551a681c77b05abeb3dedd6ffde375ffed178eebb45ea7cd4005ffd31f2c138f74f5147b2f49fce31fad5b1d987df7619e70a45eb4f17f557bd668fa47d00d919c29d1ee90d7db204eff67e6785a0c6daa2f4b724a31e7a4f7436510217a4ad9ea1bf824ebde795cb80e98271c1d10dc94b61194a65a4215149f119b152c419f9d5b508bdf896c48df52721821f55c6e6e351765b7315386d2e145a7b506040b579cf9c014f0ed9c1839b5584a2a4b2cd4dbe7a2825ddb577ef93b7544001b50c34ecd92e675bc0231c9876e371b329c8197159c1d7e28812e09786b6a8c55ddfcb00249ac40c08ee122292d4dff0eecd93a6cd127b387954a69f52ef429d65fb53f6d68cfaa57cb5f43ae468dc68c92146328d2a976d7e1a64f9e282b33dffa3a1b65bb151dd154c5c6cd265fa342a3029b2392127617e67595113e840a34f26b766deb68355b19bebc3dc7e7be14beee1cccb61d5cc104a8052133c13e17aae4ae5cf25e5c4e2b574ba7c3b2920e230d1681155436d544752bd1bbea18f2b14fb694ecd9819599a11a2a4cd3395139ab7b473102384d813ae7c6647e71617b82d7f2f9fb4a66b35a08d8a9dcbf846e0307cb18cf6da1b5e500728e37d1a1b888214c95b4ecc89ef4ff2dd75eb0f8396fac01dd08df6a02babe8375561e784c5e83e6b0b2ae7d00c8f0f957b52349017a708285b3f610b1da04246a28d077cbb92ddcc4ff9565474ccb1ad69116e44a2b4b79be5edb4fd904b3745463acbe042242d53229304ee29cae4cd325b2101aa290f53a7bcd0322bb09b4ee660a64e7c336af22e9f2227f32b7c3c9e3f20d94694962f0b74adecee9fb4a6a5273f969c946293476680b84d375751f27372df4b2738a114106199e31571eb6ffc62173182191b06f5119f4e1d0396a29d18a9131e41559de58e701700a14622cd0dafd637d59d808dd588c80a2ce4ebe7adf0baade4a4d3bd2ff6e06bf28fa1417996e89fb2ca6e738ba59c48", 0x1000, 0x8}, {&(0x7f00000001c0)="ea9c5f2f006f1ed3e169a430390408584b037e156652839552cc6a56ab28cd67175e9ade216254ff21ea8ae5db93ea09e7430a786a19228fb8f6c6e84740d5c9790c05f12dafcd43078405ee6ac77a798f8ee50340aed81a29c11bb6f96393fab47def2a051b17", 0x67, 0x7}, {&(0x7f0000001400)="00ccab4daa18b3c4bf444e426f2dd74f73e123007d6d671876cd937d6c7e3ba51c2d3d6b222ab0f063e029831d830ef161dcce228d2ab4e59b1c4719d9042f7216810282eaf2f226aef54fe7d7e6a3269241e4bc3a42677479f8a031ecd746ed3e6179fdf7d8f396295cdadd1fc20319fc90a20236724d9e1f091a1d68f8cd615c3b9f7c0a8998a0e56a9ae82db8c224a96851b1070ddcc7d3f85963911979e19fdfd13869f748590a2f758537d8c54d9ec00dbe14a2993f", 0xb8, 0xa3d00000000}, {&(0x7f0000000240)="fd4e848d98f58cac8856dd22731a8698d0005285787296e1da440263c958de426854beb69e1d36e5f9f0fded5d7539ac5e73f9e1d9830260177c9e7d297c381f891a11d627a7", 0x46, 0x3}], 0x80008, &(0x7f00000014c0)=ANY=[@ANYBLOB='9p\x00,9p\x00*},,{\\%&,uname,j\"#-}}\a-,sujj_role=9p\x00,func=BPRM_CPECK,dont_measure,\x00\x00\x00']) (async) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) (async) clock_gettime(0x0, &(0x7f0000001580)={0x0, 0x0}) futimesat(r3, &(0x7f0000001540)='./file0/file1\x00', &(0x7f00000015c0)={{r4, r5/1000+60000}, {0x0, 0x2710}}) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f0000001640)={{0x1, 0x1, 0x18, r2}, './file0/file1\x00'}) ioctl$PPPIOCSCOMPRESS(r6, 0x4010744d) 17:07:27 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x40000) 17:07:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000500)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) mknod(&(0x7f0000000700)='./file0\x00', 0x5dc07b45ffbc8303, 0x5) sendmsg$nl_xfrm(r1, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)=@delsa={0x154, 0x11, 0x800, 0x70bd29, 0x25dfdbfd, {@in=@multicast1, 0x4d2, 0xa, 0x6c}, [@srcaddr={0x14, 0xd, @in=@local}, @proto={0x5, 0x19, 0x3c}, @XFRMA_IF_ID={0x8, 0x1f, r2}, @algo_aead={0x105, 0x12, {{'aegis256\x00'}, 0x5c8, 0x80, "a22780aaf1123133104ca1a564445cf18934cb9b8ec3bc6dee7d941c1d54671a6e9245564a49a15802cefb5ecaa264f59001b953e8ef01507912494c8bd799d52794ccabeb3f24ac36f1279c532c59186c7abacb63fa9f486cb37e1d573fc89e3102fb9602c658e7af2380cf2b6173dbb284c1907169ca6e39a26451d7f2f75773f86425fe19e8d571f25dde0df9f389c6a1480da7bbd4cb8f62b42cbfc479fac0ec72718de941a97d36957c0ae7429761055f8615cf143026"}}]}, 0x154}}, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) 17:07:27 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x2000000) 17:07:27 executing program 0: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) syz_mount_image$nfs4(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x1000003, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) (async) syz_mount_image$nfs4(0x0, &(0x7f0000000040)='./file1\x00', 0x0, 0x0, 0x0, 0x1000003, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)={'trans=xen,', {[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}]}}) (async) 17:07:27 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x7ffffffff000, 0x0) 17:07:27 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='trantcontext=staff_u,\x00'/31]) 17:07:27 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x400000) 17:07:27 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x4000000) 17:07:27 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x7ffffffff000, 0x0) 17:07:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000500)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) mknod(&(0x7f0000000700)='./file0\x00', 0x5dc07b45ffbc8303, 0x5) sendmsg$nl_xfrm(r1, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)=@delsa={0x154, 0x11, 0x800, 0x70bd29, 0x25dfdbfd, {@in=@multicast1, 0x4d2, 0xa, 0x6c}, [@srcaddr={0x14, 0xd, @in=@local}, @proto={0x5, 0x19, 0x3c}, @XFRMA_IF_ID={0x8, 0x1f, r2}, @algo_aead={0x105, 0x12, {{'aegis256\x00'}, 0x5c8, 0x80, "a22780aaf1123133104ca1a564445cf18934cb9b8ec3bc6dee7d941c1d54671a6e9245564a49a15802cefb5ecaa264f59001b953e8ef01507912494c8bd799d52794ccabeb3f24ac36f1279c532c59186c7abacb63fa9f486cb37e1d573fc89e3102fb9602c658e7af2380cf2b6173dbb284c1907169ca6e39a26451d7f2f75773f86425fe19e8d571f25dde0df9f389c6a1480da7bbd4cb8f62b42cbfc479fac0ec72718de941a97d36957c0ae7429761055f8615cf143026"}}]}, 0x154}}, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000500)) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000002c0)) (async) mknod(&(0x7f0000000700)='./file0\x00', 0x5dc07b45ffbc8303, 0x5) (async) sendmsg$nl_xfrm(r1, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)=@delsa={0x154, 0x11, 0x800, 0x70bd29, 0x25dfdbfd, {@in=@multicast1, 0x4d2, 0xa, 0x6c}, [@srcaddr={0x14, 0xd, @in=@local}, @proto={0x5, 0x19, 0x3c}, @XFRMA_IF_ID={0x8, 0x1f, r2}, @algo_aead={0x105, 0x12, {{'aegis256\x00'}, 0x5c8, 0x80, "a22780aaf1123133104ca1a564445cf18934cb9b8ec3bc6dee7d941c1d54671a6e9245564a49a15802cefb5ecaa264f59001b953e8ef01507912494c8bd799d52794ccabeb3f24ac36f1279c532c59186c7abacb63fa9f486cb37e1d573fc89e3102fb9602c658e7af2380cf2b6173dbb284c1907169ca6e39a26451d7f2f75773f86425fe19e8d571f25dde0df9f389c6a1480da7bbd4cb8f62b42cbfc479fac0ec72718de941a97d36957c0ae7429761055f8615cf143026"}}]}, 0x154}}, 0x1) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) [ 1431.319016][T11346] 9pnet: Could not find request transport: xen [ 1431.357547][T11389] loop2: detected capacity change from 0 to 264192 17:07:27 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='trantcontext=staff_u,\x00'/31]) 17:07:27 executing program 2: r0 = syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = getegid() fchownat(r0, &(0x7f0000001600)='./file1\x00', 0xee01, r1, 0x100) r2 = syz_mount_image$nfs(&(0x7f0000000040), &(0x7f0000000080)='./file0/file0\x00', 0x80, 0x5, &(0x7f0000000340)=[{&(0x7f00000000c0)="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", 0xff}, {&(0x7f0000000400)="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", 0x1000, 0x8}, {&(0x7f00000001c0)="ea9c5f2f006f1ed3e169a430390408584b037e156652839552cc6a56ab28cd67175e9ade216254ff21ea8ae5db93ea09e7430a786a19228fb8f6c6e84740d5c9790c05f12dafcd43078405ee6ac77a798f8ee50340aed81a29c11bb6f96393fab47def2a051b17", 0x67, 0x7}, {&(0x7f0000001400)="00ccab4daa18b3c4bf444e426f2dd74f73e123007d6d671876cd937d6c7e3ba51c2d3d6b222ab0f063e029831d830ef161dcce228d2ab4e59b1c4719d9042f7216810282eaf2f226aef54fe7d7e6a3269241e4bc3a42677479f8a031ecd746ed3e6179fdf7d8f396295cdadd1fc20319fc90a20236724d9e1f091a1d68f8cd615c3b9f7c0a8998a0e56a9ae82db8c224a96851b1070ddcc7d3f85963911979e19fdfd13869f748590a2f758537d8c54d9ec00dbe14a2993f", 0xb8, 0xa3d00000000}, {&(0x7f0000000240)="fd4e848d98f58cac8856dd22731a8698d0005285787296e1da440263c958de426854beb69e1d36e5f9f0fded5d7539ac5e73f9e1d9830260177c9e7d297c381f891a11d627a7", 0x46, 0x3}], 0x80008, &(0x7f00000014c0)=ANY=[@ANYBLOB='9p\x00,9p\x00*},,{\\%&,uname,j\"#-}}\a-,sujj_role=9p\x00,func=BPRM_CPECK,dont_measure,\x00\x00\x00']) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) pipe(&(0x7f0000000000)={0xffffffffffffffff}) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) clock_gettime(0x0, &(0x7f0000001580)={0x0, 0x0}) futimesat(r3, &(0x7f0000001540)='./file0/file1\x00', &(0x7f00000015c0)={{r4, r5/1000+60000}, {0x0, 0x2710}}) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f0000001640)={{0x1, 0x1, 0x18, r2}, './file0/file1\x00'}) ioctl$PPPIOCSCOMPRESS(r6, 0x4010744d) syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) (async) getegid() (async) fchownat(r0, &(0x7f0000001600)='./file1\x00', 0xee01, r1, 0x100) (async) syz_mount_image$nfs(&(0x7f0000000040), &(0x7f0000000080)='./file0/file0\x00', 0x80, 0x5, &(0x7f0000000340)=[{&(0x7f00000000c0)="4ab737b6495320b659da46bbaedbb49d46183644cb0f2c16685bf332e40913e456ff8e83a7cd94226828fe292e1b2016273a962624710a9056df9877b7fbc7981077a9663d119c0f007f34e32eec530d732b68475d87dca75fabd239cb08b3134f2afc3db7528e4ed878be0b0e300762b67a345f5a8862cceeda8bbba02d0b56f38b31e195627d42ca65a435b2624fb6713eec184c85340263c68bd3a171f0cba05576c1c17f71ced4f0c70af04e7abddcd9ac0cfc83c1b9ce13238bad7c94eb65be7707c7f6ac839dca059125b799d91ee5fd8c7f7c23fbe6d87c1ded05d1e762ddae5281d87526052f5a7d0d1c976857986dd929ec4efb94925c9e7ede8e", 0xff}, {&(0x7f0000000400)="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", 0x1000, 0x8}, {&(0x7f00000001c0)="ea9c5f2f006f1ed3e169a430390408584b037e156652839552cc6a56ab28cd67175e9ade216254ff21ea8ae5db93ea09e7430a786a19228fb8f6c6e84740d5c9790c05f12dafcd43078405ee6ac77a798f8ee50340aed81a29c11bb6f96393fab47def2a051b17", 0x67, 0x7}, {&(0x7f0000001400)="00ccab4daa18b3c4bf444e426f2dd74f73e123007d6d671876cd937d6c7e3ba51c2d3d6b222ab0f063e029831d830ef161dcce228d2ab4e59b1c4719d9042f7216810282eaf2f226aef54fe7d7e6a3269241e4bc3a42677479f8a031ecd746ed3e6179fdf7d8f396295cdadd1fc20319fc90a20236724d9e1f091a1d68f8cd615c3b9f7c0a8998a0e56a9ae82db8c224a96851b1070ddcc7d3f85963911979e19fdfd13869f748590a2f758537d8c54d9ec00dbe14a2993f", 0xb8, 0xa3d00000000}, {&(0x7f0000000240)="fd4e848d98f58cac8856dd22731a8698d0005285787296e1da440263c958de426854beb69e1d36e5f9f0fded5d7539ac5e73f9e1d9830260177c9e7d297c381f891a11d627a7", 0x46, 0x3}], 0x80008, &(0x7f00000014c0)=ANY=[@ANYBLOB='9p\x00,9p\x00*},,{\\%&,uname,j\"#-}}\a-,sujj_role=9p\x00,func=BPRM_CPECK,dont_measure,\x00\x00\x00']) (async) mount$9p_xen(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f0000000000)={'trans=xen,', {[{@uname={'uname', 0x3d, 'trans=xen,'}}]}}) (async) pipe(&(0x7f0000000000)) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000d00), r3) (async) clock_gettime(0x0, &(0x7f0000001580)) (async) futimesat(r3, &(0x7f0000001540)='./file0/file1\x00', &(0x7f00000015c0)={{r4, r5/1000+60000}, {0x0, 0x2710}}) (async) ioctl$AUTOFS_DEV_IOCTL_VERSION(r3, 0xc0189371, &(0x7f0000001640)={{0x1, 0x1, 0x18, r2}, './file0/file1\x00'}) (async) ioctl$PPPIOCSCOMPRESS(r6, 0x4010744d) (async) 17:07:27 executing program 4: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x7ffffffff000, 0x0) 17:07:27 executing program 5: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x800000) 17:07:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000500)) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000002c0)={'batadv0\x00', 0x0}) mknod(&(0x7f0000000700)='./file0\x00', 0x5dc07b45ffbc8303, 0x5) sendmsg$nl_xfrm(r1, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)=@delsa={0x154, 0x11, 0x800, 0x70bd29, 0x25dfdbfd, {@in=@multicast1, 0x4d2, 0xa, 0x6c}, [@srcaddr={0x14, 0xd, @in=@local}, @proto={0x5, 0x19, 0x3c}, @XFRMA_IF_ID={0x8, 0x1f, r2}, @algo_aead={0x105, 0x12, {{'aegis256\x00'}, 0x5c8, 0x80, "a22780aaf1123133104ca1a564445cf18934cb9b8ec3bc6dee7d941c1d54671a6e9245564a49a15802cefb5ecaa264f59001b953e8ef01507912494c8bd799d52794ccabeb3f24ac36f1279c532c59186c7abacb63fa9f486cb37e1d573fc89e3102fb9602c658e7af2380cf2b6173dbb284c1907169ca6e39a26451d7f2f75773f86425fe19e8d571f25dde0df9f389c6a1480da7bbd4cb8f62b42cbfc479fac0ec72718de941a97d36957c0ae7429761055f8615cf143026"}}]}, 0x154}}, 0x1) socket$inet_udplite(0x2, 0x2, 0x88) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000240)={'dummy0\x00', &(0x7f0000000000)=@ethtool_per_queue_op}) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000200)) (async) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000500)) (async) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f00000002c0)) (async) mknod(&(0x7f0000000700)='./file0\x00', 0x5dc07b45ffbc8303, 0x5) (async) sendmsg$nl_xfrm(r1, &(0x7f00000004c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000480)={&(0x7f0000000300)=@delsa={0x154, 0x11, 0x800, 0x70bd29, 0x25dfdbfd, {@in=@multicast1, 0x4d2, 0xa, 0x6c}, [@srcaddr={0x14, 0xd, @in=@local}, @proto={0x5, 0x19, 0x3c}, @XFRMA_IF_ID={0x8, 0x1f, r2}, @algo_aead={0x105, 0x12, {{'aegis256\x00'}, 0x5c8, 0x80, "a22780aaf1123133104ca1a564445cf18934cb9b8ec3bc6dee7d941c1d54671a6e9245564a49a15802cefb5ecaa264f59001b953e8ef01507912494c8bd799d52794ccabeb3f24ac36f1279c532c59186c7abacb63fa9f486cb37e1d573fc89e3102fb9602c658e7af2380cf2b6173dbb284c1907169ca6e39a26451d7f2f75773f86425fe19e8d571f25dde0df9f389c6a1480da7bbd4cb8f62b42cbfc479fac0ec72718de941a97d36957c0ae7429761055f8615cf143026"}}]}, 0x154}}, 0x1) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) 17:07:27 executing program 1: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$system_posix_acl(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='system.posix_acl_access\x00', &(0x7f00000002c0)={{}, {}, [{}], {}, [{}]}, 0x34, 0x6000000) 17:07:27 executing program 0: syz_mount_image$nfs4(0x0, &(0x7f00000003c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_xen(0x0, &(0x7f00000006c0)='./file0\x00', &(0x7f0000000700), 0x0, &(0x7f0000000740)=ANY=[@ANYBLOB='trantcontext=staff_u,\x00'/31]) 17:07:27 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$SG_GET_TIMEOUT(0xffffffffffffffff, 0x2202, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) sendmsg$nl_xfrm(r1, &(0x7f0000000540)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=@getpolicy={0x170, 0x15, 0x200, 0x70bd2c, 0x25dfdbfd, {{@in6=@mcast1, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', 0x4e20, 0x5, 0x4e24, 0xd2, 0x2, 0x80, 0xa0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0x2}, [@lifetime_val={0x24, 0x9, {0x728, 0x5, 0xfffffffffffffff9, 0x9}}, @lifetime_val={0x24, 0x9, {0xf591, 0x3e, 0xffffffffffff8000, 0x31}}, @sec_ctx={0xcb, 0x8, {0xc7, 0x8, 0x0, 0x53, 0xbf, "3b7d8d4816bb681d49b76082f164c2a477ff43a2af1c5870bbee600a93d0cda4080c071c4958390a83723e9de6b3f4797b8b6ccf63db2df0a298cb8344f7ae204a176640279579afe5112f168a5b6a2de6bf9a7d880ec38c4c6fd559a0d22154533ce8f6cfe003fd4bd8674afe5ce2f002003bffdff21becaa81f1df2121d22e7de94d86109030ed723700c4f70882e96425f96d8